Dion Sections 1-3 Flashcards
Security Control
mitigates vulnerabilities and risk to ensure the confidentiality, integrity, availability, nonrepudiation, and authentication of data
Security controls should be selected and deployed in a structured manner using a …
Risk Management Framework
What is NIST Special Publication 800-53 for?
Federal information systems and organizations.
What is NIST Special Publication 800-171 for?
outlines security requirements for protecting CUI in Non-Federal systems and organizations
What is the ISO framework
a set of requirements for defining, implementing, operating, and improving an Information Security Management System (ISMS)
What is a technical (logical) control?
A category of security control that is implemented as a system (hardware, software, or firmware).
Digital signature
a hash of the email you’re going to send, encrypted with your digital private key.
Operational Controls
A category of security control that is implemented primarily by people rather than systems.
Managerial Controls
A category of security control that provides oversight of the information system.
Security Control Functional Types (7) P,D,C,P,D,C,R
Preventative, Detective, Corrective, Physical, Deterrent, Compensating, Responsive
What is a preventative control
A control that acts to eliminate or reduce the likelihood that an attack can succeed.
Detective control
A control that may not prevent or deter access, but will identify and record any attempted or successful intrusion.
Corrective control
A control that acts to eliminate or reduce the impact of an intrusion event.
No single security control is invulnerable, how is the efficiency of a control instead measured?
By how long it delays an attack
Physical Control
A type of security control that acts against in-person intrusion attempts.
Deterrent Control
A type of security control that discourages intrusion attempts.
Compensating Control
A type of security control that acts as a substitute for a principal control. Not the top line, but gives you some protection.
Responsive Control
System that actively monitors for potential vulnerabilities or attacks, and then takes action to mitigate them before they can cause damage
Firewall
system that monitors all incoming and outgoing network, traffic and blocks
Intrusion Prevention System (IPS)
devices that can monitor network traffic for patterns that indicate an intrusion is occurring such as a repeated failed log on attempt.
How do you decide which security control you’re actually going to apply?
It depends on the risk
How can I mitigate risk?
Use the CIA triad. Ask which part or parts do you have controls for and how can you add controls for what you are missing so that you cover all of them or mitigate what can’t be covered.
Security Intelligence
process where data is generated and is then collected, processed, analyzed, and disseminated to provide insights into the security status of information systems.
Security Intelligence points…
Inward. As you go through your FW logs, intrusion detection alerts and other things, you’re understanding what your security posture is internally.
We are looking inward, how are our systems looking?
Cyber Threat Intelligence (CTI)
Investigation, collection, analysis, and dissemination of information about emerging threats and threat sources to provide data about the external threat landscape.
CTI points…
Outward, we are thinking about attacker groups, malware outbreaks, 0 day exploits. All of the bad things out there and what could hurt us.
What are 2 forms of CTI
Narrative reports & Data Feeds
In CTI what is a narrative report and what do they do?
gives us the analysis of a certain adversary group or a certain type of malware. These give you intel about what the bad guys are doing and can help security professionals decide where we want to put money and which security controls we want to have to be able to defend ourselves from the bad guys and those types of attacks.
In CTI what is a data feed and what are some examples
can be a list of known bad indicators (IOCs), domain names, IP addresses, it might be something like hashes of exploit malware code.
What kind of information are things like domain names, IP addresses or hashes of exploit malware code.
Tactical information