Study Guide Ch 1 Flashcards
Confidentiality
the principle that objects are not disclosed to unauthorized subjects
Integrity
the principle that objects retain their veracity and are intentionally modified by only authorized subjects
Availability
the principle that authorized subjects are granted timely and uninterrupted access to object
Countermeasures for confidentiality include:
encryption,
network traffic padding, strict access control, rigorous authentication procedures,
data classification,
extensive personnel training
Attacks against confidentiality include:
capturing network traffic stealing password files social engineering, port scanning, shoulder surfing, eavesdropping, sniffing
Mechanisms which support integrity include:
controls which restrict access to data, objects, and resources
activity logging
Attacks against integrity include:
viruses, logic bombs, unauthorized access,
errors in coding and applications,
malicious modification, intentional replacement,
and system back doors
Countermeasures for maintaining integrity
strict access control, rigorous authentication procedures,
intrusion detection systems, object/data encryption, hash total verification, interface restrictions, input/function checks,
and extensive personnel training.
threats to availability
device failure,
software errors,
environmental issues,
DoS attacks,
object destruction,
communication interruptions
Availability countermeasures include:
monitoring performance and network traffic,
using firewalls and routers to prevent DoS attacks,
implementing redundancy for critical systems,
maintaining and testing backup systems
Identification
the process by which a subject professes an identity and accountability is initiated
How does identification work?
Providing an identity can involve typing in a username; swiping a smart card; waving a proximity device, etc
Authentication
The process of verifying or testing that the claimed identity is valid
How does authentication work?
Authentication verifies the identity of the subject by comparing one or more factors against the database of valid identities
Authorization
defining the allows and denials of resource and object access for a specific identity
Auditing
the programmatic means by which a subject’s actions are tracked and recorded for the purpose of holding the subject accountable
What does the enforcement of the security policy depend on?
An organization’s security policy can be properly enforced only if accountability is maintained
Non repudiation
Non repudiation ensures that the subject of an activity or event cannot deny that the event occurred
What is security management based on?
Strategic, tactical and operational planning