Shared Flashcard Set

Details

ISSAP
ISSAP Req Anal and Security Standards
38
Computer Science
Professional
10/03/2011

Additional Computer Science Flashcards

 


 

Cards

Term
Security Engineering
Definition
Identifying secuirty requirements and designing a system meets those requirements and business needs
Term
Security Needs (goals)
Definition
Confidentaility, Integrity and Availability
Term
Business Needs
Definition
Continuity, Repeatability, efficiency, assurance
Term
Security Engineering Assurance
Definition
Confidence that things are working as inttended with respect to security
Term
Security Engineering process steps
Definition
1)Identify needs
2)Define requirements
3)Define architecture
4)Develop detailed design
5)Implement
6)Assess effectiveness
Term
DoD Archetecture Framework (DODAF)
Definition
-Required by OMB Circular A-11 & A-130
-Required to provided 26 views in 4 sets
-Example OV-1 highlevel view of system
Term
Zachman Framdwork
Definition
-IT solutions for specific business goals
-2 dimensionsal model (matrix)
1)who, what, where, when, why, how
2)Planner, Owners,Designer, Builder, Implementer, Worker
Term
Requirements Analysis
Definition
Basis for functional and business needs of a system.
Term
SMART
Definition
Requirements should be
Specific, Measurable, Attainable, Realstic, Testable
Term
Requirement Analysis Process
Definition
Identify
Verify and validate
Document
Term
Requirements built
Definition
-Buisness policies
-Legal and regulatory concerns
-risk analysis
Term
Risk
Definition
Threat x vulnerability x impact / countermeasures
Term
Risk Analysis steps
Definition
1)Develop business case
2)Characterize system
3)Identify threats, vulnerability, controls
4)Identify impact
5)Develop mitigatin strategy
6)Determine risk level
7)Report residual risk
Term
Players in a Risk Analysis
Definition
1)Owners
2)Assets
3)Threat Agents
4)Threat
5)Risks
6)Safeguards
7)Vulnerabilities
Term
Threat Agents
Definition
Individuals,groups, organizations that can harm an asset
Term
Threat
Definition
Tools used by threat agents to harm an asset
Term
Vulnerabilities
Definition
Weakness in an asset due to technical flaw, lack of control or misconfiguration
Term
Safeguard
Definition
Controls or countermeasures to protect an assest. Can be administrative, technical/logical, or phyiscal
Term
Risk
Definition
Causes an impact if realized
Term
Exposure Factor
Definition
Percentage of asset is affected
Term
Attack vector
Definition
Manner in which a threat agent accomplishes thier goals; method of attack; identified during a risk assessment
Term
Attack
Definition
Vector + Payload
Term
Attack Vectors
Definition
1)Email
2)Deception - social engineering, hoaxes
3)Web pages - counterfiet sites
4)Wormss
5)Documents
6)Instant Messaging
7)IRC
8)P2P
Term
ISO 15408
Definition
-Defines Common Criteria
a.Defines methodologies which resolve between the preceding standard like TCSEC & ITSEC
b.Provides common frame of reference and language
c.Establish internationally accepted testing standards
Term
Common Critera Documentation
Definition
Has three parts
1)Introduction and general model
2)Security functional requirements
3)Security assurance requirements
Term
Common Critera structure
Definition
1)Protection Profile (PP)
2)Target of evaluation (TOE)
3)Security Target (ST)
4)Assuarnace Level
Term
Evaluation Assurance Levels
Definition
EAL0 - Not tested
EAL1 - Functionally Tested
EAL2 - Structurally Tested
EAL3 - Methodically Tested & Checked
EAL4 - Methodically Designed, Tested & Reviewed
EAL5 - Semi-formally Designed and Tested
EAL6 - Semi-formally Verified Designed and Tested
EAL7 - Formally Verified Design and Tested
Term
ISO 27000 Series
Definition
Series describes a security framework for an Information Security Management System (ISMS) within the context of business risk.
ISO 27000- glossary
IS0 1700` - requirements for certification
ISO 27002 - guide of best security practies
ISO 27003 - ISMS implementation guidance
ISO 27004 - measure ISMS effectiveness
ISO 27005 - risk management
ISO 27006 - auditor and certifier requirements
Term
ISO 21827
Definition
System Secuirty Engineering - Capability Maturity Model (SEE-CMM)- provides a framework for the security community
Term
SSE CMM Levels
Definition
Level 0 - Not performed
Level 1 - Unpredictable
Level 2 - Inconsistent
Level 3 - Consistent
Level 4 - Measured
Level 5 - Continously improved
Term
SSE CMM Processing Areas
Definition
1. PAO1 Administer security controls
2. PAO2 Assess impact
3. PAO3 Assess security risk
4. PA04 Assess threat
5. PAO5 Assess vulnerability
6. PAO6 Build assurance argument
7. PAO7 Coordinate security
8. PAO8 Monitor security posture
9. PAO9 Provide security input
10. PA10 Specify security needs
11. PA11 Verify and validate security
Term
SSE CCM Project Process Areas
Definition
PA12 Ensure quality
PA13 Manage configurations
PA14 Manage program risks
PA15 Monitor and control technical effort
PA16 Plan technical effort
Term
SSE CMM Organization Process Areas
Definition
PA17 Define security engineering processes
PA18 Improve security engineering processes
PA19 Manage security product evolution
PA20 Manage supporting environment
PA21 Provide ongoing skills and knowledge
PA11 Coordinate with suppliers
Term
ISO 7498-2
Definition
Security Architecture - permit exchange of information among systems that are "open" or compliant with this standard
Term
ISO 7498-2 Security Architecture Security Services
Definition
1. Authentication
2. Access Control
3. Data Integrity
4. Data confidentiality
5. Non-repudiation
Term
ISO 7498-2 Security Architecture Security Mechanisms
Definition
1. Digital Signature
2. Encipherment
3. Access control
4. Data Integrity
5. Routing control
6. Notarization
7. Authentication exchanges
8. Traffic padding
Term
PIC-DSS Payment Card Industry - Data Security Standards
Definition
Implemenation of various security frameworks. Mandates
-secure network
-customer information protection
-conduct vulnerability management
-implement access control
-regular monitoring and testing
-backed by policy
Term
PCI-DSS Control Objectives
Definition
1)Secure network
2)Protect customer information
3)Conduct Vulnerability management
4)Implement access control
5)Regular monitoring and testing
6)Back by policy
Supporting users have an ad free experience!