Chapter 1: Information Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Chapter 1: Information Security by Mind Map: Chapter 1: Information Security

1. Information Definition

1.1. the state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.

2. Areas In Information Security

2.1. Physical Security

2.2. Operational Security

2.3. Management & Policies

3. Security Threats

3.1. Categories

3.1.1. Data Disclosure

3.1.1.1. Exposure of data to third parties.key point to consider is whether the disclosure is relevant and necessary.

3.1.2. Data Modification

3.1.2.1. A modification attack is an attempt to modify information that an attacker is not authorized to modify

3.1.3. Data Availability

3.1.3.1. is the process of ensuring that data is available to end users and applications, when and where they need it

3.2. Activities

3.2.1. Hacking

3.2.1.1. gain unauthorized access to data in a system or computer.

3.2.2. Cracking

3.2.2.1. cracking specifically refers to hacking practice, but with criminal intent.

3.2.3. Spoofing

3.2.3.1. spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls.

3.2.4. Sniffing

3.2.4.1. Sniffing involves capturing, decoding,inspecting and interpreting the information inside a network packet on a TCP/IP network.To steal information, usually user IDs, passwords,network details,credit card numbers, etc.

4. Issues Of On-line Security

4.1. Internet services

4.1.1. Electronic Mail and News

4.1.2. File Transfer

4.1.3. Remote Access to Hosts

4.1.4. Real-time Conferencing Services

4.2. Terminologies

4.2.1. Information Theft

4.2.1.1. Attacks that allow an attacker to get data without ever having to directly use your computers.

4.2.2. Unauthorized Disclosure

4.2.2.1. Attacks that allow an attacker to get data without ever having to directly use your computers.

4.2.3. Information Warfare

4.2.3.1. Is the use and management of information in pursuit of a competitive advantage over an opponent.

4.2.4. Accidental Data Loss

4.2.4.1. Most common data loss cause, simply accidentally deleting a file that wasn't supposed to be deleted.

5. Roles of The Information Security Organizations

5.1. CERT/CC

5.1.1. for the Software Engineering Institute (SEI), a non-profit United States federally funded research and development center.

5.2. US-CERT

5.2.1. responsible for analyzing and reducing cyber threats, vulnerabilities, disseminating cyber threat warning information, and coordinating incident response activities.

5.3. SANS Institute

5.3.1. for training include cyber and network defenses, penetration testing, incident response, digital forensics, and audit.

5.4. (ISC)2

5.4.1. is a non-profit organization which specializes in information security education and certifications

5.5. Common Criteria

5.5.1. A framework in which computer system users can specify their security functional and assurance requirements through the use of vendors can then implement or make claims about the security attributes of their products

5.6. FIPS

5.6.1. are issued to establish requirements for various purposes such as ensuring computer security and interoperability, and are intended for cases in which suitable industry standards do not already exist.

5.7. ICSA

5.7.1. Its mission was to increase awareness of the need for computer security and to provide education about various security products and technologies.

6. Goals Of Information Security

6.1. Confidentiality

6.1.1. he state of keeping or being kept secret or private.

6.2. Integrity

6.2.1. Assurance that data is not altered or destroyed in an unauthorized manner

6.3. Availaibility

6.3.1. Continuous operation of computing systems