1 - Security Governance Flashcards
(39 cards)
What is Confidentiality?
The concept of the measures used to ensure the protection of the secrecy of data, objects, and resources.
Object vs Subject
Object: passive element in a security relationship such as files, computers, and applications.
Subject: active element in a security relationship such as users, programs, and computers.
A subject acts upon an object.
The management of the relationship between objects and subjects is known as _access control_.
What is the CIA triad?
Confidentiality Integrity Availability
What is Integrity?
Protecting the reliability and correctness of data.
Availability
Authorized subjects granted timely and uninterrupted access to objects.
What are the components of AAA services?
Identification: subject professes an identity.
Authentication: the process of verifying or testing that the claimed identity is valid.
Authorization: ensures requested activity or access to an object is possible given the rights and privileges assigned to the identity.
Auditing: (or monitoring) programmatic means by which a subject’s actions are tracked and recorded for the purpose of holding the subject accountable for their actions while Authenticated on a system.
Accountability: linking a human to the activities of an online identity.
What is Layering?
Also known as Defense in Depth, the use of multiple controls in a series.
What is abstraction?
Where similar objects are put into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective. Also defines what type of data an object can contain, what functions can be performed on them/by them, and what capabilities that object has.
What is Data Hiding?
Preventing data from being discovered or accessed by a subject by positioning the data in a logical storage compartment that is not accessible or seen by the subject.
What is encryption?
The art and science of hiding the meaning or intent of a communication from unintended recipients.
What is Security Governance?
The collection of practices related to supporting, defining, and directing the security efforts of an organization.
What is the most effective way to tackle security management planning?
Via the Top-Down Approach, where upper and senior management is responsible for initiating and defining policies for the organization. Middle management fleshes out security polices into stardards, baselines, guidelines, and procedures. Ops managers and/or security professionals implement the the configurations prescribed in the security management documentation. End users must comply with all security polices of an organization.
What position should lead the information security team?
Generally the Chief Information Security Officer (CISO), sometimes referred to as Chief Security Officer (CSO), but these 2 roles can be subpositions to each other depending on the organization. Sometimes also refered to as Information Security Officer (ISO).
What is the key factor of success for every security plan?
Approval by security management.
What are the different types of security plans?
- Strategic Plan: A long-term plan that defines organization’s security purpose. Should include a risk assessment.
- Tactical Plan: A midterm plan developed to provide more details on accomplishing the goals set forth in the strategic plan or crafted ad-hoc based on unpredicted events.
- Operational Plan: A short-term, highly detailed plan based on strategic and tactial plans.
What is the purpose of Change Management?
To ensure that any change does not lead to reduced or compromised security.
- Implement changes in orderly manner
- Formalized testing process
- Changes can be reversed (rolled-back)
- Users are informed of changes
- Effects of changes are systematically analyzed
- negative impacts are minimized
- Changes are reveiwed and approved by Change Advisory Board (CAB)
What is Data Classification?
The primary means by which data is protected based on its need for secrecy, sensitivity, or confidentiality. Used to determine how much effort, money, and resources are allocated to protect the data and control access to it.
What are the 7 major steps to implement a classification scheme?
- Identify custodian
- Specify evaluation criteria
- Classify and label each resource
- Document any exceptions
- Select the security controls
- Specify declassification procudure
- Create awareness program for organization
What is declassification?
When an asset no longer warrants or needs the protection of its currently assigned classification or sensitivity level.
What are the commonly used classification themes?
(Levels of classification)
- Government/Military
- Top Secret: Disclosure will have grave damage to national security.
- Secret: Disclosure will cause serious damage to national security.
- Confidential: Disclosure will cause damage to national security.
- Sensitive but Unclassified: Protects data that could violate the privacy rights of individuals.
- Unclassified: Does not cause damage.
- Commercial Business/Private
- Confidential: Drastic effects on competitive edge of an organization.
- Private: A significant negative impact could occur for the company or individuals if private data is disclosed.
- Sensitive: A negative impact could occur for the company if disclosed.
- Public: Disclosure does not have have a serious impact on the organization.
What is a security role?
The part an individual plays in the overall scheme of security implementation and administration within an organization.
What are the 6 roles seen in a secured environment?
- Senior Manager: The person who is ultimately responsible for the security maintained by an organization.
- Security Professional: A trained and experienced network, systems, and security engineer who is respnsible for following the directives mandated by senior management.
- Data Owner: Person responsible for classifying information for placement and protection within the security solution.
- Data Custodian: The user who is responsible for the tasks of implementing the prescribed protection within teh security solution.
- User: Any person who has access to secured system.
- Auditor: Responsible for reviewing and verifying that the security policy is properly implemented.
What is a Security Control Framework?
The structure of the security solution desired by the organization.
What are the 5 key priniciples of COBIT (Control Objectives for Information and Related Technology)?
- Meeting Stakeholder Needs
- Covering the Enterprise End-to-End
- Applying a Single, Integrated Framework
- Enabling a Holistic Approach
- Seperating Governance from Management