Day 2 12/22/2018 @27th march Flashcards
Abstraction
similar elements are put into same group/class ,that are assigned security controls , restrictions or permissions as a collective .
Difference between Data hiding and Security through obscurity
Data hiding is the act of intentionally positioning data so that its not viewable from unauthorized subject. Security through obsecurity is the idea not informing subject about the object and thinks that data will be protected that way(no secuirty)
Risk Factor associated with Merger and Acquisition
Inappropriate information disclosure , data loss,downtime or failure to achieve sufficient return on investment .
Divestiture
selling off business or employee reduction, Data disclosure risk . Assets has to be sanitized to prevent data leakage , storage media should be removed and destroyed.employee exit interview , nda …
Change Management
The goal of change management
> Change does not lead to reduced or compromised security
> Rollback
Change Control process
> > implement changes in a monitored and orderly manner
a formalized testing process ensures that expected results will be found
all the changes can be reversed or roll back
users are informed of changes before they occur to prevent loss of productivity
analyze if there is any negative impact
changes are reveiwed and approved by CAB .
Security Control Framework
COBIT best IT security practices crafted by ISACA.Itis also used by auditors. Business focused . 5 Principals Stake khete end to end a gelam ask korlo single kina, holistic approach niye bollam separate governence from management 1. Meet stake holder needs 2. covering the enterprise end to end 3. apply single integrated framework 4. enabling holistic approach 5. separate governence from management.
ITIL
developed by british government. customized it security solution starting point , IT services management.
IEC/ISO 270002 Starndard
12 security controls and their objectives
12 security controls and their objectives
- R isk Assessment
- S ecurity policy
- O riganization information security
- A sset Management
- H uman Resource Security
- P hysical and Environment security
- C ommunication and operations managment
- A ccess control
- I nformation system acquisition, development and maintennace
- I nformation security incident management
- B usiness continuity management
- C omplaince
Threat Modeling
Identify threats, categorize and anaylize, 3 types of threat modeling 1. asset based(identify valuable asset first then find vulnerabilities) 2. threat based (identify attackers and their goals) 3. software based (for companies who develop softwares, even those have own websites)
S T R I D E Model
developed by microsoft , threat categorization scheme
S - spoofing
T - tempering - unauth changes and manipulation of data
R - repudation
I - information disclosure
D - denial
E - elevation of privileges
D R E A D model
its a rating system of threats ,
D - Damage potential (how severe)
R - Reproducibility
E - exploitability - how hard its perform to attack
A - Affected users
D - Discoverability - how hard its to identify the weakness
Precautions to be taken before integration with 3rd party
- On site assessment take interviews to know their work procedure
- Document exchange and review
- process/policy review
SOC1 vs SOC2 Audit
SOC1 for companies who hosting financial information of customers .
SOC2 security controls in relation to CIA .
job description
job descriptions are important to the design and support of a security solution, SOC2 and ISO 27001 requires annual job description review