cybersecurity Flashcards
Remember that before any assessment
you should define the scope of the project. the scope include what is included in the assessment
In the scope always remember to
What are the four parts in defining the scope?
- Identify Requirement
- Specify which devices are involved.
- select method of collecting data.
- documentation.
Key Component of Project scope include
- System description
- System architecture diagram
- network Diagram
- Asset inventory
- criticality assessment
- Documentation of data flow.
Remember! complete and detailed scope leads to more valuable assessment.
Why conduct CVA
CVA meant to identify, classify, and define security Vulnerabilities. this is very critical step into in evaluating CYBER RISK!
CVA includes
- Critical step into evaluating cyber risk!
-Evaluating the IACS design, implementation, configuration, implementation, and management, - Determine the adequacy of security measure and identify deficiencies.
When selecting an assessment type
Be aware of cost and Risk to the system. Also consider the benefits gained when running assessment.
Remember that
Those are Cybersecurity Vulnerability Assessment types
- Gap assessment least invasive and provide and it provide comparison to standards, it involves interviews, peers, site walk.
- Passive is used for reviewing arp tables, packet captures,
- Active uses tools to scan network and ports.
- Pen test include it exploit known and unknown vuln.
Benefit of cyber security risk assessment
- Determine order of priority and what needs to be processed first.
- Define threats, Vulnerability and consequences, - this is time consuming and it involves subject natter experts. this will help us to determine countermeasures.
- Design and apply counter countermeasures to reduce risk.
- prioritize of activity and resources.
- evaluate countermeasure for effectiveness vs complexity.
- ROI is also important. is the Assessment worth our time?
Cybersecurity Risk assessment process 62443-3-2
- System under consideration. Section 4.1
- High level risk assessment Section 4.2 * Involve safety teams. * this level will determine the Security Level target where you want to be.
- partition into zones and conduits Section 4.3
- perform detailed risk assessment for each zone and conduit Section 5.0
- Document Security Requirement Assumption. * CRS document. Section 4.4
Detailed risk assessment process. Section 5.0 under IEC62443-3-2
as per the standard it is defined under section 5-
the standard explain the input which is the requirement for each zone and conduit. the middle is the requirement and the output is the results.
the list is
5.1 identify threat
5.2 identify vulnerabilities
5.3 determine consequences and impact.
5.4 determine likelihood.
5.5 calculate unmitigated cyber security risk
5.6 determine security level target.
5.7 consider exaiting countermeasures,
5.8 reevaluate likelihood and impact
5.9 calculate residual risk
5.10 all risk mitigated or below tolerable risk.
5.11 apply additional cybersecurity measure.
5.12 document results
Documentation
You need to document to prove what you did.
Document should be:
- Revised,
- Amended,
- Reviewed and,
- Approved.
Document should be under controlled Scheme.
You need to document all the reports. Documents include
Documents in general provide support, findings, and recommendations.
- Gap assessment reports
- Vulnerability reports
- Risk assessment Reports.
- Zone and conduit diagrams.
- CRS document.
Difference between Vulnerability Assessment and Penetration Testing
VA include identify, classify, and define weaknesses and report on discoveries.
PEN test include exploit to gain access.
Which key concept in the scope details all the element of the system?
Asset Inventory
Why partition the system under consideration into zones and conduits?
To ensure best possible protection.
Chapter 2 Conceptual Design
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
- Learn about the CRRF
- Identify the four T’s of managing risk
- Explain the 5 D’s of treating risk?
- Explain the elements of developing a security strategy
- Develop Cyber security plan.
Conceptual Design have key components that needs to be address so you can provide conceptual design specifications. those key components are
1 - Interpret risk assessment results.
2 - Mitigate results 4Ts or mitigating risk using the 4T’s
3 - Treat Risk using the 5Ds
4 - Develop Security Strategy
5 - Prepare conceptual design specification.
Lets dive to each one.
1- Interpreting Risk assessment Results- this includes. this should be included in any good risk risk assessment. if those are addressed correctly in the Risk assessment then things will be easier.
- Risk Profile
- Highest Severity Consequences.
- Threat/Vuln leading to the highest risk. * This step require a lot of research.
- Target Security Levels.
Recommendation.
SL-T should be established for each zone. this depends on CRRF. it is based on risk matrix and risk tolerance.
Risk Profile is?
it is like a heat map that shows unmittigated risk and the risk level. some companies may have this in place or needs to build one.
SL-T is defined in how many levels?
5 levels.
Level 0 - no requirement
Level 1 - Protection against casual
Level 2 - Protection against intentional with low resource
Level 3 - Protection again intentional with high skills and moderate skills
Level 4 - Protection against intentional attacks with high skills and high motivation.
Security Level Target (SL-T) should be provided for each zone and conduit. also remember that
SL-T depends directly on CRRF the risk reduction Factor.
CRRF
is a measure of the degree of acceptable level. or the risk reduction required to achieve tolerable risk.
CRRF = to unmitigated risk / tolerable risk
You need to establish a relation between the SLT- and the CRRF. this should be based upon
Organization Risk Matrix and Risk tolerance.
Security Level targets are explained under
Annex A of IEC62443-3-3 Security Level Vectors.
2- step 2 in the design phase is managing risk. this can be divided using the?
Four T’s which include
- Tolerate Risk - Accept Risk
- Transfer Risk - Insurance 3rd party
- Terminate Risk -
- Treat Risk- reduce it to acceptable level by implementing countermeasure.
3- step 3 of the design is treating the risk 5Ds
used in neuclar wopeon and air forces.
TTLNF
- Deter - is the farthest from assets such as camera fence.
- Detect - cameras, security personnel.
- Delay - honey pot, locks to delay attacks
- Deny
- Defeat - security personal response to apprehend
Deter
objective is to deter attackers from attempting to breach
detect
objective to monitor large area to accurately detect unauthorized access and respond on time .
Delay
The objective of delay an active intrusion to force intruder to stop and allow security to respond
Deny
is keep unauthorized person out and let authorized people in
Defeat
Objective is to defeat intrusion by apprehending intruder. often involve law enforcement.
There is always differences between physical and cybersecurity policies. IEC62443-2-1 recommend that:
You need security policies and procedures established for both physical and cyber.
at least one or more physical security perimeters shall be in place to protect assets.
when applying security protection using the 5D’s remember
this should be done for each zone and conduit. it should also use
- risk assessment results
- target security level
- Cybersecurity requirment specifications. CRS
Deter options are
- Policies and Procedures
- Warning Banners.
- Obscurity
Detect options are
- IDS
- SIEM
- Anti-Virus software
- Firewalls
- Emails and URL filtering
- Train personnel to be aware of scams
Delay attacks options are
- Security Hardening
- Patching
- Encryption
- Network segmentation
- Access Controls
- Honey Pot Systems.
Deny Options are
Deny unauthorized users and software’s from access the system.
- Firewall
- Whitelisting
- Intrusion Prevention Systems
- Access Controls
Defeat the attackers. retain forensic evidence
eradicate the intruder or malicious software and restore the system to normal.
- Malware Removal tools
- Policies and Procedures
- Intrusion Prevention.
4- Develop a Security Strategy - remember the order.
- Identify Zones and conduits
- Review Risk assessment - this is for each zone and conduit.
- Establish Target security Level
- Identify Physical and cyber access points.
- Develop 5D physical and cyber strategy for each zone and conduit.
5- prepare conceptual design specification
this can include:
- Document security countermeasure to achieve target security level
- Scope of work
- conceptual system architecture
- budget cost and schedule estimate.
Chapter 3
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
This chapter is focused on
- Project Management related to design
- System and Software Development Life Cycle
- Function and Security Requirement for the Design.
- Choose technology for the Design
-
design and implementation of countermeasure should always treated as
-Should be treated as a project
- Project Management is required
- With proper lifecycle, plan, and implement phase.
- Should always assign a project manager
what are some of the elements for good project plan?
- Clear goal of the Project
- Define the scope of work - Beware of scope creep
- list all deliverable to assign resources correctly
- quality criteria - and setting expectation
- determine stakeholders and get them involved and updated.
- Understand the budget for the project.
- establish milestone to keep project manageable.
- tolerance should be set for each milestone.
- address dependencies
- identify risk
- Schedule
- Dependencies
Software Process
is a set of related activities that leads to the production of software product.
System/Software Lifecycle
Software specification ( requirement analysis)
Software Design
software implementation - Coding
software validation - Testing
software evaluation - Maintenance and Further Development
the phase necessary to develop and maintain software system are called
Data Structure.
Security Requirement
You must secure you security countermeasures.
Normally security countermeasures are installed with?
insufficient Security - example.
- IP camera with default
- firewall with telnet enabled.
- servers with weak and not security in place .
Countermeasures details include
- Environment
- User Characteristic
- Assumption
- Constrains
- Dependencies
Countermeasure Requirement include
- Functional
- Usability
- performance
- Data Management
- Standards
- Security
Security requirement is divided into - cyber security requirement specification
- Environmental/ External Dependencies such as - supply chain - testing - protection and health and safety
- Risk Assessment and control requirement.
- Regulatory and Industrial standard requirement
- Access Control requirement
Data integrity and Confidential Requirement - Communication and Data flow requirement
- security event monitoring tools
each security requirement there is a set of one or more design element that will be produced. those elements includes
- Architecture Diagrams.
- Data flow charts
- Design Specification
- Use Cases
- Business Process Diagrams.
- Configuration Screens.
Elements of good DESIGN SPECIFICATION include
- Introduction
- Project Scope
- System Design
- Component and process Design
- Data Design
- User Display and output.
- Reports
- System Files.
- Prototype description
- prototype test procedure. analysis.
- Special notes
- Project Extension.
Good element of project management
- Goal of project
- Scope of work
- Deliverable
-Quality criteria - Stakeholder.
- Budget.
- Schedule
- Risk
- Tolerance
- Milestone
- Task/duties/ responsibilities.
what is Firewall?
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
device or hardware/software controls the flow of traffic between network devices. Firewall filter communications allow authorized and deny unauthorized.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
firewall type are divided into two types
Network Based hardware
Host Based software
Network Firewall are typically
Hardware appliance that filter traffic between one or more devices.