Domain 1: Security and Risk Management Flashcards
CIA Triad
Confidentiality, Integrity, Availability
Ex: Violation of Confidentiality
capturing network traffic, stealing password files, social engineering, port scanning, shoulder surfing, sniffing…
Sensitivity
quality of info, which could cause harm or damage if disclosed
Discretion
act or decision where an operator can influence of control disclosure to minimize damage
Criticality
level to which info is mission critical
Concealment
act of hiding or preventing disclosure
Seclusion
Storing info in an out of the way location
Ex: Violation of Integrity
Accidental deletion of files, entering invalid data, including errors in commands…
Availability
Authorized subjects are granted timely and uninterrupted access to objects
Ex: Violations of Availability
Accidental deletion of files, over utilization of HW/SW, underallocating resources…
AAA Services
Identification, Authentication, Authorization, Auditing, Accounting
Identification
who you are
Authentication
you are who you say you are
Authorization
allows and denials of resource and object access for who you are
Auditing
recording of events
Accounting/Accountability
holding subjects accountable for their actions
Nonrepudiation
ensures that the subject of an activity or event cannot deny that the event occurred, possible through AAA services
Layering
Defense in Depth, Delay an intruder
Abstraction
Similar elements are put into groups, classes, or roles and assigned security controls as a collective
Data Hiding
positioning data in a logical storage compartment not seen by subjects (think classification levels)
Encryption
art and science of hiding the meaning or intent of a communication from unintended recepients
Security Governance
Collection of practices related to supporting, defining, and directing the security efforts of an org
The best key plan is useless without ________
approval by senior mgmt
Security Plan Timeline
Strategic (5 year - risk assessment, stable, security purpose), Tactical (1 year - midterm, schedules tasks, project plans, hiring plans, budget plans), Operational (Months -short term, highly detailed, training plans, system deployment plans)
Importance of CM
Change can introduce new loopholes, overlaps, and oversights that lead to new vulnerabilities
Goal of CM
ensure that change does not lead to reduces security, backups and rollbacks
Data Classification
data is protected based on its need for secrecy, sensitivity, or confidentiality
Primary Objective of Data Classification
formalize and stratify the process of securing data based on assigned labels of importance and sensitivity
7 steps to implement a classification scheme
- Identify the custodian and define responsibilities
- Specify the evaluation criteria of how the info will be classified and labeled
- Classify and label each resource
- Document any exceptions to the classification policy
- Select the security controls
- Specify the procedures for declassifying resources
- Create an enterprise-wide awareness program
Levels of Government Classification
Top Secret, Secret, Confidential, Sensitive but Unclass, Unclassified
Commercial Classification Levels
Confidential/Proprietary, Private, Sensitive, Public
Senior Manager
ultimately responsible for security maintained
Security Professional
experienced network, systems, and security engineer who is responsible for following the directives mandated by senior mgmt (functional responsibility)
Data Owner
responsible for the classifying of info
Data Custodian
responsible for the tasks of implementing the prescribed protection defined by the security policy and senior management
User
person who has access to the system
Auditor
responsible for reviewing and verifying that the security policy is properly implemented
COBIT & COSO
goals for meeting security - COBIT is IT, COSO is org
Due Care
using reasonable care to protect the interests of the org
Due Diligence
Practicing the activities that maintain due care
Security Policy
document that defines the scope of security needed by and org and discusses assets that need protection. Assigns responsibilities, defines roles, specify audit requirements, defines acceptable risk levels
3 Categories of Security Policies
Regulatory (industry and legal standards), Advisory (acceptable use policy) and Informative (support, background)
Standards
define requirements for homogeneous use of hw, sw, tech, and security controls. Tactical docs that defines steps to accomplish goals defined by the security policy
Baseline
minimum level of security that every system must meet
Guidelines
recommendation on how standards and baselines are implemented
Procedures
step by step how to
Relationship of Policy Components
(Inverted Triangle) Procedures -> Guidelines -> Standards -> Policies
3 Approaches to ID Threats
Focus on Assets, Focus on Attackers, Focus on Software
STRIDE
Threat Categorization Scheme - Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privileges
Reduction Analysis
decomposing the application, system or environment
5 key concepts of decomposition
Trust Boundaries, Data Flow Paths, Input Points, Privileged Operations, Details about Security Stance and Approach
DREAD
Threat Ranking - Damage Potential, Reproducibility, Exploitability, Affected Users, Discoverability
Acquisition Assessment
On-Site Assessment, Document Exchange and Review, Process/Policy Review
Protection Mechanisms
Layering, Abstraction, Data Hiding, Encryption
Applying Threat Modeling
Identifying threats
Determining potential attacks
Performing reduction analysis
Prioritization and response
Separation of Duties
work tasks are divided among several individual administrators
Collusion
occurrence of negative activity undertaken by two or more people
Job Responsibilities
Specific work tasks an employee is required to perform on a job
Job Rotation
rotating employees among multiple positions to provide knowledge redundancy and reduce the risk of fraud, misuse of info, data modification, etc.
NDA
Nondisclosure agreement used to protect the confidential information within an organization from being disclosed by a former employee
NCA
Noncompete Agreement prevents employees with secrets from working in a competing org