Focuses on confidentiality; no read up, no write down.
2
New cards
Biba's Model
Integrity through MAC; no write up and no read down
3
New cards
Clark-Wilson Model
Designed for Businesses to protect Integrity at all levels ("Well formed" Separation of duties and transactions)
4
New cards
Chinese Wall Model
Model designed to avoid conflicts of interest
5
New cards
RBAC Model
Bases controls on Job functions
6
New cards
Confidentiality
John copies Marys homework
7
New cards
Integrity
Gina Forges Rogers signature
8
New cards
Availability
Rhonda registers the domain name \Cocacola.com" and refuses to the soft drink company buy or use that domain name.
9
New cards
TLP:RED
For the eyes and ears of individual recipients only, no further disclosure
10
New cards
TLP:AMBER
Limited disclosure, recipients can only spread this on a need-to-know basis within their organization and its clients
11
New cards
TLP:AMBER+STRICT
Restricts sharing to organization only
12
New cards
TLP:GREEN
Limited disclosure, recipients can spread this within their community
13
New cards
TLP:CLEAR
Recipients can spread this to the world, there is no limit on disclosure
14
New cards
Community
a group who share common goals, practices, and informal trust relationships
15
New cards
Organization
A group who share a common affiliation by formal membership and are bound by common policies.
16
New cards
Clients
people or entities that receive cybersecurity services from an organization.
17
New cards
Govern (GV)
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
18
New cards
Identify(ID)
The organizations current cybersecurity risks are understood
19
New cards
Protect(PR)
Safeguards to manage the organization's cybersecurity risks are used
20
New cards
Detect(DE)
Possible cybersecurity attacks and compromises are found and analyzed
21
New cards
Respond(RS)
Actions regarding a detected cybersecurity incident are taken
22
New cards
Recover(RC)
Assets and operations affected by a cybersecurity incident are restored.
23
New cards
CSF Functions are represented as a wheel because all of the functions relate to one another
True
24
New cards
The CSF provides a basis for improved communication regarding cybersecurity expectations, planning, and resources.
True
25
New cards
Cybersecurity risk management is not essential for addressing privacy risks related to the loss of the confidentiality, integrity, and availability of individuals' data
False
26
New cards
CSF Core
A taxonomy of high-level cybersecurity outcomes that can help any organization manage its cybersecurity risks. Its components are a hierarchy of Functions, Categories, and Subcategories that detail each outcome.
27
New cards
CSF Function
The highest level of organization for cybersecurity outcomes. There are six CSF Functions: Govern, Identify, Protect, Detect, Respond, and Recover
28
New cards
CSF Tier
A characterization of the rigor of an organization's cybersecurity risk governance and management practices.
29
New cards
One-Way
The original data could not be reconstructed from the hash
30
New cards
Diffusion
any variation in the input data should result in changing at least half of the output hash.
31
New cards
Determinism
hashing a given input will always produce the same digest.
32
New cards
Collision resistance
getting the same digest from two different input data should be extremely hard.
33
New cards
Non-predictable
the hash value could not be predicted.
34
New cards
Data Encryption Standard (DES)
One of the earliest symmetric encryption algorithms. It is no longer considered secure and should be avoided.
35
New cards
Triple DES
Performs faster in hardware than software. Although better than DES, it is not the strongest symmetric encryption algorithm
36
New cards
Advanced Encryption Standard (AES)
One of the most popular symmetric encryption algorithms today. There are no known attacks thus, it is often the recommended symmetric encryption algorithm to use
37
New cards
In Asymmetric encryption; if the private key encrypts the data, only the public key can decrypt it. If the public key encrypts the data, only the private key can decrypt it.
38
New cards
RSA is an acronym for its inventors Rivest, Shamir, and Adleman.
True
39
New cards
A digital signature can verify the sender's identity, prevent the sender from denying that they sent the message (known as non-repudiation), and prove the integrity of the message.
True
40
New cards
Digital Signatures leverage the mathematical relationship between symmetric keys
False
41
New cards
Diffie Hellman (DH) is a popular symmetric encryption algorithm that allows two parties that have no prior knowledge of each other to agree on a shared secret over an insecure channel.
False
42
New cards
A computer system without integrity can provide confidentiality
False
43
New cards
A computer system without confidentiality can provide integrity