Info Sec: Chapter 1 – Flashcards

Unlock all answers in this set

Unlock answers
question
Information security
answer
a "well-informed sense of assurance that the information risks and controls are in balance." — Jim Anderson, Inovant (2002)?
question
The History of Information Security
answer
Began immediately after the first mainframes were developed Groups developing code-breaking computations during World War II created the first modern computers Physical controls to limit access to sensitive military locations to authorized personnel Rudimentary in defending against physical theft, espionage, and sabotage
question
The 1960s
answer
Advanced Research Project Agency (ARPA) began to examine feasibility of redundant networked communications Larry Roberts developed ARPANET from its inception
question
The 1970s and 80s
answer
ARPANET grew in popularity as did its potential for misuse Fundamental problems with ARPANET security were identified No safety procedures for dial-up connections to ARPANET Nonexistent user identification and authorization to system Late 1970s: microprocessor expanded computing capabilities and security threats
question
The 1970s and 80s (continued)?
answer
Information security began with Rand Report R-609 (paper that started the study of computer security)? Scope of computer security grew from physical security to include: Safety of data Limiting unauthorized access to data Involvement of personnel from multiple levels of an organization
question
MULTICS
answer
Early focus of computer security research was a system called Multiplexed Information and Computing Service (MULTICS)? First operating system created with security as its primary goal Mainframe, time-sharing OS developed in mid-1960s by General Electric (GE), Bell Labs, and Massachusetts Institute of Technology (MIT)? Several MULTICS key players created UNIX Primary purpose of UNIX was text processing
question
The 1990s
answer
Networks of computers became more common; so too did the need to interconnect networks Internet became first manifestation of a global network of networks In early Internet deployments, security was treated as a low priority
question
The Present
answer
The Internet brings millions of computer networks into communication with each other—many of them unsecured Ability to secure a computer's data influenced by the security of every computer to which it is connected
question
What is Security?
answer
"The quality or state of being secure—to be free from danger"
question
A successful organization should have multiple layers of security in place:
answer
Physical security Personal security Operations security Communications security Network security Information security
question
Security
answer
The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information
question
Necessary Tools in Security
answer
Necessary tools: policy, awareness, training, education, technology
question
The value of information comes from the characteristics it possesses:
answer
Availability Accuracy Authenticity Confidentiality Integrity Utility Possession
question
Components of an Information System
answer
Information system (IS) is entire set of software, hardware, data, people, procedures, and networks necessary to use information as a resource in the organization
question
Securing Components
answer
Computer can be subject of an attack and/or the object of an attack When the subject of an attack, computer is used as an active tool to conduct attack When the object of an attack, computer is the entity being attacked
question
Balancing Information Security and Access
answer
Impossible to obtain perfect security—it is a process, not an absolute Security should be considered balance between protection and availability To achieve balance, level of security must allow reasonable access, yet protect against threats
question
Approaches to Information Security Implementation: Bottom-Up Approach
answer
Grassroots effort: systems administrators attempt to improve security of their systems Key advantage: technical expertise of individual administrators Seldom works, as it lacks a number of critical features: Participant support Organizational staying power
question
Approaches to Information Security Implementation: Top-Down Approach
answer
Initiated by upper management Issue policy, procedures, and processes Dictate goals and expected outcomes of project Determine accountability for each required action The most successful also involve formal development strategy referred to as systems development life cycle
question
The Systems Development Life Cycle
answer
Cycle (SDLC) is methodology for design and implementation of information system within an organization
question
Methodology
answer
is formal approach to problem solving based on structured sequence of procedures
question
Using a methodology:
answer
Ensures a rigorous process Avoids missing steps
question
Traditional SDLC consists of six general phases
answer
Investigation Analysis Logical Design Physical Design Implementation Maintenance and Change
question
Investigation
answer
What problem is the system being developed to solve? Objectives, constraints, and scope of project are specified Preliminary cost-benefit analysis is developed At the end, feasibility analysis is performed to assess economic, technical, and behavioral feasibilities of the process
question
Analysis
answer
Consists of assessments of the organization, status of current systems, and capability to support proposed systems Analysts determine what new system is expected to do and how it will interact with existing systems Ends with documentation of findings and update of feasibility analysis
question
Logical Design
answer
Main factor is business need; applications capable of providing needed services are selected Data support and structures capable of providing the needed inputs are identified Technologies to implement physical solution are determined Feasibility analysis performed at the end
question
Physical Design
answer
Technologies to support the alternatives identified and evaluated in the logical design are selected Components evaluated on make-or-buy decision Feasibility analysis performed; entire solution presented to end-user representatives for approval
question
Implementation
answer
Needed software created; components ordered, received, assembled, and tested Users trained and documentation created Feasibility analysis prepared; users presented with system for performance review and acceptance test
question
Maintenance and Change
answer
Consists of tasks necessary to support and modify system for remainder of its useful life Life cycle continues until the process begins again from the investigation phase When current system can no longer support the organization's mission, a new project is implemented
question
The Security Systems Development Life Cycle
answer
The same phases used in traditional SDLC may be adapted to support specialized implementation of an IS project Identification of specific threats and creating controls to counter them SecSDLC is a coherent program rather than a series of random, seemingly unconnected actions
question
Investigation (SecSDLC)
answer
Identifies process, outcomes, goals, and constraints of the project Begins with Enterprise Information Security Policy (EISP)? Organizational feasibility analysis is performed
question
Analysis (SecSDLC)
answer
Documents from investigation phase are studied Analysis of existing security policies or programs, along with documented current threats and associated controls Includes analysis of relevant legal issues that could impact design of the security solution Risk management task begins
question
Logical Design (SecSDLC)
answer
Creates and develops blueprints for information security Incident response actions planned: Continuity planning Incident response Disaster recovery Feasibility analysis to determine whether project should be continued or outsourced
question
Physical Design (SecSDLC)
answer
Needed security technology is evaluated, alternatives are generated, and final design is selected At end of phase, feasibility study determines readiness of organization for project
question
Implementation (SecSDLC)
answer
Security solutions are acquired, tested, implemented, and tested again Personnel issues evaluated; specific training and education programs conducted Entire tested package is presented to management for final approval
question
Maintenance and Change (SecSDLC)
answer
Perhaps the most important phase, given the ever-changing threat environment Often, reparation and restoration of information is a constant duel with an unseen adversary Information security profile of an organization requires constant adaptation as new threats emerge and old threats evolve
question
Data owner:
answer
responsible for the security and use of a particular set of information
question
Data custodian:
answer
responsible for storage, maintenance, and protection of information
question
Data users:
answer
end users who work with information to perform their daily jobs supporting the mission of the organization
question
Information Security: Is it an Art or a Science?
answer
Implementation of information security often described as combination of art and science.. "Security artesan" idea: based on the way individuals perceive systems technologists since computers became commonplace.
question
Security as Art
answer
No hard and fast rules nor many universally accepted complete solutions No manual for implementing security through entire system
question
Security as Science
answer
Dealing with technology designed to operate at high levels of performance Specific conditions cause virtually all actions that occur in computer systems Nearly every fault, security hole, and systems malfunction are a result of interaction of specific hardware and software If developers had sufficient time, they could resolve and eliminate faults
question
Security as a Social Science
answer
Social science examines the behavior of individuals interacting with systems Security begins and ends with the people that interact with the system Security administrators can greatly reduce levels of risk caused by end users, and create more acceptable and supportable security profiles
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New