Introduction Flashcards

1
Q

Define information security

A

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PCI Dss

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FISMA

A

Federal Information Security Management Act – defines security standards for many agencies in the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality

A

CIA leg
ability to protect data from those who are not authorized to view it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integrity

A

CIA leg
prevent people from changing your data in an unauthorized or undesirable manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Availability

A

CIA leg
ability to access our data when we need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Parkerian hexad

A

Donn Parker
CIA- confidentiality, integrity, availability
Authenticity
Utility
Possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authenticity

A

Parkerian hexad leg
allows you to say whether you’ve attributed data in question to proper creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Possession

A

Parkerian hexad leg
AKA control
physical disposition of the media on which the data is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Utility

A

Parkerian hexad
how useful the data is to you
Not binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality attack(s)

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity attacks

A

Interruption
Modification
Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Availability attacks

A

Interruption
Modification
Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Interception

A

Attack which allows unauthorized users to access your data, applications, or environment
Affects confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Interruption

A

Attack which makes your assets unusable or unavailable to you on a temporary or permanent basis
Affects availability and sometimes integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Modification

A

Attack that involves tampering with an asset
Primarily affects integrity but could also be availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fabrication

A

Attack that involves generating data, processes, communications within a system
Affects integrity and sometimes availability

19
Q

Threat

A

Something that has the potential to cause harm

20
Q

Vulnerability

A

Weaknesses, or holes, that threats can exploit to cause harm

21
Q

Risk

A

The likelihood that something bad will happen
Needs to have both threat and requisite vulnerability

22
Q

Impact

A

Takes into account value of the asset being threatened and uses it to calculate risk

23
Q

Risk management process

A

Identify assets
Identify threats
Assess vulnerabilities
Assess risks
Mitigate risks

24
Q

Identify assets

A

Part of risk management process – 1
Enumerate and evaluate each asset

25
Q

Identify threats

A

Part of risk management process – 2
Use CIA or Parkerian hexad to examine threats

26
Q

Assess vulnerabilities

A

Part of risk management process – 3
In context of potential threats

27
Q

Assess risks

A

Part of risk management process – 4
Vulnerabilities must have a matching threat, and vice versa, to constitute a risk

28
Q

Mitigate risks

A

Part of risk management process – 6
Put measures in place to account for each threat – called controls

29
Q

Control

A

Measure put in place to mitigate a risk

30
Q

Control categories

A

Physical controls
Logical controls
Administrative controls

31
Q

Physical control

A

Protect the physical environment in which your systems sit or your data is stored

32
Q

Logical control

A

AKA technical control
Protect the systems, networks, and environments that process, transmit, and store your data
Ex: passwords, encryption, firewalls

33
Q

Administrative control

A

Dictate how users of the environment should behave
Ex: change password every 90 days
Important to have ability to enforce them

34
Q

Incident response definition

A

When risk management efforts fail or you are blindsided by something new

35
Q

Incident response process

A

Preparation
Detection and analysis
Containment
Eradication
Recovery
Post-incident activity, AKA post-mortem

36
Q

Preparation

A

Part of incident response process – 1
All the activities you can perform ahead of time to better handle an incident

37
Q

Detection and analysis

A

Part of incident response process – 2
Detect issue to see whether or not it’s an incident
Use tools like intrusion detection (ID), antivirus software, firewalls
Combo of tool and human judgment

38
Q

Containment

A

Part of incident response process – 3
Take steps to ensure the situation causes no more damage or lessen ongoing harm

39
Q

Eradication

A

Part of incident response process – 4
Attempt to remove the effects of the issue from the environment

40
Q

Recovery

A

Part of incident response process – 4
Restore the state you were in prior to the incident

41
Q

Post-incident activity, AKA post-mortem

A

Part of incident response process – 6
Determine what happened, why it happened, and what you can do to keep it from happening again

42
Q

Defense in depth

A

Formulate a multilayered defense that will allow you to still mount a successful resistance should one or more of your defensive measures fail
Varies for each specific environment

43
Q

Defense levels

A

External network
Network perimeter
Internal network
Host
Application
Data