Define “Information security”:
Knowing and making sure that information
risks and controls are in balance.
What’s the “Enigma” machine?
What’s “Arpanet”, and who developed it?
What’s “RAND Report R-609”?
A report that highlighted the vulnerabilities in computer systems and the need for security measures.
What’s “MULTICS”?
First operating system created with security as its primary goal.
What’s “DEFCON”?
The first information security conference.
What does C.I.A stand for:
Confidentiality, Integrity, and Availability.
What’s the difference between “subject of an attack” and “object of an attack”?
Define the following concepts:
1 - Access.
2 - Asset.
3 - Attack.
4 - Exploit.
5 - Exposure.
1 - The ability to use, manipulate, or affect something.
2 - A resource that is being protected.
3 - An act that can damage or compromise information and the systems supporting it.
4 - A technique used to compromise a system.
5 - A condition or state of being exposed.
Define the following concepts:
1 - Loss.
2 - Risk.
3 - Threat.
4 - Threat Agent.
5 - Vulnerability.
1 - The damage of an asset.
2 - The probability of an unwanted occurrence.
3 - An entity that is a danger to an asset.
4 - A component of a threat.
5 - Weakness in a system that exposes information to damage.
Explain the 2 information security implementations?
1 - Bottom-Up Approach
- Doesn’t work most of the time.
- Key advantage: technical expertise of individual administrators.
2 - Top-Down Approach
- Initiated by upper management: Issue policy, procedures, and processes…
- Most successful and involves (SDLC).
What’s “Systems Development Life Cycle (SDLC)” and it’s steps?
Is a methodology for implementation of an information system within an organization.
1- Investigation:
Objectives, constraints, and scope of project are specified.
2- Analysis:
determining what the new system will do and how it will interact with the existing systems.
3- Logical design:
begin creating the solution for the problem.
4- Physical design:
the logical design is transformed into a physical system, and specific hardware and software components is selected and planned.
5- Implementation:
Installation of hardware and software onto production computers, and integration of the system into work process.
6- Maintenance & change: Longest and most expensive phase.
Data Owner vs Data Custodian vs Data User:
Data Owner: responsible for the security and use of a particular set of information.
Data Custodian: responsible for storage, maintenance, and protection of information.
Data Users: end users who work with information to perform their daily jobs.