Podcast
Questions and Answers
What is the primary goal of Risk Management?
What is the primary goal of Risk Management?
What is the primary goal of Information Security?
What is the primary goal of Information Security?
What is an Incident in the context of security?
What is an Incident in the context of security?
What is the risk associated with a lack of confidentiality?
What is the risk associated with a lack of confidentiality?
Signup and view all the answers
What is the primary purpose of tracking vulnerabilities?
What is the primary purpose of tracking vulnerabilities?
Signup and view all the answers
What is the term for the potential loss of an asset upon an incident?
What is the term for the potential loss of an asset upon an incident?
Signup and view all the answers
What is the purpose of audit logs?
What is the purpose of audit logs?
Signup and view all the answers
What is the primary method of ensuring the integrity of information?
What is the primary method of ensuring the integrity of information?
Signup and view all the answers
What is a common system used to track vulnerabilities?
What is a common system used to track vulnerabilities?
Signup and view all the answers
What is the term for an action or event that may potentially compromise security?
What is the term for an action or event that may potentially compromise security?
Signup and view all the answers
What is the purpose of authentication?
What is the purpose of authentication?
Signup and view all the answers
What is the primary purpose of authorization?
What is the primary purpose of authorization?
Signup and view all the answers
What type of access control assigns security levels on users and resources?
What type of access control assigns security levels on users and resources?
Signup and view all the answers
What is the risk associated with a lack of availability?
What is the risk associated with a lack of availability?
Signup and view all the answers
Study Notes
Information Security
- Information Security is the process and methods of protecting assets to achieve CIA (Confidentiality, Integrity, Availability)
- CIA is crucial to protect print, electronic, or any other form of confidential, private, and sensitive information or data from unauthorized access
Confidentiality
- Confidentiality ensures that information is kept private and secure
- It assures that information is available only to those who have authorized access
- Risks associated with confidentiality: loss of privacy, unauthorized access, identity theft
- Controls to maintain confidentiality: encryption, authentication, access controls
Integrity
- Integrity ensures that information is not modified, deleted, or added without authorization
- It ensures the trustworthiness, accuracy, and completeness of the data
- Risks associated with integrity: unreliable/inaccurate information
- Controls to maintain integrity: quality assurance and audit logs
Availability
- Availability ensures that systems for processing, delivering, and storing information are accessible when required
- Risks associated with availability: business disruption, loss of customer confidence, and loss of revenue
- Controls to maintain availability: back-up storage and sufficient capacity
Triple A of InfoSec
- Authentication: process in which a subject attempts to verify/prove their claims to a given identity
- Three primary forms of authentication: what you have, who you are, and what you know
- Authorization: the act of granting an authenticated subject to their proper access rights to different assets
- Schemes of authorization: Mandatory Access Control, Discretionary Access Control, Role-based Access Control, and Attribute-based Access Control
Audit Trail
- Audit Trail tracks security controls such as errors, login attempts, changes, etc.
- Actions should be traceable to a specific subject for the information to be useful
Assets
- Assets are any tangible/intangible item with value to an organization
- Assets whose loss can cause a potential disruption to an organization
Vulnerabilities
- Vulnerabilities are weaknesses/flaws that may intentionally/unintentionally triggered, leading to violation of security policies
- Vulnerabilities may be present in inherent design or the actual system
- Current and existing vulnerability tracking systems: U.S. Computer Emergency Readiness Team, Common Vulnerability Scoring System, Common Vulnerabilities and Exposure
Threats, Impacts, Exposure Factor
- Threat: an action/event that may potentially compromise/violate security
- Incident: the occurrence upon realization of a violation of security
- Impact: the outcome of the incident
- Exposure Factor: potential loss of an asset upon an incident
Risk
- Risk: probability of a particular threat to occur because of a specific vulnerability
- Risk Management: process of reducing risks to acceptable levels
- Goal of risk management is to minimize risk, not eliminate it
Security Controls (Countermeasures)
- Security Controls: mechanisms to mitigate threats
- Improper implementation may lead to increased risks
- Groups of Security Controls: Technical, Administrative, and Physical
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about the importance of information security and how to protect assets from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.