The CIA Triad is the combination of confidentiality, integrity, and availability. This term is used to indicate the three key components of a security solution.
The requirements of accountability are identification, authentication, authorization, and auditing.
Each of these components needs to be legally supportable to truly hold someone accountable for their actions.
The benefits of change control management include preventing unwanted security reduction because of uncontrolled change, documenting and tracking of all alterations in the environment, standardization, conforming with security policy, and the ability to roll back changes in the event of an unwanted or unexpected outcome.
(1) Identify the custodian, and define their responsibilities.
(2) Specify the evaluation criteria of how the information will be classified and labeled.
(3) Classify and label each resource. Although the owner conducts this step, a supervisor should review it.
(4) Document any exceptions to the classification policy that are discovered, and integrate them into the evaluation criteria.
(5) Select the security controls that will be applied to each classification level to provide the necessary level of protection.
(6) Specify the procedures for declassifying resources and the procedures for transferring custody of a resource to an external entity.
(7) Create an enterprise-wide awareness program to instruct all personnel about the classification system.
The six security roles are senior management, IT/security staff, owner, custodian, operator/user, and auditor.
The four components of a security policy are policies, standards, guidelines, and procedures.
A. A network’s border perimeter
B. The CIA Triad
C. A stand-alone system
D. The Internet
B. The primary goals and objectives of security are confidentiality, integrity, and availability, commonly referred to as the CIA Triad.
A. One or more of the CIA Triad principles
B. Data usefulness
C. Due care
D. Extent of liability
A. Vulnerabilities and risks are evaluated based on their threats against one or more of the CIA Triad principles.
A. Identification
B. Availability
C. Encryption
D. Layering
B. Availability means that authorized subjects are granted timely and uninterrupted access to objects.
A. Stealing passwords
B. Eavesdropping
C. Hardware destruction
D. Social engineering
C. Hardware destruction is a violation of availability and possibly integrity. Violations of confidentiality include capturing network traffic, stealing password files, social engineering, port scanning, shoulder surfing, eavesdropping, and sniffing.
A. Violations of confidentiality include human error.
B. Violations of confidentiality include management oversight.
C. Violations of confidentiality are limited to direct intentional attacks.
D. Violations of confidentiality can occur when a transmission is not properly encrypted.
C. Violations of confidentiality are not limited to direct intentional attacks. Many instances of unauthorized disclosure of sensitive or confidential information are due to human error, oversight, or ineptitude.
A. Accountability
B. Availability
C. Nonrepudiation
D. Integrity
D. Without integrity, confidentiality cannot be maintained.
A. Control
B. Audit
C. Access
D. Repudiate
C. Accessibility of data, objects, and resources is the goal of availability. If a security mechanism offers availability, then it is highly likely that the data, objects, and resources are accessible to authorized subjects.
A. Integrity
B. Privacy
C. Authentication
D. Accountability
B. One definition of privacy is freedom from being observed, monitored, or examined without consent or knowledge.
A. Restricting personal email
B. Recording phone conversations
C. Gathering information about surfing habits
D. The backup mechanism used to retain email messages
D. Users should be aware that email messages are retained, but the backup mechanism used to perform this operation does not need to be disclosed to them.
A. Classification
B. Physical access
C. Custodian responsibilities
D. Taking ownership
D. Ownership grants an entity full capabilities and privileges over the object they own. The ability to take ownership is often granted to the most powerful accounts in an operating system because it can be used to overstep any access control limitations otherwise implemented.
A. CIA Triad
B. Abstraction
C. Nonrepudiation
D. Hash totals
C. Nonrepudiation ensures that the subject of an activity or event cannot deny that the event occurred.
A. Multiple
B. Series
C. Parallel
D. Filter
B. Layering is the deployment of multiple security mechanisms in a series. When security restrictions are performed in a series, they are performed one after the other in a linear fashion. Therefore, a single failure of a security control does not render the entire solution ineffective.
A. Preventing an authorized reader of an object from deleting that object
B. Keeping a database from being accessed by unauthorized visitors
C. Restricting a subject at a lower classification level from accessing data at a higher classification level
D. Preventing an application from accessing hardware directly
A. Preventing an authorized reader of an object from deleting that object is just an example of access control, not data hiding. If you can read an object, it is not hidden from you.
A. Maintaining documentation
B. Keeping users informed of changes
C. Allowing rollback of failed changes
D. Preventing security compromises
D. The prevention of security compromises is the primary goal of change management.
A. To control access to objects for authorized subjects
B. To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity
C. To establish a transaction trail for auditing accountability
D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality
B. The primary objective of data classification schemes is to formalize and stratify the process of securing data based on assigned labels of importance and sensitivity.
A. Value
B. Size of object
C. Useful lifetime
D. National security implications
B. Size is not a criterion for establishing data classification. When classifying an object, you should take value, lifetime, and security implications into consideration.
A. Military and private sector
B. Personal and government
C. Private sector and unrestricted sector
D. Classified and unclassified
A. Military (or government) and private sector (or commercial business) are the two common data classification schemes.
A. Sensitive
B. Secret
C. Sensitive but unclassified
D. Private
B. Of the options listed, secret is the lowest classified military data classification. Keep in mind that items labeled as confidential, secret, and top secret are collectively known as classified, and confidential is below secret in the list.