Domain 1 - Security and Risk Management Flashcards

1
Q

Confidentiality

A

Access controls help ensure that only authorized subjects can access objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Ensures that data or system configurations are not modified without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Authorized requests for objects must be granted to subjects within a reasonable amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Code of Ethics

A

PAPA
Protect society, the commonwealth, and the infrastructure.

Act honorably, honestly, justly, responsibly, and legally.

Provide diligent and competent service to principals.

Advance and protect the profession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Policy development

A

Acceptable Use Policy
Assigns roles and responsibilities

Security Baselines
Define “minimum levels”

Security Guidelines
Offer recommendations

Security Procedures
Detailed step-by-step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Categories

A

Group of potential causes of risk.

Damage - Results in the physical loss of an assess or the inability to access the asset.

Disclosure - Disclose critical information regardless of how or where it was disclosed.

Losses - Might be permanent or temporary including altered data or inaccessible data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Factors

A

Something that increase risk or susceptibility.

Physical damage - Natural disaster, power loss, or vandalism.

Malfunctions - Failure of systems, networks, or peripherals.

Attacks - Purposeful acts whether from the inside or outside, such as unauthorized disclosure.

Human errors - Usually considered accidental incidents, whereas attacks are purposeful incidents.

Application errors - Failures of the application including the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Planning

A

Strategic - long term ~5 year

Tactical - midterm plan ~1 year

Operations - shorter (highly detailed) month to month or quarterly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Response to risk

A

Risk acceptance - Do nothing, accept the risk and potential loss if threat occurs.

Risk mitigation - You do this by implementing a countermeasure and accepting the residual risk.

Risk Assignment - Transfer risk to 3rd party.

Risk Avoidance - When costs of mitigating or accepting are higher than benefits of service

Risk Deterrence - Implementing deterrents to would-be violators of security behavior.

Risk rejection - UNACCETABLE possible response to risk is to reject of ignore risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk management Frameworks

A

Primary risk management framework

NIST 800-37 rev 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

7 Steps of NIST 800-37 rev 2

A

PCSIAAM
People Can See I am Always Monitoring

  1. Prepare - to execute the RMF
  2. Categorize - information systems
  3. Select - security controls
  4. Implement - security controls
  5. Assess - the security controls
  6. Authorize - the system (ATO)
  7. Monitor - security controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When legal issues are involved.

A

contact an attorney

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Risks

A

Residual - risk that remain after all safeguards - After

Inherent - risk that exists without controls (newly identified) - Before

Total - amount of risk an organization would face if no safeguards were implemented - Without

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Total Risk Formula

A

threats * vulnerabilities * asset value = total risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk formula

A

threat * vulnerability = risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk analysis - Quantitative

A

Quantitative - dollar value to evaluate effectiveness of countermeasures. OBJECTIVE

  • Assign asset value (AV)
  • Calculate exposure factor (EF)
  • Calculate single loss expectancy (SLE)
  • Assess the annualized rate of occurrence (ARO)
  • Derive the annualized loss expectancy (ALE)
  • Perform cost/benefit analysis of countermeasures
  1. Inventory assets and assign a value (AV)
  2. Identify threats. Research each asset and produce a list of all possible threats to each assets. (EF and SLE)
  3. Perform a threat analysis to calculate the likelihood of each threat being realized within a single year. (ARO)
  4. Estimate the potential loss by calculating the annualized loss expectancy (ALE).
  5. Research countermeasures for each threat, and then calculate the changes to ARO and ALE based on an applied countermeasure.
  6. Perform a cost/benefit analysis of each countermeasure for each threat for each asset.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk analysis - Qualititative

A

Uses a scoring system to rank threats and effectiveness of countermeasures. SUBJECTIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Delphi Technique

A

An anonymous feed-back and response process used to arrive at a consensus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Loss potential

A

What would be lost if the threat agent is successful in exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Delayed loss

A

This is the amount of loss that can occur over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Threat agent

A

are what causes the threat by exploiting vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Formula terms

A
exposure factor (EF)
% of loss that an organization would experience if a specific asses were violated by a realized risk.

single loss expectancy (SLE)
Represents the cost associated with a single realized risk against a specific assets

annualized rate of occurrence (ARO) - The expected frequency with which a specific threat or risk will occur with a single year.

annualized loss expectancy (ALE)

Safeguard evaluation -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SLE Formula

A

AV * EF = SLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ALE

A

SLE * ARO = ALE

25
Q

Safeguard Evaluation formula

A

ALE before safeguard - ALE after safeguard - annual cost of safeguard = value of safeguard
ALE1 - ALE2 - ACS = value of safeguard

26
Q

Controls gap

A

the amount of risk reduced by impending safeguards

total risk - controls gap = residual risk

27
Q

Threat Modeling

A

Security process where potential threats are identified, categorized, and analyzed.

28
Q

Threat Model

STRIDE

A
STRIDE (Microsoft)
Spoofing
Tampering 
Repudiation
Information Disclosure 
Denial of Service
Elevation of Privilege
29
Q

Threat Model

PASTA

A

Risk centric approach

Stage I: Definition of Objectives

Stage II: Definition of Technical Scope

Stage III: App Decomposition and Analysis

Stage IV: Threat Analysis

Stage V: Weakness and Vulnerability Analysis

Stage VI: Attack Modeling & Simulation

Stage VII: Risk Analysis & Management

30
Q

Threat Model

VAST

A

Based on Agile project management

Visual
Agile
Simple
Threat

31
Q

Threat Model

Trike

A

Risk-based approach

32
Q

Threat Model

DREAD

A

Damage potential

Reproducibility

Exploitability

Affected users

Discoverability

33
Q

Reduction Analysis - Threat Modeling

A

Trust boundary - any location where the level of trust or security changes

Data flow paths

Input points - locations where external inputs are received

Privileged operations - any activity that requires greater privileges than of a standard user account

Details about security stance and approach

34
Q

Security controls

A

measures for countering and minimizing loss of unavailability

35
Q

Control categories

A

Technical (logical) - hardware/software mechanisms used to manage access

Administrative - policies and procedures defined by org’s security policy, and other regulations and requirements.

Physical - items which you can touch - guards, gates, laptop locks

36
Q

Control types

A

Deterrent Controls - deployed to discourage violation of security policies

Preventative Controls - deployed to thwart or stop unwanted or unauthorized activity from occurring - (fences, locks, access control points, alarm systems, separation of duties, job rotation, antimalware software, firewalls, IPs)

Detective Controls - deployed to discover or detect unwanted or unauthorized activity - (CCTV, honeynets/honeypots, IDSs, security cameras, guards, audit trails, incident investigators) .. discover activity only AFTER it has occured

Compensating Controls - provides other options to other existing controls to aid in enforcement of security policies.

Corrective Controls - modifies the environment to return system to normal after an unwanted or unauthorized activity has occurred

Recovery Controls- an extension of corrective controls but have more advanced or complex abilities. Attempts to repair or restore resources, functions, and capabilities after a security policy violation.

Directive Controls - direct, confine, or control the actions of subjects to force or encourage compliance with security policies

37
Q

Laws

A

Computer Fraud and Abuse Act (CFAA) - The first major
piece of US cybercrime-specific legislation

Federal Sentencing Guidelines. provided punishment
guidelines to help federal judges interpret computer crime
laws.

Federal Information Security Management Act (FISMA).
Required a formal infosec operations for federal gov’t

Copyright and the Digital Millennium Copyright Act. Covers
literary, musical, and dramatic works.

38
Q

IP Licensing

A

Trademarks. covers words, slogans, and logos used
to identify a company and its products or services.

Patents. Patents protect the intellectual property
rights of inventors.

Trade Secrets. intellectual property that is absolutely
critical to their business and must not be disclosed.

Licensing. 4 types you should know are contractual,
shrink-wrap, click-through, and cloud services.

39
Q

Encryption and Privacy

A

Computer Export Controls. US companies can’t
export to Cuba, Iran, North Korea, Sudan, and Syria.

Encryption Export Controls. regulations on the
export of encryption products outside the US.

Privacy (US). The basis for privacy rights is in the
Fourth Amendment to the U.S.

Privacy (EU). General Data Protection Regulation
(GDPR) is the most likely to be mentioned

40
Q

U.S. Privacy Laws

A

HIPAA (Health Insurance Portability and Accountability Act)

HITECH (Health Information Technology for Economic and
Clinical Health)

Gramm-Leach-Bliley Act (financial institutions)

Children’s Online Privacy Protection Act (COPPA)

Electronic Communications Privacy Act (ECPA)

Communications Assistance for Law Enforcement Act
(CALEA)

41
Q

Domain 1

A

Chapter 1 - 4

42
Q

Integrity is dependent on

A

Confidentiality and access control

43
Q

Availability is dependent on

A

integrity and confidentiality

44
Q

Protection Mechanisms

A

Defense in depth

Abstraction - used for efficiency. Similar elements are put into groups, classes or roles that are assigned security controls, restrictions, or permissions as a collective.

Data Hiding

Encryption

45
Q

NIST Risk Management Framework (RMF)

A

Six phases: CSIAAM
Categorize select implement assess authorize monitor

Categorize

Select

Implement

Assess

Authorize

Monitor

46
Q

Elements of AAA

A

Identification

Authentication

Authorization

Auditing

Accountability

47
Q

COBIT

A

Control Objectives for Information and Related Technology (COBIT) - security concept infrastructure used to organize the complex security solutions of companies.

48
Q

UBA and UEBA

A

User behavior analytics
User and entity behavior analytics
-Concept of analyzing the behavior or users, subjects, visitors, customers, etc for a specific goal or purpose.

49
Q

RMM

A

Risk maturity model

is a means to assess the key indicators and activities of a mature, sustainable, and repeatable risk management process.

50
Q

BCP

A

Business Continuity Plan - 4 steps

Project scope and planning

Business impact analysis

Continuity Planning

Approval and implementation

51
Q

BIA

A

Business Impact Analysis

Identifies the business processes and tasks that are critical to an organization’s ongoing viability and the threats posed to those resources.

52
Q

MTO | MTD

A

Maximum tolerable outage | Maximum tolerable downtime

The maximum length of time a business function can tolerate a disruption before suffering irreparable harm.

53
Q

RTO

A

Recovery time objective (RTO)
for each business function is the amount of time in which you think you can feasibly recover the function in the event of a disruption.

54
Q

RPO

A

Recovery point objective

data loss equivalent to the time-focused

55
Q

Business impact analysis process

A
Five stages 
Identification priorities
Risk identification 
Likelihood assessment
Impact analysis 
Resource prioritization
56
Q

ITAR

A

International Traffic in Arms Regulations
-controls the export of items that are specifically designated as military and defense items, including the technical information related to those items.

57
Q

EAR

A

Export Administration Regulations

Cover a broader set of items that are designed for commercial use by may have military applications.

58
Q

Canadian privacy law

A

PIPEDA

Personal Information Protection and Electronic Documents Act

59
Q

Credit card payment PCI DSS

A

12 main requirements