CISSP Domain 7 Flashcards
Security Operations
Operations department responsibility Administrative management responsibilities Assurance levels Configuration management Physical security Secure resource provisioning Network and resource provisioning Preventive measures Patch management Incident management Recovery strategies Disaster recovery Business continuity planning and exercises Liability Investigations Personal safety concerns
Security Operations pertains to
everything that takes place to keep networks, computer systems, applications, and environments up and running in a secure and protected manner
Security Operations also involves
detection, containment, eradication, and recovery required to ensure continuity of business operations
Role of Operations Department
Continual effort to make sure the correct policies, procedures, standards, and guidelines are in place
Separation of duties
helps prevent mistakes and minimize conflicts of interests.
Job rotation
over time, more than one person fulfills the task of one position.
Mandatory Vacations
an Administrative control
detect fraud
Initial Program Load
Mainframe term for loading an OS kernel
Configuration Management
process of establishing and maintaining effective system controls
Input and Output controls
Data entered should be the correct format
Transactions should be atomic
Must be timestamped and logged
Bastion Hosts
Locked down at entry of network
2 main types of mechanical locks
Warded is basic padlock. Spring loaded bolt with a notch cut in it. Key fits the notch and slides the bolt from locked to unlocked position These are the cheapest
Tumbler has more pieces and parts than a ward lock. Key fits a cylinder pins are raised
3 types of tumbler locks
pin tumbler most common tumbler lock. key has just the right grooves to put all spring loaded pins in the right position
wafer tumbler also called disk tumbler are small, round locks as on file cabinets Uses wafers, or flat disks instead of pins
lever tumbler
Cipher locks
programmable locks are keyless and use keypads
Fences
3 to 4 feet only deter casual trespassers
6 to 7 feet are too high to climb easily
8 foot deter more determined criminal
PIDAS fencing
Perimeter Intrusion Detection and Assessment System
Type of fencing with sensors on the wire mesh of the fence.
Gate classifications
Class 1 Residential
Class 2 Commercial
Class 3 Industrial
Class 4 Restricted access
Bollards
Concrete pillars outside a building
Mean Time Between Failures
How long is a piece of equipment expected to last.
Calculated by average time between failures.
Mean Time to Fail MTTF
Life expectancy of a product
Mean Time To Repair MTTR
amount of time to fix a failure and return to production
Single Points of Failure
Firewalls, routers, network servers T1 lines, Hubs, switches, authentication servers
RAID
Redundant array of Independent Disks
Redundancy and Speed
Direct Access Storage Device
General Term for magnetic disk storage devices
Massive Array of Inactive Disks
Carries out mostly write operations
Redundant Array of Independent Tapes
Striped over multiple tape drives
Rainbow Tables
All possible passwords in hashed formats