Domain 1 Flashcards
Study
A logical structure used to document and organize processes?
Framework
Framework for designing, establishing, implementing, maintaining, and monitoring an information security program.
ISMS (Information Security Management System)
Internationally recognized Information Security Framework
ISO 27000
Payment card system information security contractually enforced framework
PCI DSS (Payment Card Industry Data Security)
This type of metric is intended to help an organization compare themselves to peers
Benchmark
<p>Publisher of the SP800 series.</p>
<p>NIST</p>
This program is the U.S government repository of publicly available security guidance.
NCP (National Checklist Program)
This U.S framework is voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk
NIST Cybersecurity Framework
The U.S government repository of standards-based vulnerability management data.
NVD (National Vulnerability Database)
Principle that focuses on protection from unintentional accidental, or inadvertent change.
Integrity.
Process of tracing actions to their source.
Accountability.
Principle that only authorized subjects have access.
Confidentiality
Positive identification of a person or a system.
Authentication.
Process used to develop confidence that security measures are working as intended.
Assurance.
Principal that relates to operations and accessibility.
Availability.
Granting users and systems a predetermined level of access
Authorization.
Confidence that the system will act in a correct and predictable manner in every situation.
Trustworthy Computing.
Logging of access and use of information resources.
Accounting.
Expanded view of information security to include external relationships and global threats.
Cybersecurity.
The standard of care that a prudent person would have exercised under the same or similar conditions:
- Actions taken by an organization to protect its stakeholders, investors, employees, and customers from harm.
Due Care.
Is an investigation of a business or person generally before entering into a contract:
- Is is the care and caution a reasonable person would take.
Due Diligence.
Is the potential liability incurred by a company whose computer systems are compromised and becomes the source of harm.
Downstream Liability.
The board or a board committee duties include:
- Promoting effective governance.
- Determining organizational risk tolerance.
- Contributing to and authorizing strategic plans.
- Allocating funds.
- Approving policies and significant projects.
- Ensuring appropriate monitoring.
- Ensure compliance with laws, regulations and contracts.
- Reviewing audit and examination results.
- Honoring the legal constructs of due diligence and due care.
Executive management is responsible for:
- Strategic Alignment.
- Risk Management.
- Value delivery.
- Performance measurements.
- Resource management.
- Processes assurance.
Corporate Governance.
Is the system by which organizations are directed and controlled.
Governance structures are principles identify the distribution of rights and responsibilities.
Governance Outcomes.
- Strategic Alignment.
- Risk Management.
- Value Delivery.
- Resource Management.
- Performance Measurements.
- Process Integration.
Strategic Alignment.
Aligning departmental strategies with business strategy to support organizational goals.
Risk Management.
Mitigate risk to acceptable level.
Value Delivery.
Optimize investments in support of business objectives.
Resource Management.
Efficient and effective use of resources.
Performance Measurements
Monitoring and reporting on achievements.
Processes Integration.
Achieve operational synergies and efficiencies.
Information Security Management (ISM) personnel.
Generally have the authority to interpret strategic direction and are held accountable for the success of failure of their area.
ISM personnel should report as high as possible to maintain visibility, limit distortion, and minimize conflict of interest.
Related infosec or ISM organizational roles, include:
- Chief Risk Officer (CRO)
- Chief Information Security Officer (CISO)
- Information Security Officer (ISO)
- Information Assurance Officer (IAO) or manager (IAM)
- Privacy Officer
- Compliance Officer.
- Physical Security Officer.
- Internal Audit.
Information Security Management include:
- Being a subject matter expert and security champion.
- Managing the information security program.
- Communicating with executive management.
- Coordinating the budget for information security activities.
- Ensuring the development and upkeep of governance documents.
Functional Roles.
Functional roles are tactical and relate to specific data-sets, information systems, assets, or processes.
Information Owner.
Owners are members of management responsible for protection of a subset of information.
Custodians.
Custodians are responsible for implementing, managing, and monitoring the protection mechanisms.
Data Users.
Users are expected to follow operational security procedures.
Jurisdiction.
Is the power or right of a legal or political agency to exercise its authority over a person, subject matter, or territory. Jurisdiction considerations include:
- Privacy and security regulations (or lack of).
- Access of local governments to stored or transmitted data.
- Attitudes toward “foreigners”
- Law Enforcement.
GLBA
The Safeguards Rule requires financial institutions to have measures in place to keep customer information secure. In addition to developing their own safeguards, companies covered by the safeguards rules are responsible for taking steps to ensure that their affiliates and service providers safeguards customer information in their care.
HIPPA | HITECH
The Security Rule requires covered entities implement appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information in their care and shared with business partners.
FISMA
FISMA requires federal agencies to implement a program to provide security for their information and information systems including those provided by or managed by another agency.
Data Protection Directive / GDPR (EU)
Data protection for all individuals within the European Union. EU Data Protection Directive (EU DPD) and it’s successor the GDPR (General Data Protection Regulations) is based upon the Organization for Economic Cooperation and Development (OECD) Privacy Principles.
Cookie Law.
Web cookies inform and consent requirements.
PCI DSS
Payment Card Industry Data Security Standard (PCI DSS) is a contractual obligation between merchants and the the payment card brands.
- The PCI DSS framework includes stipulations regarding storage, transmissions, and processing of payment card data.
- Six core principles require technical and operational security controls, testing, requirements, and attestation process.
Board of Directors
Group ultimately responsible for the actions of the organization from a fiduciary perspective.
Users
Group responsible for interacting with information systems in accordance with organizational policies and standards.
Privacy
<p>Privacy is the right of an individual to control the use of their personal information.</p>
Information Security.
Information Security is the process by which we safeguard information and systems and ensure confidential, integrity, and availability.
Data Compilation
Collection of data for “later use” to be determined.
Data Warehousing
Data Warehousing combines data from multiple sources into a large database with the purpose of extensive retrieval and trend analysis
Data Mining
Process of analyzing data with tools that look for trends, correlations, or anomalies resulting in metadata.
Aggregation
individual pieces of data are combined to create a bigger picture that may have greater sensitivity thank individual parts.
Inference
Ability to derive information that is not explicitly available.
Family Education Rights and Privacy Act (FERPA)
<p>Student educational records.</p>
<p>Federal Privacy Act (U.S.)</p>
<p>Data Collected by the Government.</p>
<p>Children's Online Privacy Protection Act (COPPA)</p>
Citizen data privacy protection.
Privacy Statement
- Clearly state what information may be collected, how the information will be used, who the information may be shared with and why, how a third-party may use the information, and how to opt out.
- Codify the organization’s commitment to data quality and to data security.
Computer Crime
Computer Crime is a term broadly applied when a computer is used in the act of computing a crime. Computer crimes are often divided into two categories:
- Computer as the target of a crime.
- Computer as a tool (weapon) used to commit a crime.
Computer Fraud and Abuse Act
Unauthorized access to federal government, financial institution system, or any system used for interstate or foreign commerce.
National Information Infrastructure Protection Act of 1996
Primary federal anti-hacking statute.
Wiretap Act
Unauthorized interception of digital communications.
Electronic Communications Privacy Act
Unauthorized access or damage to electronic messages in storage.
Cybercrime
Is a broad term given to criminal activity that involves the Internet, a computer system, a computer network, or technology.
Cyber Threat Actors
- Hackers / Script Kiddies.
- Organized Crime.
- Hacktivist .
- Nation-State founded.
- Insiders.
- Competitors.
Data Breach Disclosure & notification
An incident that is classified as a confirmed or high probability breach may trigger disclosure and notification requirements.
Intellectual Property
Intellectual Property (IP) describes a wide variety of property created by musicians, authors, artists, designers, and inventors.
- Intellectual property can be used in commerce or can be artistic or literary works.
- Intellectual property laws protect use and misuse including compensation.
- Intellectual Property law includes patents, trademarks, copyrights, trade secrets and software licensing.
Patents
Patents are designed to protect an invention.
- The invention must be novel, not obvious, and provide some utility.
- A patentable invention must be something that can be produced.
- A patent is good for 20 years.
Trademarks
A trademark is intended to protect recognizable names, icons, shape, color, sound, or any combination used to represent a brand, product, service, or company.
- Law creates exclusive rights.
Copyrights
A copyright covers the expression of an idea rather than the idea itself (which is protected by the patent).
- The intent is not protect artistic property such as a writing, recording, or a computer program.
- The protections are intended to allow the creator to benefit from being credited for the work and to control the distribution, duplication, and use of the work.
- A trademark or service mark can be renewed every 10 years.
Trade Secrets
Trade Secrets refer to proprietary business and technical information, processes, designs, or practices that are confidential and critical to a business.
- Trade Secrets don’t require any registration.
Software Piracy
It is defined as the “unauthorized copying or distribution of copyrighted software”.
- Piracy includes copying, downloading, sharing, selling, or installing, or installing multiple copies onto personal or work computers.
- The Digital Millennium Copyright Act (DMCA) makes it illegal to create products that circumvent copyright protections such as a license key.
End-user license agreement (EULA)
Legally enforceable software use agreement.
Which statement best describes the concept of privacy?
The right of an individual to control the use of their personal information.
Hacktivist
The primary motivation of this threat actor us making a political statement.
The 4 canons of the ISC2 Code of Ethics
- Protect society, the common good, necessary public trust and confidence, and the infrastructure.
- Act honorably, honestly, justly, responsibly, and legally.
- Provide diligent and competent service to principles.
- Advance and protect the profession.
Policies
Policies are high-level statements (governance communications) intended to communicate rules and expectations and to provide direction.
- Standards, baselines, guidelines, and procedures support the implementation of a policy.
- Policies must be approved by executive management.
Information Security Policy
The Information Security policies codify the high-level requirements for protection information and information assets and ensuring Confidentiality, Integrity, and Availability.
- Written information security policies may be a regulatory or contractual compliance requirement.
- Each aspect of the information security program should have a corresponding policy documents.
Policy Attributes.
- Endorsed
- Relevant
- Realistic
- Attainable
- Adaptable
- Enforceable
- Inclusive
Policy Life-cycle.
- Plan
- Write
- Approved
- Publish (Communicate, Disseminate, Educate)
- Adopt (Implement, Monitor, Enforce)
- Review (Solicit Feedback, Reauthorize or Retire)
Standards
Standards serve as specifications for the implementation of policy and dictate MANDATORY requirements.
Baselines
Baselines are aggregate of standards for a specific category or grouping such as a platform, device type, ownership, or location.
Guidelines
Guidelines help people understand and conform to a standard. Guidelines are customized to the intended audience and are NOT mandatory