CISSP Domain-1 Flashcards

1
Q

Q:Accountability vs. Auditing

A

“Auditing recording a log of the events and activities related to the system and subjects

Accounting (aka accountability) reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

confidentiality

A

no unautorized can access the data ,prevent disclosure of information “for data at Rest Encryption AES 256
for Data at motion Secure transmission protocol SSL TLS IPSEC
for Data in Use clean desk, shoulder surfing, screen view angle protector
PC locking (automatic and when leaving)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

unauthorized modification of DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Authorized people can access data when they need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats on CIA

A

“Cryptanalysis : attack on encryption
Social Engineering
Key logger
IoT: the going number of connected devices
may create backdoor to access another device”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non repudation

A

Digital signature with my own private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Framework

A

is a logical structure to ducument and organize processes ,”Intl Framework : ISO 27000
National : NIST cybersecurity framework
Regulrity : FDIC cybersecurity assestment tool (CAT)
Industry : HITRUST common security framework Health care
PCS DSS credit card industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Benchmark

A

“information secuirty benchmark is intended
to help an org indentify their cybesecurity
capabilites and initiatives and compare those
efforts to peers or competetiors in same industry .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIS Benchmark

A

” >Center for Internet Secuirty
>Hardening Vulnerability Checklist across all platform
>secure configuration guidance
> consensus-derived checklists”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST SP800

A

“National institute of standard and tech NIST SP 800

govt sector configuration guidelines”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NCP

A

“National Checklist program , us govt repository
of publically configuration checklist of different products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NIST cybersecurity framework

A

“This voluntary Framework consists of standards, guidelines,
and best practices to manage cybersecurity-related risk.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HITRUST

A

“HITRUST CSF is a controls-based risk management framework that aligns with and supports the NIST Framework,widely adopted in healthcare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NVD

A

NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Due Care Vs Due Deligence

A

“Due care is what a prudent man should do under a similar condition
Due deligence is investigation before engaging in a contact or business”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Downstream Liability

A

“when your organizations IT system is compromised
and they become source of attack to another systems
then it is called the downstream liability .”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Owners/Custodian/users

A

“Owners: part of management who will protect subset of information
Custodian : IT guys , implement solution, maintenance monitor
User: follow regular organizational policy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security Governance

A

“security governence emphasizes on securit is no only
itissues.security gooverence is the practices that are taken
to define,support and direct the secuirty efforts of an origaization.
NIST SP 8–053 and NIST800-100 are security frame work for
govt and military ,
but they can be adopted in other organizations also
security governence managed by board of directors.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Security Management

A

“Security managment planning ensures that
security policies should be aligned with
the goals , mission and objectives of the organizations.
This includes design and implementing seurity based on
business cases.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Business Case

A

“Documented arguent in order define a need
to make decission , its often needed before a start of a new project .It is also necessary to allocate budget.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Key note

A

“The best security plan is useless without the approval from sr management
if company does not practice due care and due deligence then
manager can be held liable for negligence and held accountable
for both asset and financial looses”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Strategic Tactical operational planning

A

“Strategic planning : 5 years , should include a risk assesment
Tactical Planning 1 year , planning to achieve goals set in
strategic planning , or canbe crafted adhoc based
upon unpredicted events.

Operational plans short term , monthly quarter , step by step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Security alignment

A

” align security policies with

business cases to support orginizational goals”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

value delivery

A

“optimize investments in support of business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Synergy
"A synergy is where the whole is greater than the sum of its parts. In other words, when two or more people or organizations combine their efforts, they can accomplish more together than they can separately"
26
Governance Ecosystem
``` "board of directors: > promoting effective governance > Determine risk tolerance > allocate funds > Ensure compliance with laws > Reviewing audut and examination results > Due care due diligence" "Executive Management > strategic alignment > Value delivery > Risk management > process assurance " ```
27
Point to be remembered
CISO must apply to Sr management directly not to CIO
28
OECD privacy principles,privacy framework , every policy follows it Eight driving principles
"Collection Limitation Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. Data Quality Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. Purpose Specification Principle: The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. Use Limitation Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [the Purpose Specification Principle] except: (a) with the consent of the data subject; or (b) by the authority of law. Security Safeguards Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data. Openness Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller. Individual Participation Principle: An individual should have the right: a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him; b) to have communicated to him, data relating to him within a reasonable time; at a charge, if any, that is not excessive; in a reasonable manner; and in a form that is readily intelligible to him; c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and d) to challenge data relating to him and, if the challenge is successful to have the data erased, rectified, completed or amended. Accountability Principle: A data controller should be accountable for complying with measures which give effect to the principles stated above."
29
Openness principles
Openness. The principle of Openness states that an organization shall make its policies and procedures about how it manages personal information readily available. ... When providing the information, it should be available in a form that's generally understandable
30
Canada Mexican Europe
Personal information protection and electronic documents act(PIPEDA) The protection of personal data held by companies European union data protection directive superseded by GDPR(general data protection regulations)
31
OECD
For Privacy and Trans border flows
32
Privacy Violation
Violation of privacy principles and regulations
33
Data compilation
collection of data to be used" later "to be determined
34
Data wirehousing
combines data collected from several sources and store in large database
35
Data mining
process of analysis analyzing the collected data look for trends correlation resulting in metadata.
36
Aggregation
Individual pieces of data that are combined to create a bigger picture
37
inference
ability to derive information that is not explicitly available.
38
privacy laws
glba financial records hipaa medical records ferpa students educational records federal privacy act datacollected by government coppa online collection and use of data minor unger 13 gdpr citizen privacy protection
39
The Cookie Law Explained An HTTP cookie is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing
he Cookie Law is a piece of privacy legislation that requires websites to get consent from visitors to store or retrieve any information on a computer, smartphone or tablet. It was designed to protect online privacy, by making consumers aware of how information about them is collected and used online, and give them a choice to allow it or not.
40
Privacy statement
When collects any PI data then it must tell >what information may be collected >how the information will be used > who the information may be shared with >why and how 3rd party may use this information > How to opt out > provide a mechanism how to report data breach >provide commitment to data quality and data security data is generally considered high quality if it is "fit for [its] intended uses in operations, decision making and planning
41
Computer Crime
when computer is used for committing crime ,1.Computer as a target of crime , 2. computer as a tool for crime
42
US Federal Laws for Cyber crime
Computer Fraud and abuse act : unauthorized access to federal govt , financial institution system,or any system used for foriegn currency Wiretrap act : unauthorized interception of digital communications Electronic communications privacy act : unauthorized access or damage to electronic message in store NAtional information infrastructure protection act : primariliy federal antihacking statute ,(low passed by legislative body)
43
script kiddies vs real hacker
The hacker or cracker will usually have a stable of scripts they can run to do whatever they want in order to perform an action while they manually do something else at the same time A script kiddie will use, you guessed it, scripts made by actual hackers and crackers in order to get the look of a hacker. They will basically just run the script and it will do whatever it was programmed for
44
Hacktivism -> political statement
Hacktivism is usually directed at corporate or government targets. Hacktivists' targets include religious organizations, terrorists, drug dealers, and pedophiles. An example of hacktivism is denial of service attacks (DoS) which shut down a system to prevent customer access.
45
Computer as a target
Computer viruses Denial-of-service attacks Malware (malicious code)
46
Computer as a Tool
Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare Phishing scams Spam Propagation of illegal obscene or offensive content, including harassment and threats
47
nation state hackers
hackers working for government rather than a group of criminals.
48
Data breach Disclosure and Notification requirements to impacted parties
Sector Specific : GLBA HIPAA Disclosure of PII GDPR has data breach disclosure and notification requirements PCI-DSS has data breach notification requirements
49
hackers vs motivation 1) Origanized crime 2) Nation States 3) Insider 4) Competitors
1) Financial Gain 2) Fear, Disruption,Sabotage,influence,ip theft 3) Grievance , perceived morality 4) Espionage
50
Intellectual Property LAWs PRotect
``` 1> Patent 2>trademark 3>tradesecret 4>copyright 5> Software licensing ```
51
software licenses
free software & opensource free means freedom , you can do anything , even modify and sell if its open source then you cant sell freeware no cost minimal freedom no source code Shareware refers to a program that is initially available without any costs attached, and users are encouraged to distribute copies. Commercial
52
Software Piracy
unauthorized distribution and opying of copyrighted software .DMCA Digital Millenium Copyright act protects software privacy
53
Legally Enforceable software use agreement
EULA
54
BSA the software alliance
developed by microsoft working worldwide for the protection of software ip theft Report software piracy http://reporting.bsa.org
55
Criminal Law
protect society Punishment: monetary penalty (small+medium) + imprisonment criminal laws passed by the lagislature body
56
Civil law
between an individual and organizations | outcome : severe penalty
57
CFAA
CFAA Computer Fruad and abuse act first major cyber crime related law Fine : 5000$ any compuer used by federal gvt any computer used by fonancial org @CFAA amendment : any computer than federal computer the creation of any type of malicious code that can harm to a system allowed imprisonment of the offenders
58
prudent man
@Prudent men , due care due deligence Federal Sentencing guideline
59
FISMA
@Federal information security management Act (FISMA) replace computer secuirty ACT and government information secuirty reform act NIST developed FISMA Govet agency and contractor peridical assessment of risk Fisma supports BCP
60
Copyright
>> software copyright under literary works copyright after 70 years of last surviving author dies for work for hire :after 95 years of publich or 120 years of creation which is shorter DMCA digital millenium copyright act usa under DMCA serice providers can not be blamed for copyright act
61
Trademark
>> trade mark: logo, slogan, TM symbol -> you want to protect trademark if you want to officially register then USPTO (R) symbol Trademark cantbe descriptive aboutservices and offer Trademark for 10 years
62
Patent
>> patent protect IP right for inventor for 20 years | > invention must be new original and useful
63
patent troll
a company that obtains the rights to one or more patents in order to profit by means of licensing or litigation, rather than by producing its own goods or services.
64
Trade secret protection
Best way to protect trade secret is NDA for computer software trade secret provides best protection coppyright provides the source code Economic espionage act this law to protect trade secret
65
Trans-border Laws
ITAR international traffic in ARMS regulation controls military items export EAR Export administration regulation controls commercial products but have connection with military informations .Commercial control List (CCL ) found in US department of commerce.
66
US privacy LAws
4th Amendment : no one can search any others property without warrant Privacy Act of 1974 : only for govt agencies, ECPA :electronic communications privacy act of 1986 mobile phone, email ,voice email monitoring is prohibited
67
Persona identification information
> personal informations including 1. Social security number 2. Drivers license number 3. State identification card number 4. creditcard/debit card number 5. bank account number 6. health insurance information
68
us Patriot act
USA patriot act : allow wiretapping , ISP may voluntary | provide much information
69
EU citizens privacy
EU citizens data going outside must be protected Safe Harour agreement between EUand USA Department of Commerce certify . GDPR relaces data protection diretive data breach notification must be submitted ot the effected personnel right to be forgotten that require compnies to delete informations
70
SOX
financial org audit compliance SOX sarbanes oxley act
71
PCI DSS
PCI dss 12 main requirements install and maintain firewall to protect cardholder data dont use vendor supply default pass protect stored card holder data encrypt transmission of card holder data protect all system against malware develop and maintain secure system and apps restrict acces to card holder data by business need t know restrict physicall access to card holder data track and onitor all access to network resources and card holder data regular test security systems nd processes maintain a policy that addresses information secuity for all personnel
72
PII PI NON PII
Privacy ACT of 1974 limits govt agencies to disclose user PII information The privacy shield framework Us company to comply with EU data protection Personally Identifiable Information (PII) is a term used mainly within the USA. Personal Data is considered to be the European equivalent of PII "logo-nist PII is any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information" Passport Linked , birth place: linkable "Examples of non-PII include, but are not limited to: Device IDs IP addresses Cookies"
73
Trustworthy computing
The term Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available, and reliable.