Chapter 1 Flashcards

1
Q

AAA

A

Identification
Authentication
Authorization
Auditing
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Management Planning

A

Strategic plan - long term 5 years
Tactical plan - 1 year
Operational plan - detailed short-term to support strategic and tactical plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Most important to do for organization, hardware, software, service acquisition

A

Identify risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security roles (CISSP)

A

Senior management (approve policy)
Security professional (write policy and implement)
Asset owner (responsible for protection; security classifications)
Custodian (day to day protection activities)
User
Auditor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COBIT
- security framework reference
- used for auditing

A

6 Principles:
1. Provide Stakeholder Value
2. Holistic Approach
3. Dynamic Governance System
4. Governance Distinct from Management
5. Tailored to Enterprise Needs
6. End-to-End Governance System

4 Domains:
1. Plan and organize
2. Acquire and implement
3. Deliver and support
4. Monitor and evaluate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SABSA
(Sherwood Applied Business Security Architecture)

A

Risk-driven and business focused security architecture; often used by large orgs

  • Risk focused
  • Business driven
  • Layered approach: business context, information domain, systems, technology, physical security
  • is a Framework and Methodology
  • offers Certification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PCI DSS

A

Key components:
- Data security
- Network security
- Access control
- Regular monitoring & testing
- Info security policies
- Vulnerability mgmt
- Physical security
- Incident response planning
- Compliance audits - thru Qualified Security Assessors (QSA) or internal security assessors (ISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FedRAMP
(Federal Risk and Authorization Mgmt Program)

A
  • For cloud services used by fed agencies
  • To standardize security assessment, authorization and continuous monitoring of cloud products and services

Key elements:
- Security standardization
- Authorization process
- Continuous monitoring
- Reuse authorizations - from one agency to another
- Collaboration - agency, CSP, 3rd party assessor
- 3 impact levels
- Provides a Compliance framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Due Diligence - planning
Due Care - implementing

A

Senior management - show due diligence and due care

Due diligence - Do detect
Due care - Do correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Documentation review

A

For gov’t agencies
ATO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Management Plan:
Policy, Standards, Procedures, Guidelines

A

Policy - scope
Standards - support policy
Baseline - minimum level of security for all assets, systems, etc. must meet
Procedures - satisfy standards
Guidelines - recommendations only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat Modeling
- Identify
- Categorize
- Analyze

A

STRIDE - Microsoft, s/w development, threat categorization
PASTA - risk centric around value of assets
VAL - for agile development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

STRIDE

A

Spoof
Tampering
Repudiation
Info disclosure
Denial of service
Elevation of privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PASTA
(Threat modeling)

A

7 stages:
Stage I: Definition of the Objectives (DO) for the Analysis of Risks
Stage II: Definition of the Technical Scope (DTS)
Stage III: Application Decomposition and Analysis (ADA)
Stage IV: Threat Analysis (TA)
Stage V: Weakness and Vulnerability Analysis (WVA)
Stage VI: Attack Modeling & Simulation (AMS)
Stage VII: Risk Analysis & Management (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reduction analysis or decomposition of system

A

Diagram that shows:
Trust boundaries
Data flow
Input points
Privilege operations
Security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat modeling - Focus on threats
Risk assessment - Focus on assets

17
Q

Rank threats (Threat modeling)

A

Probability x Damage
High/Med/Low Matrix
DREAD

18
Q

DREAD
(Rank threats)

A

Damage potential
Reproducibility
Exploitability
Affected users
Discoverability

19
Q

Security must be cost-effective

A

Select controls that provide most protection with lowest cost

20
Q

Defense in breadth
Diversity of defense

A

Use range of security products from different vendors

21
Q

Supply Chain Risk Mgmt
(SCRM)

A

SLR - requirements
SLA - agreement to satisfy requirements

Each link should be responsible and accountable to the next

SCRM should incorporate:
- silicon RoT
- PUF
- SBOM

Incorporate Silicon Root of Trust (RoT) - collection of sw and hw to ensure CIA of system’s boot process and software
- Tamper resistant
- Secure boot
- Crypto operations
- Remote attestation - allow remote entities to verify trustworthiness

PUF - physically unclonable function; hw component that creates unique signature for the electronic device or IC

SBOM - Software Bill of Materials