What is information security (in general, not by ISO definition)
Information Security is the protection of information assets from damage or harm.
What are the assets to be protected?
Data files, software, IT equipment and infrastructure.
Information Security:
What is the definition of information security according to ISO27000?
Preservation of confidentiality, integrity and availability of information.
What is Information Security Management, and what does it focus on?
IS management consists of activities to control and reduce risk of damage to information assets.
IS management focuses on:
What’s the difference between threat actor and threat scenario?
Threat Actor: An active entity which can execute a threat scenario.
Threat Scenario: The set of steps executed in a (potential) cyber attack.
(When simply using the term “threat”, it usually means a threat scenario)
What’s a vulnerability?
Weaknesses or opportunities allowing a threat scenario to be executed
What’s a security risk?
The likelihood (ease of executing a threat scenario), combined with the potential damage in case of an incident (successful attack).
What’s a security control?
A method for removing vulnerabilities and reducing security risk.
Name the three general security control types, and explain them.
Preventive controls:
prevent attempts to exploit vulnerabilities
Example: encryption of files
Detective controls:
warn of attempts to exploit vulnerabilities
Example: Intrusion detection systems (IDS)
Corrective controls:
correct errors or irregularities that have been detected.
Example: Restoring all applications from the last known good image to bring a corrupted system back online
Use a combination of controls to help ensure that the organisational processes, people, and
technology operate within prescribed bounds.
Information security involves protecting information assets from harm or damage.
“Information” is considered in one of three possible states:
During storage
During transmission
- Physical or electronic
During processing (use)
What is the relation between security services and goals?
A security service supports a general security goal. The traditional definition of information security is to ensure the three CIA security services/ goals for data and systems, which is Confidentiality, Integrity and Availability.
CIA are the three main security services and goals.
DATA PRIVACY is an additional goal which relies on CIA. —> CIAP
What is the definition of integrity according to ISO2700?
The property of accuracy and completeness.
What are the two types of integrity?
Data integrity:
The property that data has not been altered or destroyed in an unauthorised manner.
System integrity:
The property of accuracy and completeness.
Can include the accountability of actions
What are the main threats to integrity?
- Loss of accountability
What are the security controls for integrity?
General controls also include:
Secure System Development, Incident Response
What is the definition of Confidentiality according to ISO27000?
The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
Can be divided into:
Secrecy: Protecting business data
Privacy: Protecting personal data
Anonymity: Hide who is engaging in what actions
What is the main threat to Confidentiality?
The main threat to confidentiality is information theft and unintentional disclosure.
What are the security controls for Confidentiality?
Security controls for Confidentiality is:
General controls includes secure systems development and incident response.
What is the definition of Integrity according to ISO27000?
The property of accuracy and completeness.
What is the main threat to Integrity?
Denial of Service (Dos)
Also, the prevention of authorized access to resources or the delaying of time critical operations.
What are the security controls for Integrity?
Security controls for availability includes:
As general controls also include secure system development and incident response.
What type of data is protected by the GDPR regulation?
Personal identifying information
How can we protect aspects of Data Privacy? (Personal identifying information)
The CIA services/goals are quite general. Name the four types of Authentication:
User Authentication
The process of verifying a claimed identity of a legal user when accessing a system or an application.
- Identification, are you who you claimed to be? - Authentication of identification, can you prove that you are who you claim to be? - Main threat: spoofed identity and false login - Security controls: passwords, personal cryptographic tokens, biometrics, cryptographic security/ authentication protocols.