D1: Security & Risk Management Flashcards
(178 cards)
CIA
Confidentiality
Integrity
Availability
Confidentiality
Confidentiality prevents the unauthorized disclosure of data
Confidentiality assures least privilege and need to know
Integrity
Integrity assures no unauthorized modification is made to data from unintentional or malicious actions
Availability
Reliability assures that systems and data is reliable and timely, accessible, fault tolerant and has recovery procedures in place.
IAAA
Requirements for accountability
Identification: when a user claims their identity; used for access control
Authentication: testing a user’s identity via evidence
Accountability: associates actions to the person committing
Authorization: the rights an permissions provided to a person
Privacy
Level of confidentiality and privacy protections
An Organization’s Relationship with Risk
While it’s impossible to eliminate all risk, it’s important to get risk at an acceptable/tolerable level
A popular risk management framework is ISO 27005
To track risk, create baselines - the minimum standards
To reduce/prevent risk, and the budget is not constrained, spend more money on better tools
Responsibilities of ISO
- Documentation
- Computer Incident Response Team
- Security Awareness
- Communicate risk to upper management, as high as possible
- Educate organization that security is everyone’s responsibility
Control Framework Requirements
Consistent with approach & application Measurable ways to determine progress Standardized in one format Comprehension - covers end to end Modular - adaptive, layered and abstraction
Due Care
When an organization did all that it could have reasonably done to try and prevent security breach / compromise / disaster, and took the necessary steps as countermeasures / controls (safeguards).
The benefit of due care can be seen as the difference between the damage with or without safeguards in place - AKA doing something about the threats.
Failing to perform periodic security audits can result in the perception that due care is not being maintained.
Due Diligence
When an organization properly investigated all of its possible weaknesses and vulnerabilities AKA understanding threats
Patent Law
Patent law grants ownership of an invention and provides enforcement for owner to exclude others from practicing the invention
After 20 years the idea is open source of application
Copyright Law
Copyright law protects the expression of ideas but not necessarily the idea itself
Trade Secret
Something that is proprietary to a company and important for its survival and profitability (like formula of Coke)
No application to register?
Trademarks
Trademarks are words, names, product shape, symbol, color or a combination used to identify products and distinguish them from competitor products (McDonald’s M)
@10 Years
Wassenaar Agreement (WA)
Dual use goods & trade
International cryptographic agreement, prevent destabilizing
Computer Crimes
loss, image, penalties???
SOX - Sarbanes Oxley
Implemented in 2002 after ENRON and World Online
Requires independent review by contractors
Section 302: CEO’s and CFO’s can be sent to jail when information they sign is incorrect
Section 404: Requires internal controls assessment; describe logical controls over accounting files, good auditing and information security
COSO - framework for SOX 404 compliance
Corporate Officer Liability
Executives are held liable if the organization they represent is not compliant with the law
Negligence occurs if there is a failure to implement recommended precautions e.g. disaster recovery plan, background checks, information security, policy, laws and regulations
Treadway commission
???
COSO
Strong in anti-spam and legit marketing
Directs public directories to be subjected to tight controls
Takes an OPT-IN approach to unsolicited commercial electronic communications
User may refuse cookies to be stored, and user must be provided with information
Member states in the EU can make own laws e.g. retention of data
Incident
An event that has potential to do harm
Breach
An incident that results in disclosure or potential disclosure of data
Data Disclosure
Unauthorized acquisition of personal information