Security Governance Flashcards
(52 cards)
What are the three parts of the CIA triad ?
Confidentiality, Integrity and Availability
What is the Confidentiality part of the CIA Triad ?
Ensures sensitive information is only seen by authorised users.
What are the three controls that ensure confidentiality ?
Encryption, Access Controls, Steganography
What are the eight most common attacks that breech Confidentiality ?
Sniffing, Shoulder Surfing, Stealing Password files, Capturing Network Traffic, Social Engineering, Port Scanning, Eavesdropping and Escalation of Privileges
What are the six countermeasures to ensure confidentiality ?
Encryption, Network Traffic Padding, Strong Access Control, Strict authentication procedures, Data classification, Personnel Training
What are the four components of Confidentiality ?
Sensitivity, Discretion, Criticality, Concealment, Secrecy, Privacy, Seclusion, Isolation
What is the Integrity part of the CIA triad ?
Refers to the prevention of unauthorised alterations to the data.
Integrity ensures that data is _ _ _
Unaltered, Preserved Correct
Besides encryption what other counter measures can be used to preserve integrity ?
Hashing
What is the availability part of the CIA triad ?
Ensuring that resources are available to access whenever those authorised to do so need to.
What are the three most common threats to availability ?
DOS, Human Error, Natural Disaster
Name three common countermeasures for availability attacks
DOS mitigation and load balancers, backups and high fault tolerance
What is identification ?
The process by which an individual submits proof of their identity to the system.
What is authentication ?
The process by which the system checks and verifies the provided identity.
What is authorisation ?
The set of permissions given to a user of the system
What is auditing ?
Tracking and recording user activity to find out any anomalies in behaviour.
What is the difference between monitoring and auditing ?
Monitoring doesnt record unlike auditing
What is accounting ?
Linking user activity to identity
What is threat modelling ?
Identifying all possible threats to a system so that they can be categorized and analyzed
What does the phrase threat modelling is proactive mean ?
You are attempting to find and fix issue before they arise.
What are the two categories of threats in threat modelling ?
Internal and External
Where is the highest risks within threat modelling ?
Internal
What are the seven stages of threat analysis ?
Definition of Objectives (DO), Definition of Technical Scope (DTS), Application Decomposition and Analysis (ADA), Threat Analysis (TA), Weakness and Vulnerability Analysis (WVA), Attack Modelling and Simulation (AMS), Risk Analysis and Management (RAM)
What is the main threat modelling scheme for application threats ?
STRIDE - Spoofing, Tampering, Repudiation, Information Disclosure, DOS and Elevation of Privelege