Confidentiality (CIA Triad) - refers to our ability to protect our data from those who are not authorize to use/view it., Intergrity ( CIA Triad ) - is the ability to prevent people from changing your data in an unauthorized or undesirable manner, Availability ( CIA Triad) - refers to the ability to access our data when we need it., The Parkerian Hexad - It encompasses six key principles, including Confidentiality, Integrity, Availability, as well as Possession or Control, Authenticity, and Utility., possesion or control ( the parkerian Hexad) - refers to the physical disposition of the media on which the data is stored., authenticity ( the parkerian Hexad) - allows you to say whether you've attributed the data in question to the proper owner or creator, Utility ( the parkerian Hexad) - refers how useful data is to you., interceptions - this attack allows unauthorized users to access your data, applications, or environments, and they are primarily attacks against confidentiality, interruption - make your assets unusable or unavailable to you on a temporary or permeant basis ( these types of attacks often affect availability but can affect integrity, as well), modification - involves tampering with an asset. Such attacks might primarily be considered attacks on integrity but could also represents attacks on availability., Fabrication - attacks involve generating data, processes, communications, or other similar material with a system., Threats - is something that has the potential to cause harm to your assets, Vunerabilities - are weaknesses, or holes, that threats can exploit to cause you harm., Risk - is the likelihood that something bad will happen., Impact - takes into account the value of the asset being threatened, Risk Management process - processes compensate for risks in your environment. As you can see, you need to identify your important assets, figure out the potential threats against them, assess your vulnerabilities, and then take steps to mitigate these risks., Identify Assets - One of the first and, arguably, most important parts of the risk management process is identifying the assets you're protecting., identify threats - after enumerating your critical assets, you can then begin to identify the threats that might affect them., Assess Vulnerabilities - when assessing vulnerabilities, you need to do so in context of potential threats.tial threats., Assess Risks - assess the overall risk. risk is the conjunction of a threat and a vulnerability. A vulnerability with no matching threat or a threat with no matching vulnerability does not constitute a risk., mitigate risk - to mitigate riskto mitigate risks, you can out measures in place to account for each threatto mitigate risks, you can out measures in place to account for each threat, Logical Controls - sometimes called technical controls, protect the systems, networks, and environments that process, transmit, and store your data. ex, passwords, encryption, access controls, firewalls, intrusion detection systems., Physical Controls - protect the physical environment in which your systems, sit, or where your data is stored. ex, fences, gates, locks, guards, cameras etc., Administrative controls - based on rules, laws, policies, procedures, guidelines, and other items that are "paper" in nature. Dictate how the users of your environment should behave ex changing passwords every 90 days., incident response - How an organization responds to an incident/attacks, preparation - consists of all the activities you perform ahead of time to better handle an incident., Detection - is where the action begins. in this phase, you detect an issue, decide whether actually an incident, and respond to it appropriately., Containment - involves taking the steps to ensure that the situation doesn't cause any more damage than it already has or at least lessen any ongoing harm., eradication - attempt to remove the effects of the issue from your environment, Recovery - recover to the state your in prior to the incident ex restoring devices or data from a backup media, rebuilding systems etc.,

Fundamentals of Information Security - D430 Terms Pt 1

Leaderboard

Visual style

Options

Switch template

Continue editing: ?