Domain 1 - Chapter 1 - Security Governance Through Principles & Policies Flashcards
(44 cards)
What are the primary goals and objectives of a security infrastructure?
Confidentiality, integrity, and availability.
What is confidentiality?
Protection of the secrecy of data, objects, or resources.
What are the concepts, conditions, and aspects of confidentiality?
Sensitivity, discretion, criticality, concealment, secrecy, privacy, seclusion, & isolation.
What is integrity?
Protecting the reliability and correctness of data.
Prevents unauthorized alterations of data.
What is integrity is dependent on?
Confidentiality and access control
What are the concepts, conditions, and aspects of integrity?
Accuracy, truthfulness, validity, accountability, responsibility, completeness, & comprehensiveness.
What is availability?
Principles that authorized subjects are granted timely and uninterrupted access to objects.
What is availability is dependent on?
Integrity and confidentiality
What are the concepts, conditions, and aspects of availability?
Usability, accessibility, timeliness.
What is the opposite of the CIA Triad?
DAD
Disclosure, alteration, & destruction
DAD triad represents the failures of security protections in the CIA Triade.
Overprotecting confidentiality can result in?
Restriction of availability
Overprotecting integrity can result in?
Restriction of availability
Overproviding in availability can result in?
Loss of confidentiality and integrity
What is the core security mechanisms for all security environments?
IAAAA
Identification - Claiming to be an identity when attempting access to a secured area or system
Authentication - Proving that you are that claimed identity
Authorization - Defining permissions of a resource and object access
Auditing - Recording log events and activities related to systems and objects
Accounting - Reviewing log files to check for compliance and violations.
What are four types of protection mechanisms?
Defense in depth
Abstraction
Data Hiding
Encryption
What is security governance?
Collection of practices related to supporting, evaluating, defining, and directing the security elements of a organization.
Who is responsible for security management?
Upper Management
What is the length of time for a strategic plan?
Long-term plan that is fairly stable. ~5 years
What is the length of time for a tactical plan?
Mid-term plan developed to provide more details on a accomplishing the goals set forth in the strategic plan. ~1 year
What is the length of time for an operational plan?
Short-term plan that is highly detailed based on strategic and tactical plans. ~Monthly or Quarterly
Security governance should address ______ ?
every aspect of an organization, including the organizational processes of acquisitions, divestitures, and governance committees.
What processes should be considered when evaluating a third party security integration?
On-site assessment
Document Exchange Review
Process/Policy Review
Third-Party Review
What is a security role?
The part an individual plays in the overall scheme of security implementations and administration within an organization.
List common security roles present in a typical secured environment?
Senior Manager -
Security Professional -
Asset Owner -
Custodian -
User -