Chapter 9 Flashcards

1
Q

Comparing Physical Security Controls

A

Perimeter. Military bases and many other organizations erect a fence around the entire perimeter of their land. They often post security guards at gates to control access. In some cases, organizations install barricades to block vehicles.

Buildings. Buildings commonly have additional controls for both safety and security. For example, guards and locked doors restrict entry so only authorized personnel enter. Many buildings include lighting and video cameras to monitor the entrances and exits.

Secure work areas. Some companies restrict access to specific work areas when employees perform classified or restricted access tasks. In some cases, an organization restricts access to all internal work areas. In other words, visitors can enter the lobby of a building,

Server rooms. Servers and network devices such as routers and switches are normally stored in areas where only the appropriate IT personnel can access them.

Hardware. Additional physical security controls protect individual systems. For example, server rooms often have locking cabinets to protect servers and other equipment installed in the equipment bays. Cable locks protect laptop computers, and smaller devices can be stored in safes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Badges

A

It’s possible to secure access to areas with proximity cards or smart cards that serve as access badges. Proximity cards are small credit card-sized cards that activate when they are close to a proximity card reader. Many organizations use these for access points, such as the entry to a building or the entry to a controlled area within a building. The door uses an electronic lock that only unlocks when the user passes the proximity card in front of a card reader.

Proximity cards are typically credit card-sized access cards. Users pass the card near a proximity card reader, and the card reader then reads data on the card. Some access control points use proximity cards with PINs for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security guards

A

Many organizations use security guards to control access to buildings and secure spaces. If employees have access badges, guards can check these badges before granting the employees access. Even if access badges aren’t used, guards can still verify people’s identities using other identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

video surveillance.

A

Video surveillance provides the strong proof of a person’s location and activity. Digital access logs provide a record,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Noise detection.

A

Noise detection sensors can detect any noise or when noise exceeds a certain level. They work like motion detection sensors and alert on any sound to control lights or set off alarms. Some Airbnb hosts don’t want renters throwing parties in their houses. They can use noise sensors to detect when the noise levels exceed a certain level. Some noise sensors can detect specific sounds, such as smoke alarms or the sound of glass breaking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrared.

A

Infrared sensors detect heat signatures in the form of infrared radiation emitted by people, animals, or objects. These sensors are commonly used for security purposes, as they can detect the presence of people or animals even in complete darkness. They are often integrated into security cameras and alarm systems to improve their detection capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pressure.

A

Pressure sensors are designed to detect changes in pressure on a surface or in a specific area. These sensors can be used to detect when someone is walking on a floor or stepping on a mat. They can also be used to monitor doors and windows for forced entry attempts. In addition, pressure sensors can be used in access control systems to ensure that only authorized individuals can enter restricted areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ultrasonic..

A

Ultrasonic sensors emit high-frequency sound waves and measure the time it takes for the sound waves to bounce back after hitting an object or surface. These sensors are used to detect the presence of people or objects and can also be used to measure distance. Ultrasonic sensors are commonly used in parking assistance systems, robotic navigation, and intrusion detection systems.

Remember This! Sensors monitor the environment and can detect changes. Common sensor types include motion and noise detection as well as sensors designed to monitor infrared temperature, pressure, microwaves, and ultrasonic waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fencing, Lighting, and Alarms

A

Fences provide a barrier around a property and deter people from entering. When using a fence, it’s common to control access to the area via specific gates. Guards often monitor these gates and ensure only authorized individuals can enter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access control vestibules

A

Access control vestibules are critical components in data center security. As the first line of defense against unauthorized entry, these secure entry points provide a physical barrier between the outside world and the valuable assets housed within the data center.

An access control vestibule consists of two sets of interlocking doors, designed to create a secure compartment that allows only one person to enter at a time. These entry points are usually equipped with advanced security measures, such as biometric scanners, RFID card readers, or even facial recognition systems. These systems verify the identity of the individual seeking access, ensuring that only authorized personnel can gain entry. Access control vestibules prevent tailgating and deter unauthorized entry by trapping an individual between the two sets of doors if they attempt to bypass security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asset Management

A

Asset management is the process of tracking valuable assets throughout their life cycles. Asset management programs should include hardware, software, and data assets. From a security perspective, these asset management programs ensure that the organization knows what assets it owns, where those assets are located, and how they are secured. The core activities of any asset management program include:

An acquisition/procurement process that provides consistent procedures for identifying the need for new assets, evaluating the possible options for security, financial, and business requirements, and effectively onboarding and managing new vendors.

An assignment/accounting process that assigns each asset to a named owner who bears responsibility for the asset and a classification system that identifies the sensitivity and criticality of each asset to the organization.

A monitoring and asset tracking process that maintains an inventory of all of the assets owned by the organization and their current location. This process also benefits from periodic enumeration of assets where auditors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hardware Asset Management

A

Organizations commonly implement hardware asset management processes to track servers, desktop computers, laptop computers, routers, switches, and other hardware assets. An effective asset management system can help reduce several vulnerabilities:

Architecture and design weaknesses. Asset management helps reduce architecture and design weaknesses by ensuring that purchases go through an approval process. The approval process does more than just compare costs. It also evaluates the purchase to ensure it fits in the overall network architecture.

System sprawl and undocumented assets.
System sprawl occurs when an organization has more systems than it needs, and the systems it owns are underutilized. Asset management begins before the hardware is purchased and helps prevent system sprawl by evaluating the purchase. Additionally, after the purchase is completed, asset management processes ensure the hardware is added to the asset management tracking system. This ensures that the assets are managed and tracked from the cradle to the grave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software Asset Management

A

Software asset management involves tracking and managing software licenses, installations, and usage within an organization. It helps ensure compliance with licensing agreements, optimizes software usage, and minimizes the risk of security vulnerabilities associated with unpatched or unauthorized software. Effective software asset management includes processes for acquiring, cataloging, and updating software, as well as monitoring usage and ensuring that licenses are maintained and renewed as necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Asset Management

A

Data asset management focuses on the organization’s data assets, including databases, files, and other information repositories. It involves defining data ownership, classification, and access controls, as well as ensuring the integrity, availability, and confidentiality of data. Key aspects of data asset management include data governance, data quality management, and data lifecycle management. These processes help organizations maintain accurate, up-to-date, and secure data assets, enabling better decision-making and reducing the risk of data breaches or loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Platform Diversity

A

Defense in depth (also known as layered security) refers to the security practice of implementing several layers of protection. You can’t simply take a single action, such as installing locks at the entrance of a building and consider yourself protected. You must implement security at several different layers. This way, if one layer fails, you still have additional layers to protect you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vendor diversity

A

Vendor diversity is the practice of implementing security controls from different vendors to increase security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Technology diversity

A

Technology diversity is the practice of using different technologies to protect an environment. For example, an organization may choose a data server room. They may start by limiting the access points, adding biometric locks to open the doors, and monitoring the access points with a CCTV system.
.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Control diversity

A

Control diversity is the use of different security controlcontrol categories, such as technical controls, physical controls, managerial controls, and operational controls. For example, technical security controls such as firewalls, intrusion detection systems (IDSs), and proxy servers help protect a network. Physical security controls can provide extra protection for the server room or other areas where these devices are located. Managerial and operational controls such as vulnerability assessments and penetration tests can help verify that these controls are working as expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Physical Attacks

A

We use physical security controls to protect against physical attacks. Our adversaries have a number of tools at their disposal to try to undermine our physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Card Skimming and Card Cloning

A

Credit card skimming is the practice of capturing credit card data at the point of sale. Attackers often place a skimmer on automated teller machines (ATMs) or gas stations where users swipe their credit cards. The skimmer captures the data on the magnetic strip but also allows the transaction to go through. Some signs of a credit card skimmer are a broken security seal, a loose credit card reader, or a credit card reader that extends past the panel.

Card cloning refers to making a copy of a credit card using data captured from a magnetic strip. Attackers copy the data onto a blank card or overwrite the data on a stolen card. This is relatively easy to do when using the magnetic strip of a credit card. However, the use of chips in credit cards makes it much harder to copy because the chip encrypts the data. The primary indicator of a cloned credit card is unauthorized or fraudulent charges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Brute Force Attacks

A

Brute force attacks against physical security attempt to simply crash right through physical security controls. For example, someone might try to drive a vehicle through the front door of a building to gain access to the facility. Or a brute force attack may be less dramatic, such as standing at the keypad used to protect access to a room and trying every possible combination of four-digit passcodes. Brute force attacks are very simple but they can be effective. They are also usually easily detectable in organizations with good security monitoring programs.

22
Q

Environmental Attacks
.

A

If an attacker is able to disrupt these conditions by cutting off power to a facility, raising the temperature to cause equipment overheating, flooding it with water, or causing a similar catastrophe, those environmental attacks can be quite damaging.

23
Q

Adding Redundancy and Fault Tolerance

A

Redundancy adds duplication to critical system
components and networks and provides fault tolerance. If a critical component has a fault, the duplication allows the service to continue as if a fault never occurred. In other words, a system with fault tolerance can suffer a fault, but it can tolerate it and continue to operate. Organizations often add redundancies to eliminate single points of failure:

Disk redundancies using RAID

NIC redundancy with NIC teaming

Server redundancies by adding load balancers

Power redundancies by adding dual power supplies, generators and/or UPSes

Site redundancies by adding hot, cold, or warm sites

24
Q

Single Point of Failure

A

Disk. If a server uses a single drive, the system will crash if the single drive fails. A redundant array of inexpensive disks (RAID) provides fault tolerance for hard drives and is a relatively inexpensive method of adding fault tolerance to a system.

Server. If a server provides a critical service and its failure halts the service, it is a single point of failure. Load balancing provides fault tolerance for critical servers.

Power. If an organization only has one source of power for critical systems, the power is a single point of failure. However, elements such as uninterruptible power supplies (UPSes) and power generators provide fault tolerance for power outages.

Personnel. If there are tasks within an organization that only one person can perform, that person becomes a single point of failure.

Remember A single point of failure is any component whose failure results in the failure of an entire system. Elements such as RAID, load balancing, UPSes, and generators remove many single points of failure. RAID is an inexpensive method used to add fault tolerance and increase availability. If only one person knows how to perform specific tasks, that person can become a single point of failure.

25
Disk Redundancies
Most prone to failure. redundant array of inexpensive disks (RAID) RAID-0 RAID-0 (striping) Fast no fault tolerance RAID-1 (mirroring) uses two disks. Data written to one disk is also written to a second disk. If one of the disks fails, the other disk still has all the data, so the system can continue to operate without any data loss. RAID-5 and RAID-6 A RAID-5 is three or more disks that are striped together, similar to RAID-0. However, the equivalent of one drive includes parity information. This parity information is striped across each of the drives in a RAID-5 and provides fault tolerance. If one of the drives fails, the disk subsystem can read the remaining drives’ information and re-create the original data. If two of the drives fail in a RAID-5, the data is lost. RAID-6 is an extension of RAID-5. The big difference is that it uses an additional parity block and requires an additional disk. A huge benefit is that the RAID-6 disk subsystem will continue to operate even if two disk drives fail. RAID-6 requires a minimum of four disks. RAID-10 A RAID-10 configuration combines the features of mirroring (RAID-1) and striping (RAID-0). RAID-10 is sometimes called RAID 1+0. A variation of RAID-10 is RAID-01 or RAID 0+1 that also combines mirroring and striping features but implements the drives differently. The minimum number of drives in a RAID-10 is four. When adding more drives, you add two more (or multiples of two, such as four, six, and so on). If you have four 500-GB drives used in a RAID-10, you have 1 TB of usable storage. Remember This! RAID subsystems, such as RAID-1, RAID-5, and RAID-6, provide fault tolerance and increased data availability. RAID-1 and RAID-5 can survive the failure of one disk, and RAID-6 can survive the failure of two disks.
26
Server Redundancy and High Availability
High availability refers to a system or service that needs to remain operational with almost zero downtime. It’s possible to achieve 99.999 percent uptime, commonly called “five nines” by implementing redundancy and fault tolerance methods. This equates to less than 6 minutes of downtime a year:
27
Active/Active Load Balancers
An active/active load balancer can optimize and distribute data loads across multiple computers or multiple networks. For example, if an organization hosts a popular website, it can use multiple servers hosting the same website in a web farm. Load-balancing software distributes traffic equally among all the servers in the web farm, typically located in a DMZ. Active/active load balancing is one way to implement a concept known as clustering, where several different servers work together to appear as one resource to end users. The term load balancer makes it sound like it’s a piece of hardware, but a load balancer can be hardware or software. A hardware-based load balancer accepts traffic and directs it to servers based on factors such as processor utilization and the number of current connections to the server. A software-based load balancer uses software running on each of the servers to balance the load. Load balancing primarily provides scalability, but it also contributes to high availability.
28
Active/Passive Load Balancers
Load balancers can also be configured in an active/passive configuration. In an active/passive configuration, one server is active, and the other server is inactive. If the active server fails, the inactive server takes over. Load balancing increases the overall processing power of a service by sharing the load among multiple servers. Configurations can be active/passive or active/active. Scheduling methods include round-robin and source IP address affinity. Source IP address affinity scheduling ensures clients are redirected to the same server for an entire session.
29
NIC Teaming
NIC teaming allows you to group two or more physical network adapters into a single software-based virtual network adapter. This provides increased performance because the NIC team handles all the individual NICs’ bandwidth as if the NIC team is a single physical network adapter. Additionally, the NIC team uses load-balancing algorithms to distribute outgoing traffic equally among the NICs. The NIC team also eliminates any physical NIC as a single point of failure.
30
Power Redundancies
1. Uninterruptible power supplies. 2. Dual supply. Within the context of power redundancies, a dual power supply (or a redundant power supply) is a second power 3. Generators. Generators provide long-term power during extended outages. 4. Managed power distribution units. Server racks within a data center house multiple computing devices, and it’s common to use power distribution units (PDUs) within the racks to power the devices. Basic PDUs distribute power to devices, similar to how Managed PDUs (sometimes called switched PDUs) monitor the quality of power such as voltage, current, and power consumption and report these measurements to a central monitoring console. This allows administrators to use a single application to monitor power in all the racks within a data
31
Protecting Data with Backups
32
Backup Media
The most common media used for backups is tape. Tapes store more data and are cheaper than other media. Other types of media used to store backups are: Disk. Backups can also be stored on disks. A benefit is that disk access is much quicker than tape. However, disks are more expensive. The disks can be located on servers or simple USB disk drives. Network-attached storage. Network-attached storage (NAS) is a dedicated computer used for file storage and is accessible on a network. It can have multiple drives and often runs a stripped-down version of Linux for simplicity and to reduce costs. A NAS provides file-level data storage allowing users to access files on NAS devices and copy backup files to NAS devices. A NAS uses a standard Ethernet connection. Storage area network. A storage area network (SAN) provides block-level data storage via a full network. Organizations use SANs to provide high-speed access to disk arrays or tape libraries. SANs can also be used for real-time replication of data. As soon as data changes in its primary location, it is replicated to the SAN. A SAN typically uses a Fibre Channel connection, but can also use Ethernet. Cloud storage. It’s also possible to store backups in the cloud using the services of major cloud providers, such as AWS, Microsoft, and Google.
33
Backups
Full backup. A full (or normal backup) backs up all the selected data. Differential backup. This backs up all the data that has changed or is different since the last full backup. I incremental backup. This backs up all the data that has changed since the last full or incremental backup. Snapshot and image backup. A snapshot backup captures the data at a point in time. It is sometimes referred to as an image backup.
34
Comparing Business Continuity Elements
35
BCP
Organizations often create a business continuity plan (BCP). This plan includes disaster recovery elements that provide the steps used to return critical functions to operation after an outage. Disasters and outages can come from many sources, including: Environmental. This can include natural disasters, such as hurricanes, floods, tornadoes, and earthquakes. It can also include things like fires caused by lightning strikes rather than by humans. On a larger scale, it can include major environmental disasters such as the Fukushima Daiichi Nuclear Power Plant’s nuclear meltdown after an earthquake and tsunami in 2011. Human-made. Human-made disasters refer to those caused by human activity. This includes fires (caused by people) and train wrecks caused by human error, such as the May 2015 Amtrak derailment. Within an organization, human error can cause hardware Internal versus external. An internal disaster occurs within an organization. For example, a fire within an organization’s data center is an internal disaster that may result in hardware failure and data loss. In contrast, an external disaster is a disaster that occurs outside of an organization but still impacts the organization. As an example, a wildfire near an organization may damage utility lines impacting the stability of power or communication lines. .
36
Business Impact Analysis Concepts (BIA)
A business impact analysis (BIA) is an important part of a BCP. It helps an organization identify critical systems and components that are essential to the organization’s success. These critical systems support mission-essential functions. Mission-essential functions are the activities that must continue or be restored quickly after a disaster. The BIA also helps identify vulnerable business processes, which are the processes that support mission-essential functions. Remember This! The BIA identifies mission-essential functions and critical systems that are essential to the organization’s success. It also identifies maximum downtime limits for these systems and components, various scenarios that can impact these systems and components, and the potential losses from an incident.
37
Site Risk Assessment
Impact Will a disaster result in loss of life? Will a disaster result in loss of property? Is there a way to minimize the risk to personnel? Will a disaster reduce safety for personnel or property?
38
recovery time objective (RTO)
Many BIAs identify the maximum acceptable outage or maximum tolerable .
39
Recovery Point Objective
A recovery point objective (RPO) identifies a point in time where data loss is acceptable. Remember This! The recovery time objective (RTO) identifies the maximum amount of time it should take to restore a system after an outage. It is derived from the maximum allowable outage time identified in the BIA. The recovery point objective (RPO) refers to the amount of data you can afford to lose.
40
Mean time between failures (MTBF).
Remember This! The mean time between failures (MTBF) provides a measure of a system’s reliability and would provide an estimate of how often the systems will experience outages. The mean time to repair (MTTR) refers to the time it takes to restore a system.
41
Mean time to repair (MTTR).
Remember This! The mean time between failures (MTBF) provides a measure of a system’s reliability and would provide an estimate of how often the systems will experience outages. The mean time to repair (MTTR) refers to the time it takes to restore a system.
42
Continuity of operations planning (COOP) .
Continuity of operations planning (COOP) focuses on restoring mission-essential functions at a recovery site after a critical outage.
43
Site Resiliency
A recovery site is an alternate processing site that an organization uses for site resiliency. If one site suffers a catastrophic failure, an alternate site can take over after the disaster. The three primary types of recovery sites are hot sites, cold sites, and warm sites. These alternate locations could be an office space within a building, an entire building, or even a group of buildings. Other types of recovery sites are mobile sites and mirrored sites. Remember This! A cold site will have power and connectivity needed for a recovery site, but little else. Cold sites are the least expensive and the hardest to test. A warm site is a compromise between a hot site and a cold site. Mobile sites do not have dedicated locations but can provide temporary support during a disaster.
44
Disaster Recovery
A disaster recovery plan (DRP) identifies how to recover critical systems and data after a disaster. Disaster recovery is a part of an overall business continuity plan. Often, the organization will use the business impact analysis to identify the critical systems and components and then develop disaster recovery strategies and DRPs to address the systems hosting these functions. Remember This! A disaster recovery plan (DRP) identifies how to recover critical systems after a disaster and often prioritizes services to restore after an outage. Testing validates the plan. The final phase of disaster recovery includes a review to identify any lessons learned and may include an update of the plan.
45
Testing Plans with Exercises
Business continuity plans and disaster recovery plans include testing. Testing validates that the plan works as desired and will often include testing redundancies and backups. Several types of testing are used with BCPs and DRPs, including tabletop exercises, walk-throughs, simulations, parallel processing, and failover tests.
46
Tabletop Exercises
A tabletop exercise is discussion-based. A coordinator gathers participants in a classroom or conference room and leads them through one or more hypothetical scenarios such as a cyberattack or a natural disaster. As the coordinator introduces each stage of the scenario, the participants identify how they would respond based on an organization’s plan. This generates discussion about team members’ roles and responsibilities and the decision-making process during an incident.
47
Simulations
Simulations are functional exercises that allow personnel to test the plans in a simulated operational environment. There is a wide range of functional exercises, from simple simulations to full-blown tests.
48
Parallel Processing
Parallel processing makes sure that the disaster recovery site is actually working by activating it during the test. In a parallel processing test, the recovery site starts operations and runs alongside the main site (in parallel). This allows testers to confirm that everything is working properly.
49
Fail Over Tests
Fail over tests are the ultimate test of a disaster recovery plan. Also known as full interruption tests, these tests work by actually shutting down the primary site and testing whether the recovery site properly handles the load. Of course, a failed fail over test can be incredibly disruptive to the organization, so they should be planned and scheduled with care. Remember, though, that a self-inflicted wound from a failed fail over test is probably not as bad as discovering that your recovery site doesn’t work during an actual disaster! Remember This! You can validate business continuity plans through testing. Tabletop exercises are discussion-based only and are typically performed in a conference setting. Simulations are hands-on exercises using a simulated environment. Parallel processing activates the disaster recovery site and runs it alongside the primary site. Fail over tests shut down the primary site to determine whether the fail over site works properly.
50
Capacity Planning.
Capacity planning is the process of determining the resources required to meet the demands of an organization’s operations and growth. It involves analyzing and forecasting the organization’s resource needs. People. Assessing the human resources needed to support business operations is a critical aspect of capacity planning. This involves analyzing the current workforce’s skills, identifying gaps, and forecasting future requirements based on anticipated growth, new projects, or changes in the business Technology. Capacity planning for technology involves determining the hardware, software, and network resources required to support the organization’s operations and growth. Infrastructure. Infrastructure capacity planning refers to the evaluation and management of the physical facilities, such as data centers, office spaces, and other critical assets, to support the organization’s operations. This involves analyzing current infrastructure capacity, identifying potential