Study Guide Ch 1 Flashcards

1
Q

Confidentiality

A

the principle that objects are not disclosed to unauthorized subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

the principle that objects retain their veracity and are intentionally modified by only authorized subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

the principle that authorized subjects are granted timely and uninterrupted access to object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Countermeasures for confidentiality include:

A

encryption,
network traffic padding, strict access control, rigorous authentication procedures,
data classification,
extensive personnel training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacks against confidentiality include:

A
capturing network traffic stealing password files 
social engineering, 
port scanning, 
shoulder surfing, eavesdropping, 
sniffing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mechanisms which support integrity include:

A

controls which restrict access to data, objects, and resources

activity logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacks against integrity include:

A

viruses, logic bombs, unauthorized access,
errors in coding and applications,
malicious modification, intentional replacement,
and system back doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Countermeasures for maintaining integrity

A

strict access control, rigorous authentication procedures,
intrusion detection systems, object/data encryption, hash total verification, interface restrictions, input/function checks,
and extensive personnel training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

threats to availability

A

device failure,

software errors,

environmental issues,

DoS attacks,

object destruction,

communication interruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Availability countermeasures include:

A

monitoring performance and network traffic,

using firewalls and routers to prevent DoS attacks,

implementing redundancy for critical systems,

maintaining and testing backup systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identification

A

the process by which a subject professes an identity and accountability is initiated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does identification work?

A

Providing an identity can involve typing in a username; swiping a smart card; waving a proximity device, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication

A

The process of verifying or testing that the claimed identity is valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does authentication work?

A

Authentication verifies the identity of the subject by comparing one or more factors against the database of valid identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorization

A

defining the allows and denials of resource and object access for a specific identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Auditing

A

the programmatic means by which a subject’s actions are tracked and recorded for the purpose of holding the subject accountable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the enforcement of the security policy depend on?

A

An organization’s security policy can be properly enforced only if accountability is maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Non repudiation

A

Non repudiation ensures that the subject of an activity or event cannot deny that the event occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is security management based on?

A

Strategic, tactical and operational planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Strategic Plan

A

a long-term plan that is fairly stable and defines the goals, mission and objectives of the organization

21
Q

Tactical plan

A

a midterm plan developed to provide more details on accomplishing the goals set forth in the strategic plan

22
Q

Operational Plan

A

a short-term, highly detailed plan based on the strategic and tactical plans.

23
Q

Elements of a formal security policy structure

A
security policy, 
standards, 
baselines, 
guidelines, 
and procedures
24
Q

The primary security roles

A
senior manager, organizational owner, 
upper management, 
security professional, 
user, data owner, 
data custodian, 
auditor
25
Q

Senior manager

A

ultimately responsible for the security maintained by an organization

26
Q

Security professional

A

has the functional responsibility for security, including writing the security policy and implementing it

27
Q

Data Owner

A

the person who is responsible for classifying information

28
Q

Data Custodian

A

the user who is responsible for the tasks of implementing the prescribed protection defined by the security policy and senior management

29
Q

User

A

assigned to any person who has access to the secured system

30
Q

Auditor

A

responsible for reviewing and verifying that the security policy is properly implemented

31
Q

How does education fit into the security processes of an organization?

A

Education is a more detailed endeavor in which students/users learn much more than they actually need to know to perform their work tasks

32
Q

What is layering?

A

the use of multiple controls in series

33
Q

Define data hiding

A

preventing data from being discovered or accessed by a subject

34
Q

Abstraction

A

Abstraction is used to collect similar elements into groups, classes, or roles

35
Q

Encryption

A

Encryption is the art and science of hiding the meaning or intent of a communication from unintended recipients

36
Q

benefits of using a data classification scheme

A
  • It demonstrates an organization’s commitment to protecting valuable resources and assets.
  • It assists in identifying those assets that are most critical or valuable to the organization.
  • It lends credence to the selection of protection mechanisms.
  • It is often required for regulatory compliance or legal restrictions.
  • It helps to define access levels, types of authorized uses, and parameters for declassification and/or destruction of resources that are no longer valuable.
  • It helps with data life-cycle management
37
Q

Benefits of change management

A
  • Changes are always controlled.
  • A formalized testing process
  • All changes can be reversed
  • Users are informed of changes before they occur
  • The effects of changes are systematically analyzed.
  • The negative impact of changes on capabilities, functionality, and performance is minimized.
  • Changes are reviewed and approved by a CAB (change approval board).
38
Q

The goal of change management

A

to ensure that any change does not lead to reduced or compromised security

39
Q

Data classification

A

the process of organizing items, objects, subjects into categories

40
Q

Government data classification scheme

A
Top Secret 
Secret 
Confidential 
SBU
Unclassified
41
Q

Commercial data classification scheme

A

Confidential
Private
Sensitive
Public

42
Q

Define Threat modeling

A

the security process where potential threats are identified, categorized, and analyzed

43
Q

3 Approaches to Identifying Threats

A

Focused on Assets
Focused on Attackers
Focused on Software

44
Q

STRIDE

A
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege
45
Q

Threat modeling steps

A

Identify threats
Diagram
Reduce/Decompose
Prioritize/Mitigation

46
Q

The DREAD rating system

A
Damage potential
Reproducibility
Exploitability
Affected users
Discoverability
47
Q

COBIT

A

Control Objectives for Information and Related Technology

48
Q

Data Hiding

A

preventing data from being discovered or accessed by positioning the data in a logical storage compartment that is not accessible