What is Information Security (InfoSec)?
Protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction
Focuses on confidentiality, integrity, and availability of information.
What are the components of the CIA Triad?
Each component plays a crucial role in protecting information.
Define Confidentiality in the context of information security.
Ensures that information is accessible only to authorized users
Example: A hospital must keep patient records confidential.
Define Integrity in the context of information security.
Ensures that information is accurate, complete, and unaltered
Integrity is vital for maintaining trust in data.
Define Availability in the context of information security.
Ensures information and systems are accessible when needed
Essential for operational efficiency.
What is the CNSS Security Model (McCumber Cube)?
A 3D model representing:
* Information States: Transmission, Storage, Processing
* Security Goals: Confidentiality, Integrity, Availability
* Security Measures: Technology, Policies & Practices, Education & Training
Emphasizes a holistic approach to security.
List the components of Information Systems.
Each component plays a role in the overall information system.
True or false: Security must align with business objectives.
TRUE
Organizations face various risks that can impact their objectives.
What are some risks organizations face regarding security?
These risks necessitate a comprehensive security strategy.
What is the need for Information Security in Organizations?
Critical for maintaining operational integrity.
List the security principles.
These principles guide the implementation of security measures.
What are the types of security controls?
Each type serves a different purpose in security management.
Define Threat in cybersecurity.
Potential danger to information systems
Understanding threats is essential for risk management.
Define Attack in cybersecurity.
An actual attempt to exploit vulnerabilities
Attacks can lead to significant security breaches.
List some common attacks in cybersecurity.
Awareness of these attacks is crucial for prevention.
What does CAPEC stand for?
Common Attack Pattern Enumeration and Classification
A database that categorizes attack patterns.
List examples of CAPEC categories.
Understanding these categories helps in anticipating attacks.
What are the categories of Information Security Threats?
Each category presents unique challenges to security.
Define Governance in the context of security.
Policies, roles, and responsibilities to manage security risk
Governance ensures compliance and accountability.
What are the roles in security governance?
Each role contributes to the overall security strategy.
What are the types of Information Security Policies?
These policies guide security practices within organizations.
Define Standards in security.
Mandatory requirements (e.g., ISO 27001)
Standards ensure a baseline level of security.
What are Procedures in security?
Step-by-step methods to achieve security objectives
Procedures provide clarity on implementing security measures.
What are Guidelines in security?
Recommended practices for security implementation
Guidelines help organizations adopt best practices.