Podcast
Questions and Answers
Which scenario exemplifies a failure in confidentiality involving data access?
Which scenario exemplifies a failure in confidentiality involving data access?
- A programmer debugging code.
- A system administrator backing up a database.
- An authorized user accessing data they are not permitted to view. (correct)
- An authorized employee accessing their own salary information.
In the context of data confidentiality, what does the policy definition 'Who + What + How = Yes/No' represent?
In the context of data confidentiality, what does the policy definition 'Who + What + How = Yes/No' represent?
- A mathematical representation of data encryption.
- A method for auditing data modification logs.
- A framework for determining access control decisions. (correct)
- A strategy for classifying data sensitivity levels.
An organization is implementing measures to protect confidential information. Which of the following is a comprehensive approach that addresses various aspects of confidentiality?
An organization is implementing measures to protect confidential information. Which of the following is a comprehensive approach that addresses various aspects of confidentiality?
- Restricting physical access to the server room.
- Implementing a strict password policy for all user accounts.
- Installing the latest antivirus software on all computers.
- Combining information classification, secure storage, security policies, and user education. (correct)
What is the primary purpose of encrypting sensitive data, both at rest and in transit, in the context of information confidentiality?
What is the primary purpose of encrypting sensitive data, both at rest and in transit, in the context of information confidentiality?
Which action would NOT be considered a best practice for maintaining information confidentiality?
Which action would NOT be considered a best practice for maintaining information confidentiality?
An organization implements role-based access control (RBAC) and multi-factor authentication. Which requirement of information confidentiality is being addressed?
An organization implements role-based access control (RBAC) and multi-factor authentication. Which requirement of information confidentiality is being addressed?
Which data masking technique replaces sensitive data with similar, but non-sensitive data?
Which data masking technique replaces sensitive data with similar, but non-sensitive data?
What is the primary goal of ensuring data integrity?
What is the primary goal of ensuring data integrity?
During data transmission, what can threaten the integrity of information?
During data transmission, what can threaten the integrity of information?
Besides file size, what is another method for detecting viruses or worms?
Besides file size, what is another method for detecting viruses or worms?
In the command certutil -hashfile "path/to/your/file.txt" MD5
, what does MD5
specify?
In the command certutil -hashfile "path/to/your/file.txt" MD5
, what does MD5
specify?
Which of the following is an example of maintaining data integrity?
Which of the following is an example of maintaining data integrity?
What does ensuring 'availability' of information primarily guarantee?
What does ensuring 'availability' of information primarily guarantee?
Which practice primarily ensures the availability of an information system during adverse conditions?
Which practice primarily ensures the availability of an information system during adverse conditions?
What is the main purpose of having clearly defined disaster recovery plans?
What is the main purpose of having clearly defined disaster recovery plans?
Why is establishing incident response protocols crucial for maintaining IT security?
Why is establishing incident response protocols crucial for maintaining IT security?
What is the primary function of 'authenticity' in the context of data and file transfers?
What is the primary function of 'authenticity' in the context of data and file transfers?
Which of the following is an example of a strong authentication protocol used for user verification?
Which of the following is an example of a strong authentication protocol used for user verification?
How do authorization levels contribute to data security?
How do authorization levels contribute to data security?
Why should desktop documents be filed in an organized manner?
Why should desktop documents be filed in an organized manner?
What is a significant risk associated with sharing sensitive data via email?
What is a significant risk associated with sharing sensitive data via email?
Which of the following best describes the purpose of implementing roles and permissions within a system's authorization level?
Which of the following best describes the purpose of implementing roles and permissions within a system's authorization level?
What is the primary function of a 'Privilege List' in the context of system security?
What is the primary function of a 'Privilege List' in the context of system security?
In the context of security, what does non-repudiation ensure?
In the context of security, what does non-repudiation ensure?
A customer digitally signs a transaction using their private key. How does the merchant verify this signature to ensure non-repudiation?
A customer digitally signs a transaction using their private key. How does the merchant verify this signature to ensure non-repudiation?
Which of the following is NOT a key requirement for achieving non-repudiation?
Which of the following is NOT a key requirement for achieving non-repudiation?
Why is time-stamping important for non-repudiation requirements?
Why is time-stamping important for non-repudiation requirements?
In what scenario is non-repudiation particularly important?
In what scenario is non-repudiation particularly important?
What type of storage facility is recommended for maintaining log records to support non-repudiation, and why?
What type of storage facility is recommended for maintaining log records to support non-repudiation, and why?
Which security property ensures that information is ready for use and at the required performance level when needed?
Which security property ensures that information is ready for use and at the required performance level when needed?
What is the primary goal of 'authentication' as a security property?
What is the primary goal of 'authentication' as a security property?
Which of the following scenarios best illustrates a violation of the 'Confidentiality' pillar of information security?
Which of the following scenarios best illustrates a violation of the 'Confidentiality' pillar of information security?
A company implements a system where all data modifications require approval from two designated employees. Which pillar of information security is this practice primarily intended to uphold?
A company implements a system where all data modifications require approval from two designated employees. Which pillar of information security is this practice primarily intended to uphold?
Which of the following best describes the concept of 'Non-Repudiation' in the context of information security?
Which of the following best describes the concept of 'Non-Repudiation' in the context of information security?
A hospital's IT department implements redundant servers and backup power systems. Which of the five pillars of information security is being MOST directly addressed?
A hospital's IT department implements redundant servers and backup power systems. Which of the five pillars of information security is being MOST directly addressed?
A digital signature is used to ensure that an electronic document has not been altered during transmission and to verify the identity of the sender. Which two pillars of information security does a digital signature primarily support?
A digital signature is used to ensure that an electronic document has not been altered during transmission and to verify the identity of the sender. Which two pillars of information security does a digital signature primarily support?
An online banking system requires multi-factor authentication, including a password and a one-time code sent to the user's mobile device. This security measure primarily aims to enhance:
An online banking system requires multi-factor authentication, including a password and a one-time code sent to the user's mobile device. This security measure primarily aims to enhance:
Consider a scenario where a company uses encryption to protect sensitive customer data stored in its database. If a fire destroys the data center, rendering the encrypted data unreadable, which of the following pillars is MOST directly compromised, despite the encryption?
Consider a scenario where a company uses encryption to protect sensitive customer data stored in its database. If a fire destroys the data center, rendering the encrypted data unreadable, which of the following pillars is MOST directly compromised, despite the encryption?
A company discovers that an employee has been accessing sales reports they are not authorized to view, but no data was altered or stolen. Which security pillar was violated, and what control could have prevented this?
A company discovers that an employee has been accessing sales reports they are not authorized to view, but no data was altered or stolen. Which security pillar was violated, and what control could have prevented this?
Flashcards
Confidentiality Breach
Confidentiality Breach
Unauthorized access by an authorized user.
Approximate Data Access
Approximate Data Access
Accessing roughly the right data, but it's still a leak. (e.g., Salary ranges)
Data Existence Disclosure
Data Existence Disclosure
Learning of sensitive information's existence.
Confidentiality Policy
Confidentiality Policy
Signup and view all the flashcards
Confidentiality Measures
Confidentiality Measures
Signup and view all the flashcards
Computer System Security
Computer System Security
Signup and view all the flashcards
Information Security
Information Security
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Authenticity
Authenticity
Signup and view all the flashcards
Non-Repudiation
Non-Repudiation
Signup and view all the flashcards
Confidentiality Rules
Confidentiality Rules
Signup and view all the flashcards
Caesar Cipher
Caesar Cipher
Signup and view all the flashcards
Data Integrity
Data Integrity
Signup and view all the flashcards
Viruses and Worms
Viruses and Worms
Signup and view all the flashcards
File Hashing
File Hashing
Signup and view all the flashcards
Hash Value
Hash Value
Signup and view all the flashcards
certutil -hashfile
certutil -hashfile
Signup and view all the flashcards
Data Validation
Data Validation
Signup and view all the flashcards
Data Availability
Data Availability
Signup and view all the flashcards
Desktop Document Filing
Desktop Document Filing
Signup and view all the flashcards
Document Backups
Document Backups
Signup and view all the flashcards
Availability (IT)
Availability (IT)
Signup and view all the flashcards
Redundancy in IT
Redundancy in IT
Signup and view all the flashcards
Disaster Recovery Plans
Disaster Recovery Plans
Signup and view all the flashcards
Incident Response
Incident Response
Signup and view all the flashcards
Authenticity (Data)
Authenticity (Data)
Signup and view all the flashcards
Authentication Process
Authentication Process
Signup and view all the flashcards
Privilege List
Privilege List
Signup and view all the flashcards
Digital Signatures
Digital Signatures
Signup and view all the flashcards
Logging
Logging
Signup and view all the flashcards
Third Parties
Third Parties
Signup and view all the flashcards
Digital Signatures
Digital Signatures
Signup and view all the flashcards
Time-stamping
Time-stamping
Signup and view all the flashcards
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI)
Signup and view all the flashcards
Audit Trails
Audit Trails
Signup and view all the flashcards
WORM (Write Once Read Many)
WORM (Write Once Read Many)
Signup and view all the flashcards
Study Notes
- Module 2 discusses the five pillars of Information Security
- The learning outcome is to understand the Five Pillars of information Security
Introduction
- Computer systems comprising hardware, software, and data warrant security protection due to their inherent value.
- Computing devices can be involved in security incidents, regardless of their primary function
- Information security protects against and manages risks associated with the use, processing, storage, and transmission of data and information systems
Pillars of Information Security
- Confidentiality
- Integrity
- Availability
- Authentication
- Non-Repudiation
Confidentiality
- Confidentiality ensures assets are viewed only by authorized parties
- It involves high-level rules that limit access to all types of data and information
- It assures information is not disclosed to unauthorized individuals, groups, processes, or devices
- Authorized access to a data item is an example of failed confidentiality
Examples of Failed Confidentiality
- Accessing data items as an authorized person
- When an authorized process or program accesses data
- Authorized personnel access data outside their authorized scope such as a specialized version of an authorized data item
- Authorized personnel accessing approximate data such as confidential salary information
- An authorized person learning of a company’s new product development
Confidentiality Requirements include
- Implementing information classification
- Secure document storage
- Applying general security policies
- Educating information custodians and end-users
- Encryption to protect sensitive data at rest and in transit from unauthorized access which includes Caesar Cipher
- Using secure email networks that encrypt messages for authentication
- Implementing role-based access control (RBAC)
- Employing multi-factor authentication (biometric)
- Ensuring principle of least privilege
- Employing data masking to minimize exposure for non-administrators by masking or obfuscating critical information
Integrity
- Integrity ensures assets are modified only by authorized parties
- Accuracy and completeness of vital information must be safeguarded
- Integrity requires the information must be whole, complete, and uncorrupted
- Damages include corruption, damage, destruction, or other disruption of its authentic state
- Data corruption can happen during transmission or storage
- Viruses and worms corrupt data
Methods for detecting virus or worms
- Checking the file size
- File hashing; the file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a hash value
- An example of file hashing is MD5, SHA-1
How to use hashtaging command
- Open Command prompt or type CMD
- Type the command certutil -hashfile "path/to/your/file.txt" MD5
- This generates the MD5 hash value for the file path "path/to/your/file.txt"
Examples of ensuring integrity
- Implementing data Validation to ensure data is accurate, complete and up-to-date
- Implementing hashing algorithms to verify the integrity of the data and detect unauthorized alterations or tampering
- Deploying audit logs of data access and modifications to track unauthorized or suspicious activities
Availability
- Availability ensures that an asset can be used by any authorized parties
- Its means guaranteeing reliable access to information by authorized personnel
- Responsible users file desktop documents for easy access
- Hard copies should be filed securely and not left lying around
- Copies should be made to ensure important Documents are not lost
- Data is shared not only within organizations, but also to individuals outside the organization
- Email is a quick and easy way of sharing data, but information sent over the internet can be intercepted by hackers, compromising confidentiality
- Proper availability includes authorized users having easy access to information services
- IT resources and infrastructure should remain robust and fully-functional at all times during database issues and fall-overs
- Protection is required against malicious codes, hackers, and other threats that could block access to the information system
Examples of ensuring availability
- Building redundant systems such as backup power, networking, and data storage to ensure systems remain available
- Drafting disaster Recovery Plans clearly outline recovering data during attacks
- Establishing incident response to act quickly and limit system downtime during security breaches or attacks
Authenticity
- Authenticity confirms the sender's identity
- The source or origin of data is validated, and other file transfers through proof of identity
- Ensures the message was not corrupted and intercepted during transmission
The Authentication Process
- Users can verify their identities by providing specific credentials using Strong Authentication Protocol
- Login information (username and password)
- Biometric data
- Electronic or digital signature
- Authentication tokens
- Smart cards
- Authorization level: properly define and implement use of roles and permission to ensure of the authorized user can access sensitive systems and data
- Privilege List: A directory showing all permitted privileges or access rights for a given subject
Electronic Signature vs Digital Signature
- Electronic Signature Examples
- PDF Digital Signature Example
- Email Digital Signature Example
Non-Repudiation (or Accountability)
- Confirms that a sender cannot convincingly deny having sent something
- It proves the legitimacy of a message or data transfer by providing undeniable evidence of both authenticity and integrity
- It prevents someone from denying sent or received information
How Non-Repudiation Works
- Digital signatures where the customer signs a transaction with a private key
- The merchant can then verify with the customer’s public key
- Logging records who did what and when in a system
- Third parties such as a notary or forensic analyst verify the identity of the signer
Requirements include
- Using digital signatures by employing public-key cryptography to verify the identity of the sender as well as the message integrity.
- Applying time-stamping to record the exact time of a transaction to prevent backdating or future-dating
- Employing the Public Key Infrastructure (PKI) to establish a framework that issues public and private keys
- Logging Audit Trails to maintain detailed logs of all interactions with a document
- Using Storage facilities along w/ Write Once Read Many (WORM) drives to prevent unauthorized alterations to log records
Use cases
- E-commerce transactions ensure that customer cannot deny their purchase later
- In Business-to-Business transactions, senders and receivers alike cannot deny that they’ve sent of received a message
- Signing Contractual agreements where one cannot unilaterally deny the terms of the agreement after signing it
Definition of Non-Repudiation and Authenticity
- Authenticity is a process that ensures and confirms a user’s identity
- Non-repudiation refers to the assurance that the owner of a signature key pair capable of generating an existing signature corresponding to certain data cannot convincingly deny having signed the data
Security Property and Meaning
- Availability ensures information is ready for use and at the required performance level
- Integrity guarantees data and systems are only accessible or modifiable by authorized users
- Authentication validates that users are who they say they are (users/name, password, digital certificate)
- Confidentiality is a limit access policy (or places restrictions) on sensitive data like personally identifiable information or classified corporate data
- Non-repudiation ensures individuals cannot deny any action because a system provides proof of the action
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.