Study Guide Ch 1 Flashcards

(48 cards)

1
Q

Confidentiality

A

the principle that objects are not disclosed to unauthorized subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

the principle that objects retain their veracity and are intentionally modified by only authorized subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

the principle that authorized subjects are granted timely and uninterrupted access to object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Countermeasures for confidentiality include:

A

encryption,
network traffic padding, strict access control, rigorous authentication procedures,
data classification,
extensive personnel training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacks against confidentiality include:

A
capturing network traffic stealing password files 
social engineering, 
port scanning, 
shoulder surfing, eavesdropping, 
sniffing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mechanisms which support integrity include:

A

controls which restrict access to data, objects, and resources

activity logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacks against integrity include:

A

viruses, logic bombs, unauthorized access,
errors in coding and applications,
malicious modification, intentional replacement,
and system back doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Countermeasures for maintaining integrity

A

strict access control, rigorous authentication procedures,
intrusion detection systems, object/data encryption, hash total verification, interface restrictions, input/function checks,
and extensive personnel training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

threats to availability

A

device failure,

software errors,

environmental issues,

DoS attacks,

object destruction,

communication interruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Availability countermeasures include:

A

monitoring performance and network traffic,

using firewalls and routers to prevent DoS attacks,

implementing redundancy for critical systems,

maintaining and testing backup systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identification

A

the process by which a subject professes an identity and accountability is initiated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does identification work?

A

Providing an identity can involve typing in a username; swiping a smart card; waving a proximity device, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication

A

The process of verifying or testing that the claimed identity is valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does authentication work?

A

Authentication verifies the identity of the subject by comparing one or more factors against the database of valid identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorization

A

defining the allows and denials of resource and object access for a specific identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Auditing

A

the programmatic means by which a subject’s actions are tracked and recorded for the purpose of holding the subject accountable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the enforcement of the security policy depend on?

A

An organization’s security policy can be properly enforced only if accountability is maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Non repudiation

A

Non repudiation ensures that the subject of an activity or event cannot deny that the event occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is security management based on?

A

Strategic, tactical and operational planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Strategic Plan

A

a long-term plan that is fairly stable and defines the goals, mission and objectives of the organization

21
Q

Tactical plan

A

a midterm plan developed to provide more details on accomplishing the goals set forth in the strategic plan

22
Q

Operational Plan

A

a short-term, highly detailed plan based on the strategic and tactical plans.

23
Q

Elements of a formal security policy structure

A
security policy, 
standards, 
baselines, 
guidelines, 
and procedures
24
Q

The primary security roles

A
senior manager, organizational owner, 
upper management, 
security professional, 
user, data owner, 
data custodian, 
auditor
25
Senior manager
ultimately responsible for the security maintained by an organization
26
Security professional
has the functional responsibility for security, including writing the security policy and implementing it
27
Data Owner
the person who is responsible for classifying information
28
Data Custodian
the user who is responsible for the tasks of implementing the prescribed protection defined by the security policy and senior management
29
User
assigned to any person who has access to the secured system
30
Auditor
responsible for reviewing and verifying that the security policy is properly implemented
31
How does education fit into the security processes of an organization?
Education is a more detailed endeavor in which students/users learn much more than they actually need to know to perform their work tasks
32
What is layering?
the use of multiple controls in series
33
Define data hiding
preventing data from being discovered or accessed by a subject
34
Abstraction
Abstraction is used to collect similar elements into groups, classes, or roles
35
Encryption
Encryption is the art and science of hiding the meaning or intent of a communication from unintended recipients
36
benefits of using a data classification scheme
* It demonstrates an organization's commitment to protecting valuable resources and assets. * It assists in identifying those assets that are most critical or valuable to the organization. * It lends credence to the selection of protection mechanisms. * It is often required for regulatory compliance or legal restrictions. * It helps to define access levels, types of authorized uses, and parameters for declassification and/or destruction of resources that are no longer valuable. * It helps with data life-cycle management
37
Benefits of change management
* Changes are always controlled. * A formalized testing process * All changes can be reversed * Users are informed of changes before they occur * The effects of changes are systematically analyzed. * The negative impact of changes on capabilities, functionality, and performance is minimized. * Changes are reviewed and approved by a CAB (change approval board).
38
The goal of change management
to ensure that any change does not lead to reduced or compromised security
39
Data classification
the process of organizing items, objects, subjects into categories
40
Government data classification scheme
``` Top Secret Secret Confidential SBU Unclassified ```
41
Commercial data classification scheme
Confidential Private Sensitive Public
42
Define Threat modeling
the security process where potential threats are identified, categorized, and analyzed
43
3 Approaches to Identifying Threats
Focused on Assets Focused on Attackers Focused on Software
44
STRIDE
``` Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege ```
45
Threat modeling steps
Identify threats Diagram Reduce/Decompose Prioritize/Mitigation
46
The DREAD rating system
``` Damage potential Reproducibility Exploitability Affected users Discoverability ```
47
COBIT
Control Objectives for Information and Related Technology
48
Data Hiding
preventing data from being discovered or accessed by positioning the data in a logical storage compartment that is not accessible