Information Security - Protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption,
... [Show More] modification, or destruction.
Compliance - Requirements that are set forth by laws and
industry regulations.
CIA - Confidentiality, Integrity, Availability
Confidentiality - Refers to our ability to protect our data from those who are not authorized to use/view it
Integrity - The ability to prevent people from changing your data in an unauthorized or undesirable manner
Availability - Refers to the ability to access our data when we need it
Possession/Control - refers to the physical disposition of the media on which the data is stored. (tape examples where some are encrypted and some are not)
Authenticity - whether you've attributed the data in question to the proper owner or creator. (altered email that says it's from one person when it's not - violation of the authenticity of the email)
Utility - refers to how useful the data is to you.
Attacks - interception, interruption, modification, and
fabrication
Interception - attacks that allow unauthorized users to access your data, applications, or environments. Are primarily attacks against confidentiality
Interruption - attacks that make your assets unusable or unavailable to you temporarily or permanently. DoS attack on a mail server, for example. May also affect integrity
Modification - attacks involve tampering with our asset. Such attacks might primarily be considered an integrity attack but could also represent an availability attack.
Fabrication - attacks involve generating data, processes, communications, or other similar activities with a system. Fabrication attacks primarily affect integrity but could be considered an availability attack as well.
Risk - is the likelihood that an event will occur. To have risk there must be a
threat and vulnerability.
Threats - are any events being man-made, natural or environmental that could cause damage to assets.
Vulnerabilities - are a weakness that a threat event or the threat agent can take advantage of.
Impact - takes into account the value of the asset being threatened and uses it to calculate risk
Risk Management Process - Identify assets, identify threats, assess vulnerabilities, assess risks, mitigate risks
Defense in Depth - Using multiple layers of security to defend your assets.
Controls - are the ways we protect assets. Three different types: physical, logical, administrative
Physical Controls - environment; physical items that protect assets think locks, doors, guards, and, fences or environmental factors (time)
Logical Controls - Sometimes called technical controls, these protect the systems, networks, and environments that process, transmit, and store our data
Administrative Controls - based on laws, rules, policies, and procedures, guidelines, and other items that are "paper" in nature. They are the policies that organizations create for governance. For example, acceptable use and email use policies.
Preparation - phase of incident response consists of all of the activities that we can perform, in advance of the incident itself, in order to better enable us to handle it.
Incident Response Process - 1. Preparation
2. Detection and Analysis (Identification)
3. Containment
4. Eradication
5. Recovery
6. Post-incident activity: document/Lessons learned [Show Less]