Code of Ethics + steps to remember + forumulas Flashcards
what is the code ethics preamble
- The safety and welfare of society and the common good, duty to our principals, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
- therefore, strict adherence to this Code is a condition of certification
list the code of ethics
- protect society, the common good, necessary public trust and confidence, and the infrastructure.
- Act honorably, honestly, justly, responsibly, and legally
- . provide diligent and competent service to principals
- advance and protect the profession
list computer ethics institute ten commandments of computer ethics
- thou shalt not use a computer to harm other people
- thou shalt not interfere with other people’s computer work
- thou shalt not snoop around in other people’s computer files
- thou shalt not use a computer to steal
- thou shalt no use a computer to bear false witness
- thou shalt not copy or use proprietary software for which you have not paid
- thou shalt use other people’s computer resources without authorization or proper compensation
- thou shalt not appropriate other people’s intellectual output
- thou shalt think about the social consequences of the program you are writing or the system you are designing
- thou shalt always use a computer in ways that ensure consideration and respect for the fellow humans
NIST 800-37 - Risk Management framework steps
- Prepare - to execute the RMF
- Categorize - BIA
- Select - select controls
4.Implement - implement security contols
5.Assess - assess the security controls
6.Authorize - upper mananagment authorize the controls
7.monitor - monitory and evaluate the controls
quantitative risk analysis steps
- Inventory Assets - assign a value (AV)
- identify threats - produce a list of all threats of assets ( EV and SLE)
- perform a threat analysis - calculate the likelyhood of each threat per year (ARO)
- estimage the potentional anual loss - (ALE)
- reaserch countermeasures for each threat - calculate ARO and ALE vs the applied countermeasures
- perform cost benefit analysis - anual cost of countermeasure, can not exced ALE for each threat
forumal for controls gap
- total risk - controls gap (reduced risk after applying control) = residual risk
- controls gap - amount of risk reduced by implementing safeguards
stride steps
- spoofing
- tampering
- repudiation (reject)
- information disclosure
- denial of service
- elevation of privilege
Threat model PASTA steps (countermeasures based on asset value)
Stage I: Definition of Objectives
Stage II: Definition of Technical Scope
Stage III: App Decomposition & Analysis
Stage IV: Threat Analysis
Stage V: Weakness & Vulnerability Analysis
Stage VI: Attack Modeling & Simulation
Stage VII: Risk Analysis & Management
Threat model VAST
- Visual
- Agile
- Simple
- Threat
threat model DREAD steps
- Damage potential
- Reproducibility
- Exploitability
- Affected users
- Discoverability
Incident managment framework
* per ISC2*
- Preparation - prepare for an incident (what is your team, what are the steps, define roles, communication process etc.)
- Detect - discover the incident
- Response - incident response team goes into action
- mitigation - contain the damage and scope of the incident
- reporting - if needed send details to senior management or regulatory authorities
- recovering - restore the system back to the original state, maybe reimage the server.
- remediation - root cause analysis to fix/patch the server to prepare for future attacks.
- lessens learned - review and document for improvements in case of future attacks.
mnemonic (PDRMRRRL)
capability maturity model (SW-CMM)
* software developement maturity*
- intial (no plan)
- repeatable (lifecycle management)
- defined (formal documented SW dev process)
- managed ( quantitive measures to gain understanding)
- optimized (continunous development w/ feedback loops)
IDEAL model
- Initating - business reason outlined
- Diagnosing - engineers make recommendations for change
- Establishing - org take recommendations and devlops a plan
- Acting - plan put into action. solution developed, test, refine and implement
- Learning - continuously analyze efforts, propose to actions do drive better results
data lifecycle
- create
- store
- use
- share
- archive
- destroy
information lifecycle
- creation - created by user or system
- clasification - classify data to ensure proper handling and authorization
- storage
- usage
- archive - per regulatory or org retention policy
- destruction - when data is no longer needed, it should be destroyed
patch management process
- evaluate patches
- test patches
- approve the patches
- deploy the patches
- verify the patches are deployed (vulnerability scanning)
Evidence types (steps?)
- Best - original
- secondary evidence - copy
- direct evidence - proves or disproves based off the 5 senses
- conclusive - incontrovertible, this overrides all other evidence
- circumstanstantial - inference from other information
- corroborative evidence - supporting evidence but can’t stand on its own
- opinions - expert and non-expert
- hearsay - not based on first-hand knowledge
Business continuity planning (BCP) steps
per NIST 800-34 rev 1
- Develop a business continuity policy
- conduct a BIA
- identify preventative controls
- create contingency strategies
- develop a system/IT contingency plan
- perform DRP training and testing
- Perform BCP/DRP maintenance
GOAL: efficient response to enchance a company’s ability to recover from a disruptive event promptly
ways to test your disaster recovery plan
5 ways
- read-through
- structured walk-through
- simulation test – still a “walk through” nothing physical has been shutdown yet
- parallel test
- full interruption test
to enforce the integrity of a database data, there is a standard set of properties. the Mnemonic is ACID. what are these properties
- Atomicity - if any part of a transaction fails, the entire transaction fails
- Consistency - updates to the database are consistent with the rules. the rules of the database are enforced
- Isolation - one transaction must be complete before another transaction can modify that same data
- durability - once transactions are commited to the database, they will be preserved.
Common Criteria testing (ISO 15408) process
- Description of assets
- identification of threats
- analysis and rating of threats
- Determination of security objectives
- Selection of security functional requirements
- (repeat)
NIST cybersecurity framework core functions
- Identify - asset managment, governance risk assessment
- Protect - access control, awareness, data security
- Detect - anomalies, monitoriing, detection processes
- Respond - response planning, communication, analysis
- Recover - recovery planning, improvements, lessons learned
BIA consists of two steps
- business continuity team works with management to identify critical business functions
- the team continues to work with management to determine measures of impact and acceptable and achievable recovery milestones
Note: a critical business function is required for continued business operations. this includes customer facing and internal functions like payroll
RTO and WRT MTD clarification
RTO - lenght of time needed or expected to achieve the recovery point objective (recoverying backups from the the point of RPO) the is going to be some data loss
* minimum operational capability expected by the function owner
WRT - the time to re-enter information or transactions that were lost due to the age of the restored backup
* the time from the minimum operational capability restored at teh RTO to full functional operability
* at the end of WRT the business functions are fully restored
RTO + WRT is equal to or less than MTD
BCP step 1 is what and whats is involved
- policy statement
* managemen support
* roles and responsibilities
* policy scope
* training, testing