mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-24 21:34:06 -06:00
vault backup: 2022-07-14 17:26:50
This commit is contained in:
parent
bda886bbb2
commit
ed2eacedfd
@ -29,11 +29,70 @@ e.g.,
|
|||||||
|
|
||||||
# Security services and control
|
# Security services and control
|
||||||
- services
|
- services
|
||||||
- the intended security goal or property (C.I.C provides the three main security services)
|
- the intended security goal or property (C.I.A provides the three main security services)
|
||||||
|
- confidentiality
|
||||||
|
- integrity
|
||||||
|
- awareness
|
||||||
- controls
|
- controls
|
||||||
- the mechanisms employed to implement the services
|
- the mechanisms employed to implement the services
|
||||||
|
- encryption
|
||||||
|
- firewalls
|
||||||
|
- awareness
|
||||||
|
|
||||||
|
## Controls
|
||||||
|
- physical controls
|
||||||
|
- facility protection
|
||||||
|
- guards
|
||||||
|
- locks
|
||||||
|
- monitoring
|
||||||
|
- environment controls
|
||||||
|
- intrustion detection
|
||||||
|
- technical controls
|
||||||
|
- network security
|
||||||
|
- cryptography
|
||||||
|
- forensics
|
||||||
|
- user authentication
|
||||||
|
- etc
|
||||||
|
- administrative controls
|
||||||
|
- policies
|
||||||
|
- standards
|
||||||
|
- procedures
|
||||||
|
- guidelines
|
||||||
|
- personnel screening
|
||||||
|
- awareness training
|
||||||
|
|
||||||
|
- Preventive
|
||||||
|
- e.g., "prevent exposure of critical information"
|
||||||
|
- control - e.g., encrpytion
|
||||||
|
- detective
|
||||||
|
- e.g., "we want to warn attempts of intrustions"
|
||||||
|
- control - e.g., intrusion detection systems
|
||||||
|
- corrective
|
||||||
|
- reduce/fix damage
|
||||||
|
- e.g., "we want to repair our system in case of errors"
|
||||||
|
- conrtol - e.g., restoration point mechanisms (e.g., version control systems like [git](notes/git.md))
|
||||||
|
|
||||||
|
- we need security controls for all info states:
|
||||||
|
- storage
|
||||||
|
- information storage containers
|
||||||
|
- electronic, physical, human
|
||||||
|
- transmission
|
||||||
|
- physical or electronic
|
||||||
|
- processing
|
||||||
|
- physical or electronic
|
||||||
|
|
||||||
# CIA
|
# CIA
|
||||||
|
- a security service provides a high level security property
|
||||||
|
|
||||||
|
## Confidentiality
|
||||||
|
- information should not be available to unauthorised people
|
||||||
|
- divided into:
|
||||||
|
- secrecy: protecting business data
|
||||||
|
- privacy: protecting personal data
|
||||||
|
- anonymity: hide who is engaging in what actions
|
||||||
|
- threats: information theft, unintentional disclosure
|
||||||
|
- controls: encyption, access control, perimeter defense
|
||||||
|
- general controls: secure systems development, and incident response
|
||||||
|
|
||||||
# Privacy and Actions
|
# Privacy and Actions
|
||||||
|
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user