Writing Assignment: Module 01 Flashcards
What is information security?
information security is a term refering to many interlinked programs and activities that work together to create confidentiality, integrity, and availability for the information used by organizations.
How is the CNSS model of information security organized?
Committee on National Security Systems (CNSS)
Confidentiality, Integrity, Availability on the (Y axis),
Policy, Education, Technolgy (Z axis),
Storage, Processing and Transmission on the (X axis)
What three principles are used to define the C.I.A. triad? Define each in the context in which it is used in information security.
Confidentiality, integrity and availability
Confidentiality is roughly equivalent to privacy.
Integrity involves maintaining the consistency, accuracy and trustworthiness of data.
Availability means the information should be consistently ready and accessible.
What is a threat in the context of information security?
Any event or circumstance that has the potential to adversely affect operations and assets
What is an asset in the context of information security?
organizational resource that is being protected be that be a Web site, software information, or data. Assets can also be physical, such as a person, a computer system, hardware, or other tangible objects.
What is an attack in the context of information security?
an attempt to gain unauthorized access to a computer, system or network with the intent to cause damage be that disabling, disrupting, destroing or controling a computer system, by the means of altering, blocking, deleting, manipulating or stealing the data held within these systems
What is a vulnerability in the context of information security?
A potential weakness in an asset or its defensive control system(s)
What is a loss in the context of information security?
a single instance of a information asset that suffers damage or destruction, unintended or unauthorized modification or disclosure, or denial of use. As one example, when an organization’s informatio is stolen, it has suffered a loss.
What is intellectual property? Describe at least one threat to this type of asset.
intellectual property can be trade secrets, proprietary processes, copyrights, trademarks, and patents. An attack on that could be stealing identifiable information of individuals
What is an availability disruption? Pick a utility service provider and describe what might constitute a disruption.
A reduced level of service in an element of the critical infrastructure. CenturyLink a power outage could be considers a disruption to serveices
What is a hacker and what are terms used to describe their skill levels?
a hackeris someone who spends long hours examining the types and structures of targeted system, the level of a hacker comes down to if they are an expert hacker or a novice hacker
How does a brute force password attack differ from a dictionary password attack?
a Brute Force password attack trys every possible password combination, a Dictionary attack trys common passwords and includes information related to the target user, such as names of relatives or pets, and familiar numbers such as phone numbers, addresses, and even Social Security numbers.
What is phishing, and how is spear phishing different?
Phishing attacks use two primary techniques, often in combination with one another: URL manipulation and Web site forgery. Phishing attacks aim to decive and fool as meny people as posible. spear phishing involves an attacker sending a targeted message that appears to be from an employer, a colleague, or some other legitimate correspondent.
In general terms, what is policy?
a statement or set of principles of action to follow to help guide and regulate employee behavior.
What is an enterprise information security policy, and how is it used?
a high-level information security policy that sets the strategic direction, scope, and tone for all of an organization’s security efforts.