Comprehensive Cybersecurity and SDLC Principles for Information Systems

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Hardware

The main technology that executes software, stores and carries data, and provides an interface to enter and retrieve information from the system.

2
New cards

Physical security policies

Ensure that important hardware is secured by keeping it in a restricted area.

3
New cards

System Development Life Cycle (SDLC)

Provides a methodology to design and implement an information system for an organization in a systematic way.

4
New cards

Information security

Must protect data during three stages: store, processing, and transmission.

5
New cards

Investigation phase

The first phase of SDLC.

6
New cards

Analysis phase

The second phase of SDLC.

7
New cards

Maintenance phase

The last phase of SDLC.

8
New cards

Design phase

In SDLC, security designers propose alternative solutions to the problem.

9
New cards

Implementation phase

When the approved solution is developed and implemented in SDLC.

10
New cards

Analysis Phase of SDLC

Uses results of the previous phase to analyze: objectives of the project, status of the organization, and integration with the new security system.

11
New cards

CIA Model

Can be used to protect the data during transmission.

12
New cards

Network security

Refers to the security of routers, bridges, switches, and TCP connections.

13
New cards

Protecting networks from unauthorized access

Can involve using Firewalls and Intrusion Detection Systems.

14
New cards

SDLC

Stands for System Development Life Cycle.

15
New cards

First phase of SDLC

Define the Project Scope and stakeholders.

16
New cards

Significance of Secure SDLC

SDLC provides a methodology to design, develop, and implement an information security system for an organization in a systematic way.

17
New cards

Secure SDLC in a real-world project

Gather requirements in the context of security, analyze the existing system and integration needs, address missing features, and follow each SDLC phase systematically.

18
New cards

Computer Security

Ensures that computer systems are working properly and available to authorized users whenever needed.

19
New cards

Information system

Has six main components: Data, Software, Hardware, Network, Procedures, and People.

20
New cards

Confidentiality

Refers to hiding information from people who are not authorized to view that information.

21
New cards

Confidentiality significance

Prevents an organization from passive attacks.

22
New cards

HASH algorithm

One way to ensure data integrity.

23
New cards

Message authentication

Ensures that information received is not modified during transmission.

24
New cards

Data Integrity

Prevents an organization from active attacks.

25
New cards

Encryption

Ensures confidentiality of transmitted packets.

26
New cards

Communication security

The security of organization's media, technology, and content.

27
New cards

Personal security

The security of all the stakeholders (people authorized to access the organization & operations).

28
New cards

Operation security

The security of internal operations or activities done daily.

29
New cards

Physical security

The security of items, objects, and areas that physically exist in the organization from unauthorized access or misuse.

30
New cards

User authentication

Ensures that the received message has not been modified during transmission.

31
New cards

Files on your computer

Can be made unreadable to others by using Encryption.

32
New cards

CIA

Stands for Confidentiality, Integrity, and Availability.

33
New cards

Availability

Means resources should be accessible at the required time and usable only by the authorized entity.

34
New cards

People Security

Protects individuals or groups authorized to access an organization.

35
New cards

Active attack

Attacker intercepts packets and modifies before retransmission to the destination.

36
New cards

Passive attack

Attacker intercepts packets and reads contents without making modifications.

37
New cards

Digital Signature

Used to verify sender's identity.

38
New cards

CIA Model goals

Confidentiality: Use encryption/decryption to protect sensitive info; Integrity: Ensure stored and transmitted info isn't altered by unauthorized users; Availability: Ensure all resources are available to authorized users whenever needed.