Security Principles Flashcards
To define security, it has become common to use Confidentiality, Integrity and Availability. The purpose of these terms is to describe security using relevant and meaningful words that make security more understandable to management and users and define its purpose.
The CIA Triad
Relates to permitting authorized access to information, while at the same time protecting information from improper disclosure.
Confidentiality
The property of information whereby it is recorded, used and maintained in a way that ensures its completeness, accuracy, internal consistency and usefulness for a stated purpose.
Integrity
Means that systems and data are accessible at the time users need them.
Availability
A difficult balance to achieve when many system users are guests or customers, and it is not known if they are accessing the system from a compromised machine or vulnerable mobile application. So, the security professional’s obligation is to regulate access—protect the data that needs protection, yet permit access to authorized individuals.
Confidentiality
A term related to the area of confidentiality. It pertains to any data about an individual that could be used to identify them.
Personally Identifiable Information (PII)
Information regarding one’s health status.
Protected Health Information (PHI)
Includes trade secrets, research, business plans and intellectual property. If improperly disclosed (confidentiality) or modified (integrity) would harm an organization or individual.
Classified or Sensitive Information
A measure of the importance assigned to information by its owner, or the purpose of denoting its need for protection. It is related to the harm to external stakeholders; that is, people or organizations that may not be a part of the organization that processes or uses the information
Sensitivity
The assurance that data has not been altered in an unauthorized manner. This requires the protection of the data in systems and during processing to ensure that it is free from improper modification, errors or loss of information and is recorded, used and maintained in a way that ensures its completeness. It covers data in storage, during processing and while in transit.
Information must be accurate, internally consistent and useful for a stated purpose. The internal consistency of information ensures that information is correct on all related systems so that it is displayed and stored in the same way on all systems.
Data integrity
As part of data integrity, requires that all instances of the data be identical in form, content and meaning.
Consistency
Refers to the maintenance of a known good configuration and expected operational function as the system processes the information.
System integrity
Ensuring integrity begins with an awareness which concerns the ability to document and understand the current condition or a system at a certain point, creating a baseline.
State
Can refer to the current state of the information—whether it is protected. Then, to preserve that state, the information must always continue to be protected through a transaction.
Going forward from this, the integrity of the data or the system can always be ascertained by comparing the baseline with the current state. If the two match, then the integrity of the data or the system is intact; if the two do not match, then the integrity of the data or the system has been compromised. Integrity is a primary factor in the reliability of information and systems.
The need to safeguard information and system integrity may be dictated by laws and regulations. Often, it is dictated by the needs of the organization to access and use reliable, accurate information.
Baseline
Can be defined as (1) timely and reliable access to information and the ability to use it, and (2) for authorized users, timely and reliable access to data and information services.
The core concept of this is that data is accessible to authorized users when and where it is needed and in the form and format required. This does not mean that data or systems are available 100% of the time. Instead, the systems and data meet the requirements of the business for timely and reliable access.
Availability
Some systems and data are far more critical than others, so the security professional must ensure that the appropriate levels of availability are provided. This requires consultation with the involved business to ensure that critical systems are identified and available. Availability is often associated with the term, because it represents the importance an organization gives to data or an information system in performing its operations or achieving its mission.
Criticality
When users have stated their identity, it is necessary to validate that they are the rightful owners of that identity. This process of verifying or proving the user’s identification. Simply put, it is a process to prove the identity of the requestor.
There are three common methods of this:
Something you know: Passwords or paraphrases
Something you have: Tokens, memory cards, smart cards
Something you are: Biometrics , measurable characteristics
Authentication
Using only one of the methods of authentication.
Single-Factor Authentication (SFA)
Granting users access only after successfully demonstrating or displaying two or more of these methods.
Multi-Factor Authentication (MFA)
Uses a passphrase or secret code to differentiate between an authorized and unauthorized user. If you have selected a personal identification number (PIN), created a password or some other secret value that only you know, then you have experienced this. The problem with using this type of authentication alone is that it is often vulnerable to a variety of attacks. For example, the help desk might receive a call to reset a user’s password. The challenge is ensuring that the password is reset only for the correct user and not someone else pretending to be that user. For better security, a second or third form of authentication that is based on a token or characteristic would be required prior to resetting the password. The combined use of a user ID and a password consists of two things that are known, and because it does not meet the requirement of using two or more of the authentication methods stated, it is not considered MFA.
Knowledge-based authentication
A legal term and is defined as the protection against an individual falsely denying having performed a particular action. It provides the capability to determine whether a given individual took a particular action, such as created information, approved information or sent or received a message.
In today’s world of e-commerce and electronic transactions, there are opportunities for the impersonation of others or denial of an action, such as making a purchase online and later denying it. It is important that all participants trust online transactions. Its methodologies ensure that people are held responsible for transactions they conducted.
Non-repudiation
Privacy is the right of an individual to control the distribution of information about themselves. While security and privacy both focus on the protection of personal and sensitive data, there is a difference between them. With the increasing rate at which data is collected and digitally stored across all industries, the push for privacy legislation and compliance with existing policies steadily grows. In today’s global economy, privacy legislation and regulations on privacy and data protection can impact corporations and industries regardless of physical location. Global privacy is an especially crucial issue when considering requirements regarding the collection and security of personal information. There are several laws that define privacy and data protection, which periodically change. Ensuring that protective security measures are in place is not enough to meet privacy regulations or to protect a company from incurring penalties or fines from mishandling, misuse, or improper protection of personal or private information.
The right of an individual to control the distribution of information about themselves. While security and privacy both focus on the protection of personal and sensitive data, there is a difference between them. With the increasing rate at which data is collected and digitally stored across all industries, the push for privacy legislation and compliance with existing policies steadily grows. In today’s global economy, privacy legislation and regulations on privacy and data protection can impact corporations and industries regardless of physical location. Global privacy is an especially crucial issue when considering requirements regarding the collection and security of personal information. There are several laws that define privacy and data protection, which periodically change. Ensuring that protective security measures are in place is not enough to meet privacy regulations or to protect a company from incurring penalties or fines from mishandling, misuse, or improper protection of personal or private information.
Privacy
An example of a law with multinational implications is the European Union’s which applies to all organizations, foreign or domestic, doing business in the EU or any persons in the EU. Companies operating or doing business within the United States may also fall under several state legislations that regulate the collection and use of consumer data and privacy. Likewise, member nations of the EU enact laws to put this into practice and sometimes add more stringent requirements. These laws, including national- and state-level laws, dictate that any entity anywhere in the world handling the private data of people in a particular legal jurisdiction must abide by its privacy requirements. As a member of an organization’s data protection team, you will not be required to interpret these laws, but you will need an understanding of how they apply to your organization.
General Data Protection Regulation (GDPR)
A measure of the extent to which an entity is threatened by a potential circumstance or event. It is often expressed as a combination of the adverse impacts that would arise if the circumstance or event occurs, and the likelihood of occurrence.
Risk
Reflects the potential adverse impacts that result from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information and/or information systems. This definition represents that risk is associated with threats, impact and likelihood, and it also indicates that IT risk is a subset of business risk.
Information security risk
Something in need of protection.
Asset
A gap or weakness in those protection efforts.
Vulnerability
Something or someone that aims to exploit a vulnerability to thwart protection efforts.
Threat
Not a one-and-done activity. It’s a recurring process of characterizing different possible risks and then estimating their potential for disrupting the organization.
Takeaways to remember about this:
Communicate it clearly.
Employees at all levels of the organization are responsible for it.
Protect against it.
Risk Identification
Assist in risk assessment at a system level, focusing on process, control, monitoring or incident response and recovery activities. In a smaller organization, or one that lacks any kind of risk management and mitigation plan and program, help fill that planning void.
Security professional