Security Governance Through Principles and Policies Flashcards
Sensitivity
the quality of information, which could cause harm or damage if disclosed. Maintaining confidentiality of sensitive information helps to prevent harm or damage.
Discretion
an act of decision where an operator can influence or control disclosure in order to minimize harm or damage.
Criticality
The level to which information is mission critical is its measure of criticality. The higher the level of criticality, the more likely the need to maintain the confidentiality of the information. High levels of criticality are essential to the operation or function of an organization.
Concealment
hiding or preventing disclosure. Often concealment is viewed as a means of cover, obfuscation, or distraction. A related concept to concealment is security through obscurity, which is the concept of attempting to gain protection through hiding, silence, or secrecy. While security through obscurity is typically not considered a valid security measure, it may still have value in some cases.
Secrecy
the act of keeping something a secret or preventing the disclosure of information.
Privacy
keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed.
Seclusion
storing something in an out-of-the-way location. This location can also provide strict access controls. Seclusion can help enforcement of confidentiality protections
Isolation
the act of keeping something separated from others. Isolation can be used to prevent commingling of information or disclosure of information.
Confidentiality
- the concept of the measures used to ensure the protection of the secrecy of data, objects, or resources. The goal of confidentiality protection is to prevent or minimize unauthorized access to data. Confidentiality focuses security measures on ensuring that no one other than the intended recipient of a message receives it or is able to read it.
- provides a means of protection for authorized users to access and interact with resources, but it actively prevents unauthorized users from doing so.
- encryption, access controls, and steganography.
Integrity
the concept of protecting the reliability and correctness of data, preventing unauthorized alterations of data.
- ensures that data remains correct, unaltered, and preserved.
- provides a means for authorized changes while protecting against intended and malicious unauthorized activities (such as viruses and intrusions) as well as mistakes made by authorized users (such as mistakes or oversights).
violation of confidentiality
These include capturing network traffic and stealing password files as well as social engineering, port scanning, shoulder surfing, eavesdropping, sniffing, escalation of privileges, and so on.
violation of integrity
These include viruses, logic bombs, unauthorized access, errors in coding and applications, malicious modification, intentional replacement, and system back doors.
Nonrepudiation
- ensures that the subject of an activity or who caused an event cannot deny that the event occurred.
- prevents a subject from claiming not to have sent a message, not to have performed an action, or not to have been the cause of an event. It is made possible through identification, authentication, authorization, accountability, and auditing.
- established using digital certificates, session identifiers, transaction logs, and numerous other transactional and access control mechanisms.
Availability
which means authorized subjects are granted timely and uninterrupted access to objects.
AAA services and identification
authentication - Proving that you are that identity
authorization - Defining the permissions (i.e., allow/grant and/or deny) of a resource and object access for a specific identity
accounting (or sometimes auditing) - Recording a log of the events and activities related to the system and subjects aka accountability): Reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions
identification - Claiming to be an identity when attempting to access a secured area or system
Layering
Performing security restrictions in a series means to perform one after the other in a linear fashion. Only through a series configuration will each attack be scanned, evaluated, or mitigated by every security control. In a series configuration, failure of a single security control does not render the entire solution ineffective. If security controls were implemented in parallel, a threat could pass through a single checkpoint that did not address its particular malicious activity.
Abstraction
is used to define what types of data an object can contain, what types of functions can be performed on or by that object, and what capabilities that object has.
-simplifies security by enabling you to assign security controls to a group of objects collected by type or function.
Data Hiding
the act of intentionally positioning data so that it is not viewable or accessible to an unauthorized subject, while security through obscurity is the idea of not informing a subject about an object being present and thus hoping that the subject will not discover the object.
-Security through obscurity does not actually implement any form of protection. It is instead an attempt to hope something important is not discovered by keeping knowledge of it a secret.
Strategic Plan
- a long-term plan that is fairly stable.
- defines the organization’s security purpose. It also helps to understand security function and align it to the goals, mission, and objectives of the organization
- Long-term goals and visions for the future are discussed in a strategic plan.
Tactical Plan
- a midterm plan developed to provide more details on accomplishing the goals set forth in the strategic plan or can be crafted ad hoc based upon unpredicted events.
- A tactical plan is typically useful for about a year and often prescribes and schedules the tasks necessary to accomplish organizational goals.
Operational Plan
- short-term, highly detailed plan based on the strategic and tactical plans. It is valid or useful only for a short time.
- spell out how to accomplish the various goals of the organization. They include resource allotments, budgetary requirements, staffing assignments, scheduling, and step-by-step or implementation procedures.
Data Classification
- is to formalize and stratify the process of securing data based on assigned labels of importance and sensitivity.
- is used to provide security mechanisms for storing, processing, and transferring data. It also addresses how data is removed from a system and destroyed.
Seven major steps of classification scheme
- Identify the custodian, and define their responsibilities.
- Specify the evaluation criteria of how the information will be classified and labeled.
- Classify and label each resource. (The owner conducts this step, but a supervisor should review it.)
- Document any exceptions to the classification policy that are discovered, and integrate them into the evaluation criteria.
- Select the security controls that will be applied to each classification level to provide the necessary level of protection.
- Specify the procedures for declassifying resources and the procedures for transferring custody of a resource to an external entity.
- Create an enterprise-wide awareness program to instruct all personnel about the classification system.
Declassification
- once an asset no longer warrants or needs the protection of its currently assigned classification or sensitivity level.
- if the asset were new, it would be assigned a lower sensitivity label than it currently is assigned.
Top Secret
- highest level of classification. The unauthorized disclosure of data will have drastic effects and cause grave damage to national security.
- compartmentalized on a need-to-know basis such that a user could have the clearance and have access to no data until the user has a need to know.
Secret
used for data of a restricted nature. The unauthorized disclosure of data classified as secret will have significant effects and cause critical damage to national security.
Confidential
- used for data of a sensitive, proprietary, or highly valuable nature.
- The unauthorized disclosure of data classified as confidential will have noticeable effects and cause serious damage to national security.
Sensitive But Unclassified
- used for data that is for internal use or for office use only (FOUO).
- is used to protect information that could violate the privacy rights of individuals. Not technically a classification label; instead, it is a marking or label used to indicate use or management.
Unclassified
- used for data that is neither sensitive nor classified. The disclosure of unclassified data does not compromise confidentiality or cause any noticeable damage.
- not technically a classification label; instead, it is a marking or label used to indicate use or management.
Confidential
- highest level of classification, used for data that is extremely sensitive and for internal use only.
- significant negative impact could occur for a company if confidential data is disclosed.
- Sometimes proprietary data is considered a specific form of confidential information. If proprietary data is disclosed, it can have drastic effects on the competitive edge of an organization.
Private
- is used for data that is of a private or personal nature and intended for internal use only.
- significant negative impact could occur for the company or individuals if private data is disclosed.
Sensitive
- is used for data that is more classified than public data.
- negative impact could occur for the company if sensitive data is disclosed.
Public
- is the lowest level of classification.
- is used for all data that does not fit in one of the higher classifications. Its disclosure does not have a serious negative impact on the organization.
Ownership
has full capabilities and privileges over the object they own.
- the subject that creates a new object is by default the owner of that object.
- the security policy mandates that when new objects are created, a formal change of ownership from end users to an administrator or management user is necessary.
Security role
- will help in establishing a communications and support structure within an organization.
- this structure will enable the deployment and enforcement of the security policy.
Senior Manager
- all activities must be approved by and signed off on by the senior manager before they can be carried out.
- is the person who will be held liable for the overall success or failure of a security solution and is responsible for exercising due care and due diligence in establishing security for an organization.
Security Professional
- is responsible for following the directives mandated by senior management.
- has the functional responsibility for security, including writing the security policy and implementing it.
- role is often filled by a team that is responsible for designing and implementing security solutions based on the approved security policy.
- Security professionals are not decision makers; they are implementers.
Data Owner
- is assigned to the person who is responsible for classifying information for placement and protection within the security solution.
- is typically a high-level manager who is ultimately responsible for data protection.
- delegates the responsibility of the actual data management tasks to a data custodian