0% found this document useful (0 votes)
328 views

Information Assurance and Security 1

1. Information assurance is the study of how to protect information assets from destruction, degradation, manipulation and exploitation. 2. Cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. 3. Security is a process, not an end state, that protects and defends information and information systems by ensuring availability, integrity, authentication, and confidentiality.

Uploaded by

rovejama caaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
328 views

Information Assurance and Security 1

1. Information assurance is the study of how to protect information assets from destruction, degradation, manipulation and exploitation. 2. Cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. 3. Security is a process, not an end state, that protects and defends information and information systems by ensuring availability, integrity, authentication, and confidentiality.

Uploaded by

rovejama caaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Transmitting the weapon to

Delivery
the target environment.
Requirements, Seven Stages of lifecycle model
(IA) is the study of how to protect your  information assets from
TRUE destruction,
degradation, manipulation and  exploitation.
Physical security consist in the closure of IT equipment in a
Prevent Cyber-Attacks dedicated space
and the provision of access control.
Cyber
security, also referred to as information technology security,
focuses on
TRUE
protecting computers, networks, programs and data from
unintended or
unauthorized access, change or destruction.
Is a generic term
that implies a mechanism in place to 
Trust
provide a basis for confidence in the reliability/security of the 
system.
This means that only those
confidentiality
authorized to view information are allowed access to it.
Assess the impact of new security measures upon
Phase F: Migration Planning other new components or existing leveraged systems. What
phase is that?
Cyberspace is "the environment in which communication over
TRUE
computer networks occurs.“
The ability to provide forensic data attesting that the systems
Audit
have been used in accordance with stated security policies.
cyber bullying Which one is not a security threat in the IT world?
Availability: Availability of information refers to ensuring that
TRUE authorized parties are able to access the information when
needed
Is the study of how to protect your  information assets from
Information Assurance
destruction, degradation, manipulation and  exploitation.
Protection against unauthorized modification or  destruction of
Integrity
information
In a phased implementation the new security components are
usually part of the infrastructure in which the new system is
Phase F: Migration Planning implemented. The security infrastructure needs to be in a first
or early phase to properly support the project. What phase is
that?
Assurance that information is shared only among authorized
Confidentiality
persons or organizations.
Security Is a process, not an end state
Risk Transfer Shift the risk to someone else.
Trust Failure of the mechanism may destroy the basis for trust.
integrity This assured that the information is authentic and complete.
confidentiality This is roughly equivalent to.
TRUE Actions taken that
protect and defend information and 
information systems by ensuring their availability,  integrity,
authentication, confidentiality
and
Is a process, not an
Security
end state
Confidentiality, Integrity and
Three Features of Security
Availability
After the weapon is delivered to the victim, follows the targeting
of an application or vulnerability of the operating system. The
infected file
Exploitation
can be used by the self-execution facility to launch the
malware code, or it
can be executed by the user himself;
The main ways of transport are e-mails (attachment of infected
Delivery files), web platforms (running malware scripts), or removable
USB memories;
Assess assets, Assess
threats, Assess vulnerabilities,
Assess risks, Prioritize
Risk Management Procedure consists of six steps.
countermeasure options and
Make risk management
decisions
Following a cyber risk
assessment, develop and implement a plan to mitigate cyber
crown jewels
risk and protect the
“_____________” outlined in the assessment.
Security measures to
Authentication establish the validity of a 
transmission, message, or originator.
_______________ should also consider any regulations that
impact the way the company collects,
Cyber Risk Assessment
stores, and secures data, such as PCI-DSS, HIPAA, SOX,
FISMA.
Are the security
Trust mechanism features of a system that  provide
enforcement of a security policy.
This involves ensuring that the are who they say are and one
authentication
of the most famous method to secure this is by using
Assurance
Confidentiality that information is shared only among authorized persons or
organizations.
Physical, Perceptual, Desired
Three distinct levels:
Effects
photo enhancement This is not a type of application security.
Information Is data  endowed with relevance  and purpose.
Availability:Assurance that the systems responsible for
delivering, storing and processing information are accessible
TRUE
when needed, by
those who need them.
Is the process of
Security
maintaining an acceptable level of perceived risk
Confidentiality Is roughly equivalent to privacy
In information security, data integrity means maintaining and
TRUE assuring the accuracy and consistency of data over its entire
life-cycle.
Is a measure of
confidence that the security features, 
Assurance
practices, procedures, and architecture of a system accurately 
mediates and enforces the security policy.
After the first six phases, an attacker can act to achieve the
goals. These actions typically consist of collecting information,
modifying data integrity, or attacking the availability of services
Action on Objective
and devices, but the victim system can also be used as a
starting point for infecting other systems or for expanding
access to the local network.
Information Processed data
Physical attack and
destruction, including:  electromagnetic
Attacker's Operations attack, visual spying, intrusion, 
scavenging and removal, wiretapping, interference,  and
eavesdropping.
Trusted Computing Base Acronym for TCB?
Is the process by which
Lifecycle an asset is managed from its  arrival or
creation to its termination or destruction.
Consists of
Insiders employees, former employees and 
contractors.
Information and data
Information Infrastructure
manipulation
Assurance
Availability
that the information is authentic and complete.
Converting data
Information
into  information thus  requires knowledge
Digital Underground,
Underground Economy,
Phishing, Hacktivism, Type of Concept for Cybercrime
Cyberwar:Estonia Case and
Stuxnet
Risks not avoided or
Risk Acceptance transferred are retained by  the
organization.
Physical Security, Personnel
Security, IT Security and Four Security Domain
Operational Security
The ability to test
and prove that the enterprise architecture has the security
Assurance
attributes required
to uphold the stated security policies.
The state of being
protected against the criminal or unauthorized use of electronic
cyber security
data, or the
measures taken to achieve this.
Taking actions to
reduce the losses due to a risk;  many
Risk mitigation
technical countermeasures fall into this 
category.
Raw facts with an
Noise
unknown coding system
Changes in security
requirements are often more disruptive than a simplification or
Phase H: Architecture Change incremental
Management change. Changes in security policy can be driven by statute,
regulation, or
something that has gone wrong. What phase is that?
Assess assets, Assess
threats, Assess vulnerabilities,
Assess risks, Prioritize
Risk Management Procedure consists of six steps.
countermeasure options,
Make risk management
decisions
Making a malware application (for example, a computer trojan)
that, combined with an exploitable security breach, allows
remote access.
Weaponization Moreover, PDF (Portable Document Format) files or Microsoft
Office
suite-specific files can be regarded as weapons available to
the attacker;
Information security
technical measures  such as:        encryption and key
management,
Defender's Operations
intrusion  detection, anti-virus
software, auditing, redundancy, 
firewalls, policies and standards.
Assurance that the
sender is provided with proof  of a data
Non-repudiation delivery and recipient is provided with proof 
of the sender’s identity, so that neither can later deny  having
processed the data.
In information security, data integrity means
maintaining and assuring the accuracy and consistency of data
TRUE
over its entire
life-cycle.
Availability Assurance that the information is authentic and complete.
Accepted facts,
Knowledge principles, or rules of thumb that are 
useful  for specific domains.
Prevent Cyber-Attacks Logical security consists in software that are necessary to
control the
access to information and services of a system. The logical
level is divided
into two categories: access security level and service security
level.
Usually an infected host must be accessible outside of the
local network to establish a command and control channel
between the victim and the attacker. Once this bidirectional
Command and Control
communication has been made, an attacker has access inside
the target environment and can usually control the activity by
manually launching commands;
Physical Security, Personnel
Security, IT Security, Four Security Domains
Operational Security
This is an assurance that the systems responsible for
delivering, storing, and processing information are accessible
availability
when needed, by
those who need them.
Cyberspace is "the environment in which
TRUE
communication over computer networks occurs.“
Cyber security, also referred to as information technology
security, focuses on protecting computers, networks, programs
TRUE
and data from unintended or unauthorized access, change or
destruction.
Phase C: Information System Assess and baseline current security-specific
Architecture architecture elements. What phase is that?
Definition of
relevant stakeholders and discovery of their concerns and
Phase A: Architecture Vision objectives will
require development of a high-level scenario. What phase is
that?
The protection of
information assets from loss or unintended disclosure, and
Asset Protection
resources from
unauthorized and unintended use.
The infected file can be used by the self-execution facility to
Exploitation launch the malware code, or it can be executed by the user
himself;
Cybersecurity is the collection of tools, policies, security
concepts, security safeguards, guidelines, risk management
TRUE approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment
and organization and user’s assets.
s a variety of
ongoing measures taken to  reduce the
likelihood and severity of accidental and intentional  alteration,
destruction, misappropriation,
Personnel Security misuse, misconfiguration,  unauthorized
distribution, and unavailability of an organization’s  logical and
physical assets, as the result of
action or inaction by  insiders and known
outsiders, such as business partners.”
Physical Security Refers to the
protection of hardware, software,  and
data against physical threats to reduce or prevent disruptions 
to operations and services and loss of
assets.”
Availability:Assurance that the systems responsible for
TRUE delivering, storing and processing information are accessible
when needed, by those who need them.
These are constantly creating and implementing new security
cloud providers
tools to help enterprise users better secure their data.
Not performing an activity
Risk Avoidance
that would incur risk.
These actions typically consist of collecting information,
modifying
data integrity, or attacking the availability of services and
Action on objective devices, but the
victim system can also be used as a starting point for infecting
other systems
or for expanding access to the local network.
Acceptance,
The risk treatment avoidance, mitigation,  transfer—are with
respect to a specific risk for a specific pary.
Recon, Weaponise, Deliver,
What are the steps in intrusion model?
Exploit, Install, C2 and Action
Assurance that
Confidentiality information is not disclosed to 
unauthorized persons
Is a collection of
all the trust  mechanisms of a computer
TCB
system which collectively enforce the 
policy.
To affect the
technical performance and the  capability
Desired Effects
of physical systems, to disrupt the  capabilities
of the defender.
Cybersecurity is the collection of tools, policies,
security concepts, security safeguards, guidelines, risk
management approaches,
TRUE actions, training, best practices, assurance and technologies
that can be used
to protect the cyber environment and organization and user’s
assets.
Cyber Crime Computer crime, or cybercrime, is any crime that
involves a computer and a network. The computer may have
TRUE
been used in the commission of a crime, or it may be the
target.
Raw facts with a
Data
known coding system
Timely, reliable
Availability access to data and information  services
for authorized users;
Concept
TRUE
of Cybercrime
Knowledge It should be:  accurate, timely, complete, verifiable,
consistent,  available.
Is the inherent
technical features and functions that 
IT Security collectively contribute to an IT infrastructure achieving and 
sustaining confidentiality, integrity,
availability, accountability,
Cyber security, also
referred to as____________________, focuses on protecting
information technology
computers, networks, programs and data from unintended or
security
unauthorized access,
change or destruction.
Digital Underground,
Underground Economy,
Phishing, Hacktivism, Six Concept of CyberCrime
Cyberwar:Estonia Case and
Stuxnet
Is the process of maintaining an acceptable level of perceived
Security
risk
Confidentiality, Three Features of Security
Involves the
implementation of standard  operational
Operational Security security procedures that define the nature and 
frequency of the interaction between users, systems, and
system  resources, the purpose of which is to.
Research, target identification and selection: it may be looking
for e-mail addresses, social relationships, or data about a
Reconnaissance
particular
technology, information displayed on various websites;
Availability: Availability of information refers to ensuring that
TRUE authorized parties are able to access the information when
needed
Data and data
Physical
processing activities in physical space;
The following security
specifics appropriate to the security architecture must be
Phase A: Architecture Vision addressed within
each phase in addition to the generic phase activities. What
phase is that?
Identify
Phase E: Opportunities &
existing security services available for re-use. What phase is
Solutions
that?
Development of the
business scenarios and subsequent high-level use-cases of
Phase B: Business
the project concerned
Architecture
will bring to attention the people actors and system actors
involved. What phase is that?
Are applicable to
ensuring that security requirements are addressed in
Phase A: Architecture Vision
subsequent phases of the
ADM. What phase is that?
Phase D: Technology Revisit
assumptions regarding interconnecting systems beyond project
control, Identify and evaluate applicable recognized guidelines
Architecture
and standards and Identify methods to regulate consumption of
resources. What phase is that?
Every system will
Phase D: Technology rely upon resources that may be depleted in cases that may or
Architecture may not be
anticipated at the point of system design. What phase is that?
Phase D: Technology Assess and baseline current security-specific
Architecture technologies. What phase is that?
Many security
vulnerabilities originate as design or code errors and the
Phase G: Implementation simplest and least
Governance expensive method to locate and find such errors is generally
an early review by
experienced peers in the craft. What phase is that?
Changes in security
standards are usually less disruptive since the trade-off for
Phase H: Architecture Change their adoption is
Mana based on the value of the change. However, standards
changes can also be
mandated. What phase is that?
Establish architecture artifact, design, and
Phase G: Implementation code reviews and define acceptance criteria for the successful
Governance implementation
of the findings. What phase is that?
Determine
Phase B: Business
who are the legitimate actors who will interact with the
Architecture
product/service/process. What phase is that?
From the Baseline
Security Architecture and the Enterprise Continuum, there will
be existing
Phase E: Opportunities &
security infrastructure and security building blocks that can be
Solutions
applied to the
requirements derived from this architecture development
engagement. What phase is that?
A full inventory of
Phase C: Information System architecture elements that implement security services must be
Architecture compiled in
preparation for a gap analysis. What phase is that?
The ability to add
and change security policies, add or change how policies are
Administration implemented in the
enterprise, and add or change the persons or entities related to
the systems.
The definition and
enforcement of permitted capabilities for a person or entity
Authentication
whose identity has
been established.
Security architecture
TRUE addresses non-normative flows through systems and among
applications.
Those who will see
change to their capability and work with core units but are
Identify soft enterprise
otherwise not
directly affected
The substantiation of
the identity of a person or entity related to the enterprise or
Authentication
system in some
way.
Security architecture
TRUE
composes its own discrete views and viewpoints.
Security architecture
TRUE
introduces unique, single-purpose components in the design.
The ability of the
enterprise to function without service interruption or depletion
Availability
despite
abnormal or malicious events.
Security architecture
TRUE introduces its own normative flows through systems and
among applications.
Security architecture
calls for its own unique set of skills and competencies of the
TRUE
enterprise and
IT architects.
Those who are most
Identify core enterprise
affected and achieve most value from the security work
Those stakeholders
who will be affected by security capabilities and who are in
Identify communities involved
groups of
communities
Those units outside
the scoped enterprise who will need to enhance their security
Identify extended enterprise
architecture for
interoperability purposes
Security architecture
TRUE
has its own discrete security methodology.
The organization's
Risk Management
attitude and tolerance for risk.
Phase E: Opportunities & Identify
Solutions existing security services available for re-use
Are applicable to
ensuring that security requirements are addressed in
Phase A: Architecture Vision
subsequent phases of the
ADM
True or False: Business rules regarding handling of
TRUE
data/information assets
True or False: Codified
TRUE
data/information asset ownership and custody
True or False: Written and published
TRUE
security policy
TRUE True or False: Identify communities
involved (enterprises) - those stakeholders who will be affected
by security
capabilities and who are in groups of communities
True or False: Identify extended
enterprise (units) - those units outside the scoped enterprise
TRUE
who will need to
enhance their security architecture for interoperability purposes
True or False: Data classification
TRUE
policy documentation
True or False: Identify the security
TRUE governance involved, including legal frameworks and
geographies (enterprises)
True or False: Risk analysis
TRUE
documentation
True or False: Identify soft
enterprise (units) - those who will see change to their capability
TRUE
and work
with core units but are otherwise not directly affected
True or False:  Identify core
enterprise (units) - those who are most affected and achieve
TRUE
most value from
the security work

You might also like