Mod 1 Flashcards
(28 cards)
Define security
A state of freedom from a danger or risk
What are the 3 security dimensions? (C.I.A)
Confidentiality
Integrity
Availability
Define confidentiality
information in the system that may be disclosed to unauthorized party
Define integrity
the data received has to be the original data intended and has not been manipulated
Define availability
information and computing resources can be obtained according to a quality service definition
What are the tools for confidentiality?
Encryption
Access control
Authentication
Authorization
Define encryption
transformation of information using a secret encryption key so that it can only be read using the same decryption key
Define access control
rules and policies that limit access to confidential information to those who need to know
Define authentication
a determination of identity based on a combination of
- something the actor has (keys)
- something the actor knows (passwords)
- something the agent is (biometrics)
Define authorization
a determination if an actor is allowed access to resources based on an access control policy
What are the tools for integrity?
(3)
Backups
Checksums
Data Correcting Codes
What are the tools for availability?
Physical protections
Computational redundancies
Define asset
something of value which has to be protected
Define attack / exploit
an abuse of a system’s vulnerability
Define control
mitigation measure that reduces a system’s vulnerability
Define exposure
possible loss or harm to a computing system
Define threat
circumstances that have potential to cause loss or harm
Define vulnerability
a weakness in a computer system that may be expoited to cause loss or harm
Define risk
the likelihood that a threat agent will exploit a vulnerability
What are the 4 goals of security policies?
Identify organizational assets that need protecting
Define the level of protection/recovery needed for different assets
Define responsiblilities of individuals
Include security procedures & technologies to be maintained
Give examples of the different scopes/tiers of a security policy (3)
Global - addresses everyone and everything
Specific topic - addresses special issues of current relevance
App specific - addresses a specific app/function/system
Give examples of security policies
Acceptable Use Policy
Security-Related Human Resource Policy
Password Management Policy
Personal Identifiable Information Policy
Disposal and Destruction Policy
Classification of Information Policy
Ethics Policy
What does an Acceptable Use Policy define?
Actions a user may perform while accessing systems and networking equipment, as well as explicit prohibitions regarding security
What is generally considered to be the most important information security policy?
Acceptable Use Policy