Term
|
Definition
| Identifying secuirty requirements and designing a system meets those requirements and business needs |
|
|
Term
|
Definition
| Confidentaility, Integrity and Availability |
|
|
Term
|
Definition
| Continuity, Repeatability, efficiency, assurance |
|
|
Term
| Security Engineering Assurance |
|
Definition
| Confidence that things are working as inttended with respect to security |
|
|
Term
| Security Engineering process steps |
|
Definition
1)Identify needs 2)Define requirements 3)Define architecture 4)Develop detailed design 5)Implement 6)Assess effectiveness |
|
|
Term
| DoD Archetecture Framework (DODAF) |
|
Definition
-Required by OMB Circular A-11 & A-130 -Required to provided 26 views in 4 sets -Example OV-1 highlevel view of system |
|
|
Term
|
Definition
-IT solutions for specific business goals -2 dimensionsal model (matrix) 1)who, what, where, when, why, how 2)Planner, Owners,Designer, Builder, Implementer, Worker |
|
|
Term
|
Definition
| Basis for functional and business needs of a system. |
|
|
Term
|
Definition
Requirements should be Specific, Measurable, Attainable, Realstic, Testable |
|
|
Term
| Requirement Analysis Process |
|
Definition
Identify Verify and validate Document |
|
|
Term
|
Definition
-Buisness policies -Legal and regulatory concerns -risk analysis |
|
|
Term
|
Definition
| Threat x vulnerability x impact / countermeasures |
|
|
Term
|
Definition
1)Develop business case 2)Characterize system 3)Identify threats, vulnerability, controls 4)Identify impact 5)Develop mitigatin strategy 6)Determine risk level 7)Report residual risk |
|
|
Term
| Players in a Risk Analysis |
|
Definition
1)Owners 2)Assets 3)Threat Agents 4)Threat 5)Risks 6)Safeguards 7)Vulnerabilities |
|
|
Term
|
Definition
| Individuals,groups, organizations that can harm an asset |
|
|
Term
|
Definition
| Tools used by threat agents to harm an asset |
|
|
Term
|
Definition
| Weakness in an asset due to technical flaw, lack of control or misconfiguration |
|
|
Term
|
Definition
| Controls or countermeasures to protect an assest. Can be administrative, technical/logical, or phyiscal |
|
|
Term
|
Definition
| Causes an impact if realized |
|
|
Term
|
Definition
| Percentage of asset is affected |
|
|
Term
|
Definition
| Manner in which a threat agent accomplishes thier goals; method of attack; identified during a risk assessment |
|
|
Term
|
Definition
|
|
Term
|
Definition
1)Email 2)Deception - social engineering, hoaxes 3)Web pages - counterfiet sites 4)Wormss 5)Documents 6)Instant Messaging 7)IRC 8)P2P |
|
|
Term
|
Definition
-Defines Common Criteria a.Defines methodologies which resolve between the preceding standard like TCSEC & ITSEC b.Provides common frame of reference and language c.Establish internationally accepted testing standards |
|
|
Term
| Common Critera Documentation |
|
Definition
Has three parts 1)Introduction and general model 2)Security functional requirements 3)Security assurance requirements |
|
|
Term
|
Definition
1)Protection Profile (PP) 2)Target of evaluation (TOE) 3)Security Target (ST) 4)Assuarnace Level |
|
|
Term
| Evaluation Assurance Levels |
|
Definition
EAL0 - Not tested EAL1 - Functionally Tested EAL2 - Structurally Tested EAL3 - Methodically Tested & Checked EAL4 - Methodically Designed, Tested & Reviewed EAL5 - Semi-formally Designed and Tested EAL6 - Semi-formally Verified Designed and Tested EAL7 - Formally Verified Design and Tested |
|
|
Term
|
Definition
Series describes a security framework for an Information Security Management System (ISMS) within the context of business risk. ISO 27000- glossary IS0 1700` - requirements for certification ISO 27002 - guide of best security practies ISO 27003 - ISMS implementation guidance ISO 27004 - measure ISMS effectiveness ISO 27005 - risk management ISO 27006 - auditor and certifier requirements |
|
|
Term
|
Definition
| System Secuirty Engineering - Capability Maturity Model (SEE-CMM)- provides a framework for the security community |
|
|
Term
|
Definition
Level 0 - Not performed Level 1 - Unpredictable Level 2 - Inconsistent Level 3 - Consistent Level 4 - Measured Level 5 - Continously improved |
|
|
Term
|
Definition
1. PAO1 Administer security controls 2. PAO2 Assess impact 3. PAO3 Assess security risk 4. PA04 Assess threat 5. PAO5 Assess vulnerability 6. PAO6 Build assurance argument 7. PAO7 Coordinate security 8. PAO8 Monitor security posture 9. PAO9 Provide security input 10. PA10 Specify security needs 11. PA11 Verify and validate security |
|
|
Term
| SSE CCM Project Process Areas |
|
Definition
PA12 Ensure quality PA13 Manage configurations PA14 Manage program risks PA15 Monitor and control technical effort PA16 Plan technical effort |
|
|
Term
| SSE CMM Organization Process Areas |
|
Definition
PA17 Define security engineering processes PA18 Improve security engineering processes PA19 Manage security product evolution PA20 Manage supporting environment PA21 Provide ongoing skills and knowledge PA11 Coordinate with suppliers |
|
|
Term
|
Definition
| Security Architecture - permit exchange of information among systems that are "open" or compliant with this standard |
|
|
Term
| ISO 7498-2 Security Architecture Security Services |
|
Definition
1. Authentication 2. Access Control 3. Data Integrity 4. Data confidentiality 5. Non-repudiation |
|
|
Term
| ISO 7498-2 Security Architecture Security Mechanisms |
|
Definition
1. Digital Signature 2. Encipherment 3. Access control 4. Data Integrity 5. Routing control 6. Notarization 7. Authentication exchanges 8. Traffic padding |
|
|
Term
| PIC-DSS Payment Card Industry - Data Security Standards |
|
Definition
Implemenation of various security frameworks. Mandates -secure network -customer information protection -conduct vulnerability management -implement access control -regular monitoring and testing -backed by policy |
|
|
Term
| PCI-DSS Control Objectives |
|
Definition
1)Secure network 2)Protect customer information 3)Conduct Vulnerability management 4)Implement access control 5)Regular monitoring and testing 6)Back by policy |
|
|