Confidentiality (CIA Triad) - refers to our ability to protect our data from those who are not authorize to use/view it., Intergrity ( CIA Triad ) - is the ability to prevent people from changing your data in an unauthorized or undesirable manner, Availability ( CIA Triad) - refers to the ability to access our data when we need it., The Parkerian Hexad - It encompasses six key principles, including Confidentiality, Integrity, Availability, as well as Possession or Control, Authenticity, and Utility., possesion or control ( the parkerian Hexad) - refers to the physical disposition of the media on which the data is stored., authenticity ( the parkerian Hexad) - allows you to say whether you've attributed the data in question to the proper owner or creator, Utility ( the parkerian Hexad) - refers how useful data is to you., interceptions - this attack allows unauthorized users to access your data, applications, or environments, and they are primarily attacks against confidentiality, interruption - make your assets unusable or unavailable to you on a temporary or permeant basis ( these types of attacks often affect availability but can affect integrity, as well), modification - involves tampering with an asset. Such attacks might primarily be considered attacks on integrity but could also represents attacks on availability., Fabrication - attacks involve generating data, processes, communications, or other similar material with a system., Threats - is something that has the potential to cause harm to your assets, Vunerabilities - are weaknesses, or holes, that threats can exploit to cause you harm., Risk - is the likelihood that something bad will happen., Impact - takes into account the value of the asset being threatened, Risk Management process - processes compensate for risks in your environment. As you can see, you need to identify your important assets, figure out the potential threats against them, assess your vulnerabilities, and then take steps to mitigate these risks., Identify Assets - One of the first and, arguably, most important parts of the risk management process is identifying the assets you're protecting., identify threats - after enumerating your critical assets, you can then begin to identify the threats that might affect them., Assess Vulnerabilities - when assessing vulnerabilities, you need to do so in context of potential threats.tial threats., Assess Risks - assess the overall risk. risk is the conjunction of a threat and a vulnerability. A vulnerability with no matching threat or a threat with no matching vulnerability does not constitute a risk., mitigate risk - to mitigate riskto mitigate risks, you can out measures in place to account for each threatto mitigate risks, you can out measures in place to account for each threat, Logical Controls - sometimes called technical controls, protect the systems, networks, and environments that process, transmit, and store your data. ex, passwords, encryption, access controls, firewalls, intrusion detection systems., Physical Controls - protect the physical environment in which your systems, sit, or where your data is stored. ex, fences, gates, locks, guards, cameras etc., Administrative controls - based on rules, laws, policies, procedures, guidelines, and other items that are "paper" in nature. Dictate how the users of your environment should behave ex changing passwords every 90 days., incident response - How an organization responds to an incident/attacks, preparation - consists of all the activities you perform ahead of time to better handle an incident., Detection - is where the action begins. in this phase, you detect an issue, decide whether actually an incident, and respond to it appropriately., Containment - involves taking the steps to ensure that the situation doesn't cause any more damage than it already has or at least lessen any ongoing harm., eradication - attempt to remove the effects of the issue from your environment, Recovery - recover to the state your in prior to the incident ex restoring devices or data from a backup media, rebuilding systems etc.,
0%
Fundamentals of Information Security - D430 Terms Pt 1
Bendrinti
Bendrinti
Bendrinti
prie
Rareintuitions
Higher Education
Redaguoti turinį
Spausdinti
Įterpti
Daugiau
Užduotis
Lyderių lentelė
Rodyti daugiau
Rodyti mažiau
Ši lyderių lentelė šiuo metu yra privati. Spustelėkite
Bendrinti
, kad ji būtų vieša.
Ši lyderių lentelė buvo išjungta išteklių savininko.
Ši lyderių lentelė yra išjungta, nes jūsų parinktys skiriasi nuo nustatytų išteklių savininko.
Grąžinti parinktis
Rask tinkamą
yra neterminuotas šablonas. Jis negeneruoja rezultatų lyedrių lentelei.
Reikia prisijungti
Vizualinis stilius
Šriftai
Būtina prenumerata
Parinktys
Pakeisti šabloną
Rodyti viską
Pradėjus veiklą bus rodoma daugiau formatų.
Atviri rezultatai
Kopijuoti nuorodą
QR kodas
Naikinti
Atkurti automatiškai įrašytą:
?