D1 - App FC Flashcards
(207 cards)
Name the three types of subjects and their roles in a security environment.
- The user accesses objects on a system to perform a work task,
- The owner is liable for protection of the data,
- The data custodian is assigned to classify and protect data.
Explain why separation of duties and responsibilities is a common security practice.
It prevents and single subject from being able to circumvent or disable security mechanisms,
What is the principle of least privilege?
Subjects should be granted only the amount of access to objects that is required to accomplish their assigned work tasks.
Name the four key principles upon which access control relies.
Identification,
Authentication,
Authorisation,
Accountability.
What is privacy?
Prevention of unauthorised intrusion, knowledge that information deemed personal or confidential won’t be shared with unauthorised entities, and freedom from being observed without consent.
What are the requirements for accountability?
Identification,
Authentication,
Authorisation,
Auditing.
What is nonrepudation?
Nonrepudiation prevents a subject from claiming not to have sent a message, not to have performed an action, or not to have been the cause of an event.
What is layering?
Layering is the use of multiple controls in series. The use of a multi-layered solution allows for numerous controls to be brought to bear against whatever threats occur.
How is abstraction used?
Abstraction is used to collect similar elements into groups, classes, or roles that are assigned security controls, restrictions, or permissions.
What is data hiding?
Data hiding is preventing data from being known to a subject. Keeping a database from being accessed by unauthorised visitors is a form of data hiding.
What is change control or change management?
A mechanism used to systematically manage change. Typically, it involves extensive logging, auditing, and monitoring of activities related to security controls and security solutions.
What are the goals of change management?
- Implementation of changes in an orderly manner,
- Formalised testing, ability to reverse changes,
- Ability to inform users of changes,
- Systematic analysis of changes,
- Minimisation of negative impact of changes.
What is data classification?
Data classification is the primary means
- By which data is protected based on categories of
- Secrecy,
- Sensitivity,
- or Confidentiality.
What criteria are used to classify data?
- Usefulness,
- Timeliness,
- Value or cost,
- Maturity or age,
- Lifetime or Expiration period,
- Disclosure damage assessment,
- Modification damage assessment,
- National or business security implications,
- Storage.
What is the government/military data classification scheme?
- Top secret,
- Confidential,
- Sensitive,
- Unclassified.
What is the commercial business/private sector classification scheme?
- Confidential,
- Private,
- Sensitive,
- Public.
Name at least seven security management concepts and principles.
- CIA triad,
- Confidentiality,
- Integrity,
- Availability,
- Privacy,
- Identification,
- Authentication,
- Authorisation,
- Auditing,
- Accountability,
- Nonrepudiation.
What are the elements of a termination procedure policy?
- Have at least one witness,
- escort terminated employees off the premises immediately,
- collect identification, access, or security devices;
- perform an exit interview;
- and disable the network account.
What is the function of the data owner security role?
The data owner is responsible for classifying informaiton for protection within the security solution.
What is the data custodian security role?
The data custodian is assigned the tasks of implementing the prescribed protection defined by the security policy and upper management.
What is the function of the auditor security role?
The auditor is responsible for testing and verifying that the security policy is properly implemented and the derived security solutions are adequate.
What should the documents that make up a formalised security structure include?
Policies, standards, baselines, guidelines, and procedures.
What is generally involved in the process of risk management?
Analysing an environment for risks, evaluating each risk as to its likelihood and damage, assessing the cost of countermeasures, and creating a cost/benefit report to present to upper management.
What should be considered when establishing the value of an asset?
- Cost of purchase, development, maintenance, acquisition, and protection;
- value to owners/users/competitors;
- equity value;
- market valuation;
- liability of asset loss;
- and usefulness.