Professional Ethics & Security Flashcards

(12 cards)

1
Q

What are the 4 Code of Ethics Canons?

A
  1. Protect society, the common good, necessary public trust and confidentiality and the infrastructure
  2. Act honorably, honestly, justly, responsibly and legally
  3. Provide diligent and competent service to principals
  4. Advance and protect the profession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Confidentiality?

A

Measures the attackers ability to get unauthorized data or access to information from an applicant or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Integrity?

A

Measures an attackers ability to manipulate, change or remove data at rest and data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Availability ?

A

Measures the attackers ability to disrupt or prevent access to services or data in a client-server or distributed environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authenticity?

A

The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, message and message originator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Solutions for Authenticity?

A

Integrated Identity Platforms:

  • Companies such as IdRamp allow you to manage all systems, services and applications from one executive dashboard

-Passwordless (QR code on endpoints), bring your own identity (BYOI), Zero Trust

-Zero Trust Network Access (ZTNA) - a technology that makes it feasible to implement zero trust security model. ZT is an IT security initiative that accepts that threats exist inside and outside of a network. ZTNA demands strict authentication and identification for every subject before authorizing them to access internal resource objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Non-repudiation?

A

the inability to refuse participation in a digital transaction, contract, or email communication (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are solutions for Availability?

A
  • Introducing controls against Distributed denial-of-service (DDoS) and botnets
  • Assuring that security infrastructure devices are deployed in a active-standby or active -active clusters
  • Contributing to business continuity and disaster recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are solutions for Integrity?

A

Involves implementing cryptographic hashing, hash-based message authentication codes (HMAC), and digital signing mechanisms to assure only authorized subjects can change sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Clark-Wilson integrity models?

A

is a mandatory access control model that provides a structure for describing and analyzing an integrity policy for computing systems based on:

-Established transitions from one reliable state to another reliable state

-The principle of separation of duties - the guarantor of the transition and the deployer of the transaction are two separate participants

-Security policies that relate directly to transition integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are solutions for Confidentiality?

A

-WPA3 cryptography - 192 bits crypto machismo in WPA3-enterprise mode. Dictates CCMP-128 as the minimum level encryption

-Confidentially computing - WAS Nitro enclave is a hardened and heavily insulated compute environment that is initiated and connected to the consumers instance of a virtual machine like windows, Linux, or macOS. No user, including admin or root, nor any application running on the virtual machine =has interactive access to the enclave

  • Homomorphic encryption - innovative solution that contributes to a zero-trust initiative by protecting data-in-user in untrusted domains (clou) within the need to decrypt the process involved the transformation of data into ciphertext that can be analyzed and worked on as if it were still in it original form. User asymmetrical algorithms and multifaceted algebraic functions to act upon encrypted data0-in-use within affecting the existing encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Organizational Code of Ethics?

A

is a set of core guiding principles to notify how and why decisions are made and informs all stakeholders how the company delivers the core ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly