hh Flashcards
(66 cards)
“The quality or state of being secure—to be free from danger”
Security
Security
Types of security
Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security
Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security
Critical Characteristics of Information
Availability
– Accuracy
– Authenticity
– Confidentiality
– Integrity
– Utility
– Possession
Availability
– Accuracy
– Authenticity
– Confidentiality
– Integrity
– Utility
– Possession
Components of an Information System
Software
– Hardware
– Data
– People
– Procedures
– Network
Software
– Hardware
– Data
– People
– Procedures
– Network
SDLC
Systems Development Life Cycle
Systems Development Life Cycle
methodology for design and implementation of information system within an organization
Systems Development Life Cycle (SDLC):
Methodology
SLDC 6 general phrases
Investigation
Analysis
Logical design
Physical design
Implementation
Maintenance and change
Investigation
Analysis
Logical design
Physical design
Implementation
Maintenance and change
Preliminary cost-benefit analysis is developed
Investigation
determine what new system is expected to do and how it will interact with existing systems
determine what new system is expected to do and how it will interact with existing systems
Analysis
Data support and structures capable of providing the needed inputs are identified
Creates and develops blueprints for information security
Data support and structures capable of providing the needed inputs are identified
Logical Design
Technologies to support the alternatives identified and evaluated in the logical design are selected
Components evaluated on make-or-buy decision
Technologies to support the alternatives identified and evaluated in the logical design are selected
Physical Design
Needed software created
Components ordered, received, and tested
Users trained and documentation created
Needed software created
Implementation
Longest and most expensive phase
Consists of tasks necessary to support and modify system for remainder of its useful life
Longest and most expensive phase
Maintenance and Change
Maintenance and Change
Information Security Project Team
- A number of individuals who are experienced in one or more facets of required technical and nontechnical areas:
– Champion
– Team leader
– Security policy developers
– Risk assessment specialists
– Security professionals
– Systems administrators
– End user
responsible for the security and use of a particular set of information
responsible for the security and use of a particular set of information
Data owner
ownership of ideas and control over the tangible or virtual representation of those ideas
responsible for storage, maintenance, and protection of information
Data custodian
responsible for storage, maintenance, and protection of information
end users who work with information to perform their daily jobs supporting the mission of the organization
Data users
end users who work with information to perform their daily jobs supporting the mission of the organization
an object, person, or other entity that represents a constant danger to an asset
Threat
an object, person, or other entity that represents a constant danger to an asset
control over tangible/virtual ownership of ideas
Intellectual property (IP):
Intellectual property (IP):
Malware attacks
Viruses
– Worms
– Trojan horses
– Logic bombs
– Back door or trap door
– Polymorphic threats
– Virus and worm hoaxes
Develops software scripts and program exploits
Usually a master of many skills
Will often create attack software and share with others
Develops software scripts and program exploits
Expert hacker
Many more unskilled hackers than expert hackers
Use expertly written software to exploit a system
Do not usually fully understand the systems they hack
Many more unskilled hackers than expert hackers
TRUE
Unskilled hacker
“cracks” or removes software protection designed to prevent unauthorized duplication
Cracker
hacks the public telephone network
Phreaker