Module 1 Flashcards

1.1: Analyze the current landscape of information assurance and computer security. 1.2: Evaluate trends in information assurance and computer security. 1.3: Determine the importance of security in the IT industry and its impacts across other fields. 1.4: Execute security principles and strategies. 1.5: Analyze security principles and strategies. 1.6: List bad security practices that are commonly observed in daily life. 1.7: Explain which security principles bad practices are breaking (48 cards)

1
Q

What are the challenges of Cyber Security?

A

System availability, data integrity, and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information Assurance?

A

An application that encompasses scientific, technical, and management disciplines that are required to ensure information security and quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the forms of information?

A

Hard copy, soft copy, records of meetings, telephone conversations, video conferences, and personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the states of information?

A

Transmitted, Processed, and stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the components of information security?

A

Confidentiality, Integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a threat?

A

A potential occurrence that can have undesirable effect on system assets or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the threat categories?

A

Disclosure, Deception, Disruption, and Usurpation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is vulnerability?

A

a weakness that makes it possible for a threat to occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the Information Characteristics?

A

Authentication, Non-repudiation, secrecy, and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Authentication?

A

Validity of transmission, message, originator, or means of verifying an individuals means of authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is Non-repudiation

A

Assurance that sender of data is provided with proof of delivery to recipient, and recipient is provided with proof of sender Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is Secrecy?

A

Cryptography and computer access control. Limits the number of principals who can access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is Privacy?

A

The ability/right to protect private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is confidentiality?

A

Determines the secrecy of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the confidentiality principles

A
  1. need to know
  2. data sep
  3. compartmentalization
  4. classification
  5. encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the weakest link?

A

Security is only as strong as the weakest link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the security strategies

A

obscurity, perimeter defence, defence in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Defence in depth

A

A number of IA layers of defence that are operationally interoperable an complementary technical and non-technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

enclave

A

an env under control of a single authority with personal and physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the make up of defence in depth?

A

1.perimeter def around each enclave
2. multiple complicated connections between an enclave and outside
3. multiple layers and a diff solution req for each connection

21
Q

What is the general layered arch model for defence in depth?

A

layer 1: IA policies
layer 2: IA management
layer 3: AI architecture (Technical IA infrast)
layer 4-10: non-technical implementation

22
Q

what does layer 3 in layered arch model ensure?

A

ensures the minimal level of interoperability and services are available to authorized users.

23
Q

How many and what types of levels of security does layer 3 implement?

A
  1. physical ,procedural, and logical security
24
Q

what is L4 in layered arch model

A

operational security administration

25
what is L5 in layered arch model
config management
26
what is L6 in layered arch model
life-cycle security
27
what is L7 in layered arch model
contingency planning
28
what is L8 in layered arch model
IA education/training
29
what is L9 in layered arch model
policy compliance oversight
30
what is L10 in layered arch model
IA incident responce and reporting
31
what is mission assurance?
to identify and mitigate design, prod, test, and field support deficiencies
32
how does the conflication between IA an mission assurance be averted?
1. by protecting the infra and data 2. securely sharing information with auth individuals
33
what is MAC?
mission assurance categories
34
what is Mac 1?
systems that handle infor most critical to operations
35
what is Mac 2?
systems that handle info that supports most critical operations- loss can be tolerated
36
what is Mac 3?
infor that is necessary for day to day operations
37
what is risk?
something that may happen in the future
38
what are the vulnerability categories?
design, implementation, and deployment
39
what are design vulnerabilities?
flaws in logic -most difficult to identify b/c they require clear understanding of material
40
what are implementation vulnerabilities
incorrectly handled unexpected inputs
41
what are deployment vulnerabilities
incorrect or faulty deployments of application (i.e weak passwords)
42
what is risk management?
dealing with risks in cost effective manner- rather than avoiding risks at all costs
43
what are the 3 risk choices?
Acceptance, reduction, and transfer
44
What is IA policy?
High level statements of goals of procedures for information assurance
45
What are the IA policy enforcement mechanisms?
Inform/explain/document technical procedural (security auditing)
46
What is a security policy
A statment that partitions the states of the system into a set of auth/secure and unath/insecure states
47
Do IA policies include security policies/
yes
48
How to establish IA policies?
1. secure strong management support 2. gather key data 3. define framework 4. structure procedures 5. perform risk assessment