Domain 1 - Security and Risk Management COPY Flashcards
(228 cards)
what is CIA
confidentiality
integrity
availability
what are we protecting when we are talking about integrity
ensuring there is no unauthorized modifications to the data or systems (no data has been altered)
what are we protecting when we are talking about availability
authorized persons have access to the data or system at a reasonable amount of time
what are we protecting with confidentiality
only authorized persons or systems have access to the data when they need it
tools that are used to ensure confidentiality
- encryption for data at rest (example AES256)
- secure transport protocols (SSL, TLS, IPSEC)
- best security practice for data in use ( clean desk, no shoulder surfing, screen view protector, pc locking policy,
- strong passwords, multi-factor authentication, masking data entry, access controls, need-to-know, least privilege
threats to confidentiality
- attacks on encryption (cryptanalyst)
- social engineering
- key loggers (software/hardware), cameras, steganography
- IOT (internet of things) the numbers of these items pose a threat. less secure, most are not updated, can be used as backdoors to other systems
what software/tools can we use to ensure integrity
- cryptography (again)
- check sums (this could be CRC)
- message digest (hash) this could be MD5, SHA1 or SHA2
- digital signatures
- access control
examples of threats to integrity
- alteration of our data
- code injection
- attacks on your encryption (cryptanalysis)
tools used to ensure availability
- IPS/IDS
- Patch management
- redundancy (multiple power supplies/UPS’s/generators), disks (raid), traffic paths(network design), HVAC, staff, HA and more
- SLA’s - how much uptime do we want (what is that cost?)
threats to availability
- malicious attacks (DDOS, physical, system compromise, staff)
- application failures (errors in the code)
- component failure (hardware)
what does IAAA stand for
identification
authentication
authorization
accountability (monitoring/logging)
what is Identification
you name, username, serial number, id number, employee number
“I am XXXX”
what is authentication
proving you are who you say you are (always should be multifactor)
what is Type 1 authentication
something you know -Type 1 Authentication: (passwords, pass phrase, PIN, etc.)
what is type 2 authentication
something you have -Type 2 Authentication: (ID, passport, smart card, token, cookies on PC, one time password (OTP) etc. )
what is type 3 authentication
something you are - Type 3 Authentication: (biometrics) fingerprint, iris scan, facial geometry, etc)
what is the opposite of CIA
Disclosure - (confidentiality)
destruction - (availability)
alteration - (integrity)
formula for risk
risk = threat X vulnerability
Sometimes an added variable of impact is added
Risk = threat x vulnerability x impact
if there is a vulnerability but no threat towards that vulnerability, is there risk?
no
if there is not threat towards the vulnerability there is not current risk
what is authorization?
- what you are allowed to access
2. access control models ( DAC, MAC, RBAC(role based access), RUBAC(rule based access))
what is the last A in IAAA
accountability -
- auditing(logs)
- prove who/what a given action was performed by (non-repudiation)
explain least privilege
- give users/system exactly the access they need, no more
explain need to know
- you are generally given more access than you need(in a need to know environment) but if you do not have a need then you should not be accessing that data.
example: doctors, they need to have access to all patients but if they are not their patients the do not have the need to access their data
what is non-repudiation and what two functions are used to provide it
- can not deny having performed a certain action
- authentication
- integrity