notes Flashcards
(64 cards)
CIA Triad stands for
Confidentiality, Integrity, Availability
Confidentiality:
People can’t see things they shouldn’t
Integrity:
Information cannot be modified or corrupted by unauthorised parties or system limitations
Availability:
Information is available when needed - The secure information needs to be available to the right people and when those people need to access it
High and low confidentiality:
High: Encrypted
Low: Open on the web
High and low integrity:
High: carved in stone
Low: it’s on a wiki that anyone can edit
Authentication:
Techniques for deciding that someone is who they say they are: passwords, biometrics etc
Acess controls and permissions:
Techniques for deciding that given someone has a particular identity, that identity can only see what they need to see
Access control elements:
Identification - claimed identity
Authentication - verifies identity
Authorization - granted access based on proven identity
Accountability - held accountable for actions
Administrative access controls
Refers to institutional policies and procedures
Things like hiring, supervision, personnel controls and testing
Physical controls
Methods to prevent, monitor or detect direct contact with systems or areas in a facility
Such as guards, fences, motion detection, locked doors, sealed windows etc.
Logical/Technical controls
Refers to hardware/software mechanisms used
Such as authentication systems, encryption, protocols, firewalls etc
Security protocols: need to know
Only allowed access to what is needed
Security protocols: Least privilege
Ensure only granted privileges needed to operate as intended
Security protocols: separation of duties
Sensitive functions split between individuals, preventing fraud and errors
Discretionary access control
Access based on identity membership
Non-discretionary access control
Controls for whole systems controlled by an administrator
Rule based access control
Set of rules, filters or restrictions controlling access
Lattice based access control
Objects are given security labels and users are assigned a clearance level
Centralised access control
All access controlled by a single entity:
- Lower admin overheads
- Easier for a small team
- Easier to maintain consistency
Decentralised access control
Various entities within the system perform access control:
- Requires more work to maintain integrity
- Sustainable for large systems
- Joins can be hidden from user with security bridges and single sign on
Signatures:
Means of recording who has created or modified a file or piece of data
Checksums
Determine whether a file has been modified
Hash functions allow for verification of a file
Auditability
Logging by OS, router or firewall, intrusion detection system or packet capture