Module 1 Flashcards
(60 cards)
Assets
An organization resource that is being protected.
can be logical or physical
They are the focuse of what security efforts are attempting to protect
Information assets
The focus of information security
any collection, set, or database of information or any asset that collects, stores, processes, or transmits information of value to the organzation.
three groups involved in information security planning
those in the field of information security
those in the field of IT
those from the rest of the organization
Role of Information Security Community
protects the organziations information assets from the many threats they face
Role of the IT Community
supports the business objectives of the organization by supplying and supporting IT that is appropriate to the organization’s needs
role of general business community
articulates and communicates organizational policy and objectives and allocates resources to the other groups
Specialized Areas of Security
Physical
Operations
Communications
Cyber
Network
Physical Security
protection of physical items, objects, or areas from unauthorized access and misuse
operations security
The protection of the details of an organziations operations and activities.
communications security
the protection of all communications media, technology, and content
cyber security
the protection of computerized information processing systems and the data they contain and process
Network security
a subset of communications security and cybersecurity; the protection of voice and data networking components, connections, and content.
Information Security (InfoSec)
Protection of the confidentiality, integrity, and availability of informaiton assets, whether in storage, processing, or transmision, via the application of policy, education, training and awareness, and technology.
McCumber Cube
standard for understanding many aspects of infosec, and shows the three dimensions that are central to the discussion of infosec
- information characteristics
- information location
- security control categories.
The CIA Triad
key characteristic of information that make it valuable to an organization
- Confidentiality
- Integrity
- Availability
confidentiality
limiting access to informaiton only to those who need it and preventing access to those who do not.
integrity
an attribute of information that describes how data is whole, complete, and uncorrupted
Threatened when exposed to corruption, damage, destruction, or other disruption of its authentic state.
Availability
users, either people or other systems, have access to it in a usable format.
access when needed by authorized users.
privacy
the right of individuals or groups to protect themselves and thier informaiton from unauthorized access, providing confidentiality
synonym for attack
threat event
12 categories of threats to information security
- compromises to intellectual property
- Deviations in quality of service
- espionage or tresspass
- force of nature
- human error or failure
- information extortion
- sabotage and vandalism
- software attacks
- technical hardware failures and errors
- technical software failures and errors
- technological obsolescence
- theft
example of compromises to intellectual property
software piracy
copyright infringement
Examples of deviations in quality of service
internet service issues
communications and service provider issues
power irregularities
competitive intelligence
collectiion and analysis of informaiton about an organization’s business competitors through legal and ethical means to gain business intelligence and competive advantage.