for imformation to be useful, it must be
reliable
in order to provide useful information, it must be reliable, what are the 3 criteria to be classified as reliable
5 principles system reliability is based on
(trust services framework)
(which of the 5 principles system reliability is based on is this)
access to the system and its data is controlled
Security
(most important part)
(which of the 5 principles system reliability is based on is this)
sensitive company information is protected from unauthorized disclosure
Confidentiality
(which of the 5 principles system reliability is based on is this)
confidential information about third parties collected, used, and stored in an appropriate manner and is protected from unauthorized disclosure
Privacy
(etc: customers, employees)
(which of the 5 principles system reliability is based on is this)
data is processed accurately, timely, and based on proper authorization
Processing Integrity
collected, used, and stored in an appropriate manner and is protected from unauthorized disclosure
system is available when needed
Availability
focuses on identifying a collection of preventive, detective, and corrective controls that allows assets to be protected long enough for the company to discover an attack is underway and respond to that attack
Time Based Model of Security
3 variables the time based model of security
if P > D + R then ?
security procedures are effective
employ multiple controls to prevent a single point of failure
defense in depth
defense in depth is related to what
the 3 variables of the time based model of security
(which one would you choose) (P > D =R)
- Control #1: increase P bt 9 minutes & decrease by 3 minutes
- Control #2: decrease D by 14 minutes
- Control #3: increase R by 8 minutes & increase P by 7 minutes
Control #2
whats an advantage with the Time based model of security
allows to identify the most cost effective set of controls
what are the 2 disadvantages with the Time based model of security
prevent security issues from happening
preventive controls
process of identifying the identity of the person or device attemption to access system
authentication
restricts the access to authenticated users to specific portions of the system and identifies actions the user can take
authorization
how many examples of controls for authentication
4
4 examples of controls of authentication
control for authorization
access control matrix
how many additional preventive controls for security
3
3 additional preventive controls for security