Domain 1 -- Security and Risk Management Flashcards
What are the ways to achieve Availability?
- RAID disks
- Clustering
- Load Balancing
- Redundant Data and Power lines
- Software and data backups
- Disk shadowing
- Co-location and off-site facilities
- Rollback functions
- Failover configurations
What are the ways to achieve Integrity?
- Hashing (data integrity)
- Configuration management (system integrity)
- Change Control (process integrity)
- Access Control (Physical and technical)
- Software digital signing
- Transmission Cyclic Redundancy Check (CRC Functions)
What are ways to achieve Confidentiality?
- Encryption for data at rest (whole disk or DB encryption)
- Encryption for data in transit (IPSec, TLS, PPTP, SSH)
- Access Control (physical and technical)
Definition of Vulnerability
A vulnerability is a weakness in a system that allows a threat source to compromise its security
What is a threat?
A threat is any potential danger that is associated with the exploitation of a vulnerability.
The entity that takes advantage of a vulnerability is a threat agent
What is a risk?
A risk is a likelihood of a thread source exploiting a vulnerabilty.
What is an exposure?
An exposure is an instance of being exposed to losses.
A vulnerability exposes an organization to possible losses
What is a control?
A control is a countermeasure put in place to mitigate (reduce) the potential risk
Note: Control, Countermeasure and safeguard are interchangeable terms
What is the relationship between Vulnerabilities, threats, risks, exposures and controls?
See Image
What are the three types of Controls?
- Administrative
- Technical
- Physical
Give Examples of Physical Controls
- Fence
- Locked external doors
- CCTV
- Security Guard
- Locked internal doors
- Locked server room
- Physically secured computers (cable locks)
What are examples of Technical Controls?
- Firewalls
- Intrusion Detection Systems
- Intrusion Prevention systems
- Antimalware
- Access control
- Encryption
What are examples of administrative controls?
- Security Documentation
- Risk Management
- Personnel security
- Training
What are the six different control functionalities?
- Preventive
- Detective
- Corrective
- Deterrent
- Recovery
- Compensating
Give examples of Administrative Preventive Contols
- Policies and procedures
- Effective hiring practices
- Pre-employment background checks
- Controlled termination processes
- Data Classification and labeling
- Security awareness
Give examples of Physical Preventive Controls
- Badges and swipe cards
- Guards, dogs
- Fences, locks, mantraps
Give examples of Techical Preventive Controls
- Passwords, biometrics, smart cards
- Encryption, secure protocols, call-back systems, database views, constrained user interfaces
- Antimalware software, access control lists firewalls, intrusion prevention systems
Is Security through Obscurity a good idea or a bad idea?
Bad idea
What is a framework for developing a Security Program?
ISO/IEC 27000 Series
Examples:
- ISO / IEC 27014 Information Security Governance
- ISO / IEC 27031 Business Continuity
- ISO / IEC 27035 Incident Management
- ETC.
What are Standards for Enterprise Architecture Development?
- Zachman Framework
- TOGAF - The Open Group Arch Framework
- DoDAF - Dept of Defense Arch Framework
- MODAF - Arch frameword developed by British Ministry of Defence
- SABSA Model - Model and methodology for the Dev of Security enterprise architectures
What are the Security Controls Development Frameworks?
- COBIT 5 - Developed by the Information Systems Audit and Control Association (ISACA)
- NIST SP 800-53 – Set of controls developed by NIST to protect Federal Systems
- COSO Internal Control - Integrated Framework. Developed by the Committee of Sponsoring Organizations (COSO) of the Treadway Commision
What are the three key Process Management Development Frameworks?
- ITIL - IT Service Management (started in UK)
- Six Sigma
- CMMI - Capability Maturity Model Integration (developed by Carnegie Mellon)
What are the key things to remember about the Zachman Framework?
- Interogatives / Perspectives
- What / How / Where / Who / When / Why
- Top to bottom Executives to Technicians
What are the key things to remember about TOGAF
Used to develop
- Business Architecture
- Data Architecture
- Application architecture
- Technology architecture
- Architecture Development Model
What are the key things to remember regarding DoDAF and MODAF?
- These are military architectural frameworks
- These are designed to solve the problem of communicating information from a very large collection of agencies/stakeholders
What does SABSA stand for and why is it important?
- SABSA stands for Sherwood Applied Business Security Archicture
- Similar to Zachman framework for security architecture
- What are you trying to do at this layer?
- Why are you doing it?
- How are you trying to do it?
- Who is involved?
- Where are you doing it?
- When are you doing it?
What does ISMS stand for and what is a synonym for it?
ISMS stands for Information System Management System
An ISMS is the same as a Security Program
What does COBIT stand for and what are its five key principles?
COBIT – Controls Objectives for Information and related Technology
5 principles
- Meeting stakeholders needs
- Covering the enterprise end to end
- Applying a single integrated framework
- Enabling a holistic approach
- Separating governance from management
Note – COBIT deals with all aspects of IT, not just security
Note – COBIT is used in the private sector, NIST SP 800-53 is used in gov
What does COSO stand for and what are its five control principles?
COSO stands for Committe of Sponsoring Organizations (COSO)
The COSO Internal Control – Integrated Framework is a set of internal corporate controls to help reduce the risk of financial fraud.
- Control Environment
- Risk Assessment
- Control Activities
- Information and Communication
- Monitoring Activities
What’s the difference between the COSO IC framework and COBIT?
- The COSO Integrated Controls Framework is a model for corporate governance
- COBIT is a model for IT governance
Which is more dangerous – a script kiddie or an Advanced Persistent Threat (APT)?
An Advanced persistent threat is more dangerous
What does GDPR stand for and what is its goal?
GDPR stands for General Data Protection Regulation
It is intended to protect personal data and privacy for EU citizens
What does the Wassenaar arrangement deal with and what is its goal
The Wassenaar arrangement implements export controls for Conventional Arms and Dual-use Goods and Technologies.
- It is designed to prevent one country from building up too much military capability
- Part of the Wassenaar arrangement deals with cryptography
What is the strongest form of intellectual property protection?
a patent
What’s the difference between the following?
- Freeware
- Shareware/Trial Software
- Commercial Software
- Academic software
- Freeware - Free
- Shareware/Trial Software - Free trial version
- Commercial Software
- Academic software - software used by academic institutions at a reduced cost