Shared Flashcard Set

Details

A - SES-602 - Module 1 - Systemic Security
N/A
37
Computer Networking
Graduate
11/19/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
Cybersecurity General Goals (1st Level)
Definition

Prevention: You should try to prevent bad things from happening.

Detection: If you can't prevent, can you at least detect?

 

Recovery: If you can't prevent or detect, you better be able to recover.

Term
Common Cyber Security Objectives (2nd Level)
Definition

Confidentiality

Integrity

Availability

Term
Confidentiality
Definition

Privacy/confidentiality

Authentication

Authorization

Possession

Term
Privacy/confidentiality
Definition
Can others read this?
Term
Authenication
Definition
Is this remote request really coming from who it says it is?
Term
Authorization
Definition
Does an access request come from a source allowed to do it?
Term
Possession
Definition
Do I (or my enterprise) have control over the content of data I create?
Term
Integrity
Definition

Authenticity

Unmarred

Non-repudiation

Auditing

Term
Authenticity
Definition

Did this data come from the expected correspondent?

Term
Unmarred
Definition

Is data/process/system corrupted?

Term
Non-repudiation
Definition

Can a counterparty deny their system activities?

Term
Auditing
Definition

What happened, when, how?

Term

Availability

Definition

Available

Utility

Term
Available
Definition

Are systems present and ready for immediate use?

Term
Utility
Definition

Is access minimized as per business purpose? (similar to Least Privileges)

Term
Security Standards (systemigram path)
Definition
Security Standards dictate process that recommends controls to reduce vulnerability.
Term
Security Program Composition
Definition

Strategy -> Policy -> Awareness -> Implementation

-> Monitoring -> Compliance -> Strategy

 

(Prevention -> Detection -> Correction -> Prevention)

Term
Triad and True (Five triads)
Definition

1. Prevent, Detect, Respond/Correct/Recover

2. Confidentiality, Integrity, Availability

3. People, Process, Technology

4. Audit, Review, Assess

5. Monitor, Measure, Manage

Term
Roles of the Security Organization: Strategy
Definition
Strategic Alignment with business/organizaion objections
Term
Roles of the Security Organization: Policy
Definition
Information Security Management (ISM) writes and publishes policy.
Term
Roles of the Security Organization: Awareness
Definition
Information Security Management (ISM) conducts classes and publishes annoucnements.
Term
Role of the Security Organization: Implementation
Definition
Via the security review process as well as occasional security-specific projects, ISM contributes secure architecture, design, and engineering strategy
Term
Role of the Security Organization: Monitoring
Definition
ISM reviews critical configuration on a periodic basis, and maintains metrics on security configuration and logs of user activity
Term
Role of the Security Organization: Compliance
Definition
ISM is the point of escalation for security issues that may require investigation.
Term
Program Organization: Strategy
Definition
Technology Steering Committe, Outsource Management, Legal, Physical Security, and other executive manangement
Term
Program Organization: Policy
Definition
All statekholders contribute
Term
Program Organization: Awareness
Definition
Legal and Human Resources take the lead on many issues, Business Application and Data Owners, Operations and Product Managers reinforce
Term
Program Organization: Implementation
Definition
Subject Matter Experts, Technology, Architects, Product Owners, Managers of Platform Maintenance, Systems Administrators, Operations Managers, Executive Assistants
Term
Program Organization: Monitoring
Definition
Operations Managers and Internal Auditors have primary responsibility, Managers of platform maintenance contribute
Term
Program Organization :Compliance
Definition
Human Resources and Legal take the lead on many issues, product owners, operations managers contribute
Term
Program Execution Process Hierarchy
Definition

Policy

Standards

Procedures

Guidelines

Technologies

Term
Process
Definition

Workflow designed to support a given outcome.

Information Security Governance Requires

process commensurate with the size and nature

of the organization, as well as the diversity in roles and responsibilities.

Term
Policy
Definition

Forms the basis for a methodology for

complying with management and regulatory

objectives for data confidentiality, integrity, and

availability. They are documents that contain management mandates for the security program.

Term
Standards
Definition

Organizational directives for technical

configurations that comply with policy.

Domain may be organization-wide or within a single department.

Term
Procedures
Definition

Step-by-step process descriptions or even more

detailed procedures to provide staff with

instruction on things like technology

configuration.

 

Used for ensuring that standards are followed and training new personnel.

Term
Guidelines
Definition

Suggestions for following security policy,

sometimes including several alternatives for

activity that will result in compliance. Not mandatory even within a department.

Term
Technologies
Definition

Lowest level of management process

Highest degree of reliability in controls.

Supporting users have an ad free experience!