ISF 32 Questions Ans
ISF 32 Questions Ans
The CIA triad is a fundamental concept in information security, comprising three core principles: Confidentiality,
Integrity, and Availability.
- **Confidentiality:** This principle ensures that information is only accessible to those who have the proper
authorization. Measures such as encryption and access controls are employed to safeguard sensitive data from
unauthorized disclosure.
- **Integrity:** Integrity focuses on maintaining the accuracy and reliability of data. It ensures that information is
not tampered with or altered by unauthorized entities. Hash functions and digital signatures are examples of
techniques used to uphold data integrity.
- **Availability:** Availability guarantees that information and resources are accessible when needed. This involves
preventing disruptions, ensuring system reliability, and implementing strategies like redundancy and backups to
mitigate the impact of potential failures.
Confidentiality in information security refers to the protection of sensitive data from unauthorized access,
disclosure, or exposure. It ensures that only individuals with the appropriate permissions can access certain
information, safeguarding it from unauthorized or malicious entities.
- **Availability:** Availability ensures that information and resources are accessible when needed. It involves
preventing disruptions, ensuring system reliability, and implementing strategies like redundancy and backups to
mitigate the impact of potential failures.
**Security** is a broad concept encompassing measures and practices designed to protect assets, including
information, from unauthorized access, disclosure, alteration, destruction, or disruption. Types of security include:
- **Physical Security:** Protects physical assets like buildings, equipment, and personnel through measures such as
access controls, surveillance, and security personnel.
- **Information Security:** Focuses on safeguarding information from unauthorized access, disclosure, and
alteration, often involving technologies like encryption and access controls.
- **Network Security:** Secures communication and data within computer networks through firewalls, intrusion
detection systems, and secure protocols.
- **Operational Security (OPSEC):** Involves safeguarding sensitive information related to ongoing operations to
prevent adversaries from exploiting vulnerabilities.
- **Authentication:** Authentication is the process of verifying the identity of a user, system, or device. It involves
presenting credentials, such as passwords or biometric data, to confirm that the entity is who it claims to be.
- **Identification:** Identification is the act of claiming an identity. It precedes authentication and involves
presenting an identifier, like a username or ID, without verifying it.
**Access control** is a security measure that regulates who or what can view or use resources in a computing
environment. It includes policies and technologies that manage permissions, restricting access to authorized users and
preventing unauthorized entities from entering.
- **Integrity:** Prevents unauthorized modifications to data, preserving its accuracy and reliability.
- **Availability:** Controls access to resources, reducing the risk of disruptions or misuse.
9) **Explain the steps involved in data security (Authentication, authorization, and access control).**
- **Authentication:** Users provide credentials (e.g., passwords, biometrics) to verify their identity.
- **Authorization:** After authentication, users are granted appropriate permissions based on their roles or
attributes.
- **Access Control:** Implements policies and technologies to enforce authorized access and prevent unauthorized
entry.
**Auditing** involves the systematic examination and evaluation of systems, processes, and activities to ensure
compliance, identify vulnerabilities, and detect security incidents. It is important for:
**Cryptography** is the practice of securing communication by converting information into a code. It involves
techniques such as encryption and decryption to protect data from unauthorized access.
- **Confidentiality:** Encrypting data ensures that it remains confidential and unreadable to unauthorized entities.
- **Non-Repudiation:** Cryptographic techniques can prevent individuals from denying their actions.
- **Encryption:** The process of converting plaintext (readable data) into ciphertext (unreadable data) using an
algorithm and a key.
- **Decryption:** The reverse process of converting ciphertext back into plaintext using a key.
Data in motion is protected by employing secure communication protocols such as SSL/TLS, which encrypt data
during transmission. This ensures that even if intercepted, the data remains unreadable to unauthorized entities.
**Data at rest** refers to stored data, such as files on a disk. It is protected using encryption to prevent
unauthorized access to the stored information.
**Data in use** refers to actively processed data in a computer's memory. Protecting it involves encryption and
access controls to ensure that only authorized processes can access and manipulate the data.
OPSEC involves:
OPSEC is crucial because it prevents adversaries from obtaining critical information, ensuring the success and
security of ongoing operations.
- **If the information can be obtained from publicly available sources, it is not sensitive.**
24) **Mention the difference between Physical security and network security.**
- **Physical Security:** Involves measures to protect physical assets, including buildings, equipment, and
personnel.
- **Network Security:** Focuses on securing communication and data within computer networks.
- **Protects Assets:** Safeguards physical assets from theft, damage, or unauthorized access.
28) **What are the physical security measures you would take to secure the devices in a computer lab?**
- **Encryption (SSL/TLS):** Securing data transmitted between the server and users.
**Network traffic** refers to the data transmitted between devices on a network. It includes communication
between servers, computers, and other networked devices.
- **Virtual Private Networks (VPNs):** Ensuring secure communication over the network.