Introduction Flashcards

1
Q

Define information security

A

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PCI Dss

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FISMA

A

Federal Information Security Management Act – defines security standards for many agencies in the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality

A

CIA leg
ability to protect data from those who are not authorized to view it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integrity

A

CIA leg
prevent people from changing your data in an unauthorized or undesirable manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Availability

A

CIA leg
ability to access our data when we need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Parkerian hexad

A

Donn Parker
CIA- confidentiality, integrity, availability
Authenticity
Utility
Possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authenticity

A

Parkerian hexad leg
allows you to say whether you’ve attributed data in question to proper creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Possession

A

Parkerian hexad leg
AKA control
physical disposition of the media on which the data is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Utility

A

Parkerian hexad
how useful the data is to you
Not binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality attack(s)

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity attacks

A

Interruption
Modification
Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Availability attacks

A

Interruption
Modification
Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Interception

A

Attack which allows unauthorized users to access your data, applications, or environment
Affects confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Interruption

A

Attack which makes your assets unusable or unavailable to you on a temporary or permanent basis
Affects availability and sometimes integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Modification

A

Attack that involves tampering with an asset
Primarily affects integrity but could also be availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fabrication

A

Attack that involves generating data, processes, communications within a system
Affects integrity and sometimes availability

19
Q

Threat

A

Something that has the potential to cause harm

20
Q

Vulnerability

A

Weaknesses, or holes, that threats can exploit to cause harm

21
Q

Risk

A

The likelihood that something bad will happen
Needs to have both threat and requisite vulnerability

22
Q

Impact

A

Takes into account value of the asset being threatened and uses it to calculate risk

23
Q

Risk management process

A

Identify assets
Identify threats
Assess vulnerabilities
Assess risks
Mitigate risks

24
Q

Identify assets

A

Part of risk management process – 1
Enumerate and evaluate each asset

25
Identify threats
Part of risk management process -- 2 Use CIA or Parkerian hexad to examine threats
26
Assess vulnerabilities
Part of risk management process -- 3 In context of potential threats
27
Assess risks
Part of risk management process -- 4 Vulnerabilities must have a matching threat, and vice versa, to constitute a risk
28
Mitigate risks
Part of risk management process -- 6 Put measures in place to account for each threat -- called controls
29
Control
Measure put in place to mitigate a risk
30
Control categories
Physical controls Logical controls Administrative controls
31
Physical control
Protect the physical environment in which your systems sit or your data is stored
32
Logical control
AKA technical control Protect the systems, networks, and environments that process, transmit, and store your data Ex: passwords, encryption, firewalls
33
Administrative control
Dictate how users of the environment should behave Ex: change password every 90 days Important to have ability to enforce them
34
Incident response definition
When risk management efforts fail or you are blindsided by something new
35
Incident response process
Preparation Detection and analysis Containment Eradication Recovery Post-incident activity, AKA post-mortem
36
Preparation
Part of incident response process -- 1 All the activities you can perform ahead of time to better handle an incident
37
Detection and analysis
Part of incident response process -- 2 Detect issue to see whether or not it's an incident Use tools like intrusion detection (ID), antivirus software, firewalls Combo of tool and human judgment
38
Containment
Part of incident response process -- 3 Take steps to ensure the situation causes no more damage or lessen ongoing harm
39
Eradication
Part of incident response process -- 4 Attempt to remove the effects of the issue from the environment
40
Recovery
Part of incident response process -- 4 Restore the state you were in prior to the incident
41
Post-incident activity, AKA post-mortem
Part of incident response process -- 6 Determine what happened, why it happened, and what you can do to keep it from happening again
42
Defense in depth
Formulate a multilayered defense that will allow you to still mount a successful resistance should one or more of your defensive measures fail Varies for each specific environment
43
Defense levels
External network Network perimeter Internal network Host Application Data