Security and Risk Management Flashcards
(118 cards)
5 Pillars of information security
- Confidentiality: Secure read access
- Integrity: Secure write access
- Availability: Systems are available for normal business use
- Authenticity: Proving an identity claim
- Nonrepudiation: The combination of integrity and authenticity
CIA Opposite
Disclosure, Alteration, Destruction
Confidentiality (opp Disclosure)
Aims to prevent the unauthorized disclosure of information
Integrity ( Opp Alteration)
Focuses on the prevention of unauthorized modification of assets.
Applies to both data and systems
Malware installation would be a violation of a system’s integrity
Availability (Opp Destruction)
Ensures that required access to resources remains possible
Ransomware and denial of service(DoS) attacks represent breaches of availability
Privacy
defined as confidentiality and protection of PII
Identification
Provides a weak and unproven claim of identity
providing a username - an example of identification
Authenticity
serves as proof a user’s identity claim is legitimate
strong authentication implies higher integrity means of proof
Nonrepudiation
Combination of integrity and authenticity
Eg: proving a user signed a contract, while also proving that the contract was not subsequently altered
Authorization
proceeds after successful authentication and determines what the authenticated user can do
Accounting
details the interactions performed by individuals
Audit logs could be generated for accountability / documented actions
4 main categories of authentication
something you know
something you have
something you are
someplace you are (GPS ) - SANS
Two-factor or multi-factor authentication
using 2 of the categories
PoLP
Principle of least privilege(PoLP) known as Min necessary access
fundamental principle of security
Any additional rights, permissions, privileges, or entitlements violate this principle
Separation of Duties (SoD)
Goal of SoD is to limit risk associated with critical functions/transactions
Risk is mitigated by requireing two parties to perform what one person could
Eg: Requiring multiple individuals to sign a check (financial transactions)
Rotation of duties
Another policy for fraud deterrence/detection
- force other people to be in charge of key tasks
eg: printing payroll checks
Due Care and Due Deligence
Due Care: acting as any reasonable person would (referred to as prudent man rule)
Due diligence: practices to processes that ensure the decided upon standard of care is maintained
types of controls
preventive :deny unauthorised access to resources
detective: tries to detect that ther eis a pbm after an attack
corrective: reacts to an attack
deterrent: discourages security violations
recovery : restores after an attack/failure
compensating: used to shore up existing controls deficiencies
controls implemented across
Administrative : Background checks, policies n procedures
Technical: Encryption, smart cards
Physical: Locks, security laptops n magnetic media, protection of cable
detective control eg
eg: Auditing and IDS (Intrusion detection system)
CCTV, Motion sensors
preventive n deterrent control difference
eg: preventive control will not allow a user to violate the security policy
deterrent control will present a banner indicating not legal to use , but not orevent: eg: no trespassing sign
NIST SP 800-30
Risk mgmt guide for information technology systems
Asset Identification and Evaluation
understanding assets is key to effective risk analysis
inventory assets and assess their role in the org
Evaluate the asset value
understand how uncertain the data obtained is
Risk
Risk = Threat * Vulnerability