Domain 1 - Security and Risk Management Flashcards
Confidentiality
- We keep our data and secrets secret.
- We ensure no one unauthorized can access the data
Integrity
- Protection against modification of the data and the systems
- We ensure the data has not been altered
Availibility
We ensure authorized people can access the data they need, when they need to
Threats on Confidentiality
- Attacks on encryption (cryptanalysis)
- Social Engineering
- Key Loggers
Countermeasures on threats on confidentiality
- Encryption data at rest using AES256, full disk encryption
- Secure transport protocol for data in motion using SSL, TLS, IPSEC
- Using secure practice when data in use , for example, clean desk no shoulder surfing, PC locking
- Strong password, multi factor authentication, masking, strict access control, Principle of Least Privilege (PoLP)
Threats on Integrity
- Alteration of data
- Code Injection
- Attacks on encryption
Countermeasures on threats on Integrity
- Cryptography
- Check sums/Hash verification
- Digital Signature (provide non-repudation)
- Strict Access Control
Threats on Availability
- Malicious attacks (DDOS, physical, system compromise, staff)
- Application failures (errors in code)
- Component failures (Hardware)
Countermeasures on threats on availability
- IPS/IDS
- SLAs - How high uptime to we want (99%)
- Patch Management
- Redundancy in Hardware power, Disks (RAID), Traffic Path, HVAC, staff, High Availability
The Opposite of CIA Triad
DAD (Disclosure, Alteration, and Destruction)
IAAA services
Identification, Authentication, Authorization, and Accountability
Identification
Claiming Identity for example, your name, username, id number
Authentication
Proving you are the identity you were claimed.
3 types of Authentication
Type 1 - something you know (password, PIN, etc)
Type 2 - something you have (cookie, ID number, passport, token, etc)
Type 3 - something you are - biometrics - no way to reissue if compromises (fingerprint, iris scan, facial geometry, etc)
Authorization
Permission, What are you allowed to access.
Accountability
Trace action to subject identity, prove who/what a given action was performed by (non-repudiation)
What is mission IT Security in organization?
Supporting organization, enable organization to fulfill its mission and statement and business goals, not the most important part of organization.
What is PoLP?
Principle of Least Privilege - We give our users/systems exactly the access they need, no more, no less.
Need to Know - Even if you have access, if you do not need to know, then you should not access the data.
What is non-repudiation?
A user cannot deny having performed a certain action. This uses both Authentication and Integrity.
Subject and Object on Security Governance
Subject (Active) - Most often users, but can also programs, Subject manipulates object.
Object (Passive) - Any passive data - Object manipulated by Subject
Some can both at different times, an active program is a subject; when closed, the data can be an object
Governance vs. Management
Governances - This is C-Level Executives
> What are stakeholder needs
> Setting direction through prioritization and decision making
> Monitoring performance and compliance againts agreed-upon direction and objectives
> Risk appetite - Aggresive, neutral, adverse
Management - How do we get to the destination
> Plans, builds, runs, monitor activities in alignment with the direction set by the governance to achieve the objectives.
> Risk tolerance - How are we going to practically work with our risk appetite and our environment.
Top-Down vs. Bottom-Up on Security Management
Bottom-Up : IT Security seen as annoyance not helper, this often changes when breaches happens.
Top-Down : IT leadership is on board with IT Security, they lead and set direction.
What is PCI-DSS?
Payment Card Industry Card Security Standard
> is a standard but required if we want to handle or issue debit and credit card
What is OCTAVE?
Operational Critical Threat, Asset, and Vulnerability Evaluation
> Flexible Risk Management
What is COBIT?
Control Objectives for Information and related Technology
> Goals for IT - Stakeholder needs are mapped down to IT related goals.
What is COSO?
Commitee of Sponsoring Organizations
> Goals for the entire organizations (more higher level)
What is ITIL?
Information Technology Infrastructure Library
> IT Service Management (ITSM)
What is FRAP?
Facilitated Risk Analysis Process
> Analyzed one business unit, application, or system at a time in roundtable brainstorm with internal employees, The impact is analyzed, and the threats and the risks are prioritized.
List ISO 27000 series?
ISO 270001: Establish, implement, control, and improvement of the ISMS. Uses PDCA (Plan, Do, Check, Act)
ISO 27002: Provides practical advice on how to establish, implement, control, and improvement security controls. It has 10 domains it users for ISMS (cannot get this certified)
ISO 27003: Information security management system implementation guidance
ISO 27004: Provides metrics for measuring the success of your ISMS
ISO 27005: Standards based approach to risk management
ISO 27799: Directive on how to protect PHI (Protected Health Information)