ISP152 - Topic 2 slides Flashcards

(17 cards)

1
Q

What are the three core principles of information security?

A
  • Confidentiality
  • Integrity
  • Availability

These principles are often referred to as the CIA Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Parkerian Hexad expands the CIA Triad by adding which four elements?

A
  • Possession
  • Authenticity
  • Utility
  • Integrity (Parker)

This model provides a more comprehensive view of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four types of security attacks mentioned?

A
  • Interception
  • Interruption
  • Modification
  • Fabrication

These attacks target data at rest or in motion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define threat, vulnerability, and risk in the context of information security.

A
  • Threat: Potential action that can harm systems
  • Vulnerability: Weakness that can be exploited
  • Risk: Likelihood of harm when both exist

Understanding these concepts is crucial for effective security management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the five steps in the risk management process.

A
  • Identify key assets
  • Identify threats
  • Identify vulnerabilities
  • Assess risks
  • Mitigate risks

This process helps in managing potential security risks effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four stages of an Incident Response Plan?

A
  • Preparation
  • Detection & Analysis
  • Containment, Eradication, Recovery
  • Post-Incident

These stages help organizations respond effectively to security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false: Identification alone is a reliable method for confirming a user’s identity.

A

FALSE

Verification is necessary to confirm identity claims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the common methods of authentication?

A
  • Passwords
  • Biometrics
  • Hardware tokens

Each method has its strengths and weaknesses in terms of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does authorisation determine in information security?

A

What an authenticated user is allowed to do

It is essential for managing access to systems and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the two types of access controls.

A
  • Physical
  • Logical

Physical controls include keys and access cards, while logical controls include passwords and software permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of non-repudiation in accountability?

A

Ensures actions can be traced to a specific individual

This is crucial for maintaining accountability in information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two types of audits mentioned?

A
  • Internal Audits
  • External Audits

Internal audits review compliance with internal rules, while external audits ensure compliance with legal regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does regulatory compliance involve?

A

Adherence to legally mandated rules

It is verified through audits and is a business requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three types of controls in compliance?

A
  • Physical
  • Administrative
  • Technical

Each type plays a role in reducing risk and ensuring compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does NIST stand for and what does it set?

A

National Institute of Standards and Technology; sets security standards

These standards are often adopted into law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the ISO/IEC 27001 standard for?

A

Requirements for security management systems

It is part of a series of standards related to information security.

17
Q

What is the difference between IaaS, PaaS, and SaaS?

A
  • IaaS: Infrastructure as a Service
  • PaaS: Platform as a Service
  • SaaS: Software as a Service

Each model has different responsibilities for security between the provider and the user.