Cissp Domain 1 Flashcards
Difference between least privilege and need to know
Least privilege is all about type of access rights - read , write
Need to know - required access
What are the 3 perspectives integrity can be examined?
Modifications from unauthorised
Modifications from authorised
Data to be consistent internal and external
Availability concepts
Usability
Accessibility
Timeliness : low latency response
What is Authorization about ?
Rights and previliges
Accountability is dependent on ?
Tracking activities of individual
Defense in depth
Layering or parallel
Multiple control in place
Abstraction
Simplify security by enabling you to assign security controls, restrictions or permissions to a group of objects
Data hiding Vs security through obscurity
Intentionally position data being accessed by unauthorised users
Hiding data in plain sight
What is purpose of Security Governance?
Alignment of security function to business stratergy, Goals , mission and objectives
What are the 3 types of Plans devloped by security management?
Stratergic: Long term - 5 years
Tactical:Midterm - 1 Year
Operational: Product design, system deployment
What are the process to be considered when evaluating 3rd party ?
On site assessment
Document exchange and review
Process/policy review
Third party audit
What is role of asset owner ?
To classify assets
What is role of custodian?
Implementation of prescribed security protection
6 key principles of cobit ?
Provide stakeholders value
Holistic approach
Dynamic Governance system
Governance distinct from management
Tailored to enterprise needs
End to end governance system
What is Security policy?
Scope of security needed by organization and discusses assets needed protection
What is AuP ?
Level of acceptable performance and behaviour and activity
Security standards?
Compulsory documents for homogeneous use of hardware
Baseline
Minimum level of security that every system to meet
Guidelines
Offer recommendations on how standard and baseline to be implemented
SoP
Detailed step by step implement a security mechanism, control or solution
Threat modelling
Proactive measure during design and development
Reactive after product has been designed
How to identify threats? (Focus area)
Focused on assets
Focused on attackers
Focused on software
STRIDE
Spoofing
Tampering
Repudiation
Information disclosure
DoS
Elevation of prevlige
Process of attack stimulation and threat analysis - 7 steps
Definition of objectives
Definition of technical scope
Application decomposition and analysis
Threat analysis
Weakness and vulnerability analysis
Attack modelling and simulation
Risk analysis and management
Steps in Threat modelling - 5
Identify threats
Determining and diagram ing potential threats
Perform Reduction analysis
Prioritisation and response
What does diagramming potential attacks ?
Creation of diagram of the elements involved in a transaction along with data flow and previliges boundaries
What is reduction analysis and decomposition process ?
Gain greater understanding of the logic of the product, it’s internal components as well as it’s interactions with external elements
What are 5 key concepts in decomposition process ?
Trust boundaries- level of trust or security changes
Data flow paths - Movement of data between locations
Input points - location where external input is received
Previliged operations - Any activity that requires greater previliges than of a user account
Details about security stance and approach
DREAD system to rate threats
Damage potential
Reproducibility
Exploitablity
Affected users
Discoverablity
What is Concept of supply chain ?
Most computers, devices, networks , systems and cloud services are not built by a single entity
What is SLR ?
Service level requirment a statement of the expectations of service and performance from the product or service of a vendor
Prior to SLA and should incorporate above
Collusion in crime
When several people work together to prepetrate crime
Purpose of mandatory vacation
Detect abuses, verify the work tasks and previliges
Mutiparty risk
Several entities or organisation involved in project
Outsourcing
Used to describe the use of an external third party such as vendor consultant
Privacy
Active prevention of unauthorised access to pii
Freedom from unauthorised access to info deemed personal or confidential
Freedom from being observed, monitored or examined without consent or knowledge
Primary goal of Risk management
Reduce risk to an acceptable level
2 primary elements of risk management
Risk assessment: PXI
Risk response : Evaluating countermeasures, safeguards and security controls using c/b analysis