chapter 2 information security system Flashcards

• The oulines : • the information security defination • the informatios security system critical Assets • the information system Core principles and Objevtives • OSI security Architecture for infosec • the security system Development lifecycle SECSDLC (36 cards)

1
Q

Define Information security ?

A

Information security can be defined as the protection of the information system and its resources (Critical assets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information security protect the information system and its resources against what?

A

1-Accidental or Intentional disclosure of confidential data
2-Unlawful modification of data or programs
3-the destruction of data, software or hardware
4- ensuring non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information systems security (infosec) refers to what?

A

Information systems security (infosec) refers to the processes and methodologies involved with keeping information confidential, available, and assuring its integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the primary information assets?

A

Primary information assets are :
data, information or knowledge, Which has value, is organized and managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The primary information assets enables what?

A

Enables the organization to operate business processes and decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

where does the primary information assets sets in the information assets pyramid?

A

it situated at the top of the pyramid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the supporting (secondary assets)

A

1- Software
2- hardware
3-people
4-physical infrastructure
5-processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secondary, supporting information assets are essential for?

A

are essential for making data and information available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the secondary (supporting) assets include (software) explain ?

A

software or application where data is stored or processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the secondary (supporting) assets include (Hardware) explain ?

A

Hardware: any other IT or other equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the secondary (supporting) assets include (people) explain ?

A

as carriers of knowledge and information, also as a source of risk or failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the secondary (supporting) assets include (physical infrastructure) explain ?

A

any physical equipment, location on which other assets depend, such as a server room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the secondary (supporting) assets include (processes) explain ?

A

processes such access control processes or incident response processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI Security architecture contains 3 things mention them?

A

1- security attack
2-security mechanism
3-security service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a security attack?

A

any action that compromises the security of information owned by an organization. Or an assault (Attack) on system security that develops from an intelligent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

there are two types of generic types of attacks ,mention them?

A

1-Passive attack
2-active attack

17
Q

what is a security mechanism ?

A

a process (Or a device incorporating such a process) that is designed to prevent. detect, or recover from a security attack

18
Q

does a single mechanism can support all functions required?

A

NO, however one particular element underlies many of the security mechanisms in use: cryptographic techniques

19
Q

What is a security service?

A

is a service that enhances the security of the data and the information transfers of an organization

20
Q

there are 6 main pillars of security (the roman building) mention them?

A

1- confidentiality
2-Integrity
3-Availability
4-Non-Repudiation
5-Authenticity
6-Access control

21
Q

What do we mean by assets confidentiality ?

A

Confidentiality ensures that computer-related assets are accessed only by authorized parties that is only those who should have access to something will actually get that access

22
Q

confidentiality sometimes is called ?

A

Secrecy or privacy

23
Q

What do we mean by data confidentiality ?

A

Assure that private or confidential information is not made available or disclosed to unauthorized individuals

24
Q

what do we mean by privacy ?

A

Assure that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed

25
What do we mean by assets integrity?
Integrity means that assets can be modified only by authorized parties or only in authorized ways
26
assets modification includes what?
1- writing 2-changing 3-changing status 4-deleting 5-creating
27
what do we mean by data integrity?
Assures that information and programs are changed only in a specified and authorized manner
28
What do we mean by system integrity?
Assures that a system performs its intended function in an unimpaired manner , free from deliberate or unintended unauthorized manipulation of the system
29
What do we mean by availability?
availability means that assets are accessible to authorized parties at appropriate times,
30
Define confidentiality ?
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information
31
Define integrity?
Guarding against improper information modification or destruction, including ensuring information non-repudiation and authenticity
32
Define availability?
Ensuring timely and reliable access to and use of information
33
define authenticity?
authenticity means the property of being genuine and being able to be verified and trusted (this means verifying that users are who they say they are and that each input arriving at the system came form a trusted source
34
Define accountability?
the security goal that generated the requirement for action of an entity to be traced uniquely to that entity
35
Authentication is any process which verify that someone is who they claim they are, this usually involves?
username, password, can include any other method of demonstrating identity, such as a smart card , retina scan, voice recognition or fingerprints
36
what do we mean by Data source authentication ?
means that the data is coming from an authorized party