Domain 1 Flashcards
ICS2 Code of Ethics
- Protect Society, the commonwealth, the infrastructure
- Act honorably, honestly, justly, legally
- Provide diligent and competent service to principals
- Advance and protect the profession
4 Levels of Security Policy Development
- Acceptable use policy
- Security baselines
- Security guidelines
- security procedures
3 types of security plans
- Strategic (long term, stable, risk assessment, 5 year)
- Tactical (mid term, details on goals of strategic plan, 1 year)
- Operational (short term, highly detailed, based on strategic + tactical, monthly/quarterly)
Primary risk management framework for the exam
NIST 800-37
Secondary risk management frameworks for the exam
- OCTAVE
- FAIR
- TARA
7 steps of risk management framework (RMF), especially NIST 800-37
- PREPARE to execute the RMF
- CATEGORIZE information systems
- SELECT security controls
- IMPLEMENT security controls
- ASSESS security controls
- AUTHORIZE the system
- MONITOR the security controls
People Can See I Am Always Monitoring
Fact on risk management
Not every risk can be mitigated
Who decides how risk is handled?
Management
What should I do in case of legal issues?
Calling an attorney
Inherent Risk
Newly identified, not addressed with strategies, absence of controls
Total risk
amount of risk WITHOUT ANY safeguards + controls
Formula Total Risk
total risk = threats * vulnerabilities * asset value
Formula Risk
risk = threat * vulnerabilities
6 major steps of Quantitative Risk Analysis
- INVENTORY assets and assign value (AV)
- Identify THREATS (+ calculate EF and SLE)
- Perform a THREAT ANALYSIS (+ calculate likelihood in single year –> ARO=
- Estimate the POTENTIAL LOSS (by calculating ALE)
- Research COUNTERMEASURES for threat (+ calculate change to ARO and ALE)
- Perform a COST BENEFIT analysis
Quantitative Risk Analysis
Dollar value, objective
Qualitative Risk Analysis
Scoring System (rank threats + effectiveness controls), subjective
Delphi Technique
qualitative, anonymous, feedback + response –> arrive at consensus
What threat agents do
exploiting vulnerabilties
Exposure Factor (=EF)
percentage of loss in case asset gets hit
Single Loss Expectancy (=SLE)
costs, single realized risk, specific asset
Formula for SLE
SLE = Asset Value (AV) x Exposure Factor (EF)
Annualized Rate of Occurrence (=ARO)
risk / threat frequency within single year
Annualized Loss Expectancy (=ALE)
yearly cost, realized threat, specific asset
Formula for ALE
SLE x ARO
Safeguard evaluation considerations
mitigate risk, transparent, difficult to bypass, cost effective
Formula Value of Safeguard
ALE before safeguard - ALE after safeguard - annual costs of safeguard = ALE 1 - ALE2 - ALC
Controls Gap
Amount of risk reduced by implementing safeguard
Formula Residual Risk
Residual risk = Total risk - controls gap
Threat Modeling
potential threats identified, categorized, analyzed –> goal = eradicate or reduce threats
proactive or reactive
Threat Model Focus
- Focused on assets (asset valuation)
- Focused on attacks (threats based on attackers goals)
- Focuses on software (potential threats agains software)
STRIDE (threat model Microsoft)
Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of privilege