Domain 1: Security and Risk Management Flashcards
What is the CIA Triad?
Confidentiality, Integrity and Availability
What is the principle of ‘confidentiality’?
It is about protecting secrecy of data, objects, or resources by preventing unauthorised access to data. Prevent unauthorised disclosure, need to know, and least privilege, assurance that information is not disclosed to unauthorised programs, users, processes, encryption, logical and physical access control.
What is the principle of ‘integrity’?
Protecting the reliability and correctness of data. Examples include access controls, IDS/IPS, and hashing.
What is the principle of ‘availability’?
Providing authorised subjects timely and uninterrupted access to objects. This means access to data is reliable, timely, accessible, fault tolerant, and has recovery procedures in place. Examples include, monitoring network traffic.
What is an ‘object’?
Passive element, such as files, computers, network connections, and applications
What is a ‘subject’?
Active element in a security relationship, such as users, programs and computers.
What is defense in depth?
Use of multiple controls in a series to protect an asset
What is abstraction?
Where details of something is hidden. Security controls can be applied to the entire group (thus hiding the details)
What is ‘IAAA’?
Identification, Authentication, Authorisation, and Auditing
What is ‘Authentication’?
Proving one’s identity. Process of verifying or testing that the claimed identity is valid. Examples include providing a correct password, or other correct information.
What is ‘Authorisation’?
About defining the permissions (e.g. grant or deny) of a resource and object access for a specific identity. It involves evaluating an access control matrix that compares the subject, the object, and the intended activity.
What is ‘Auditing’?
Process of recording log files to check for compliance and violations in order to hold subjects accountable for their actions. Ensures that a subject’s actions are non-repudiation.
What is ‘layering’?
Use of multiple controls in a series. Also known as Defense in Depth. Serial configurations (controls in a row) are very narrow but very deep, alternatively parallel configurations are very broad, but lack depth.
What is ‘data hiding’?
Preventing data from being discovered or accessed by a subject positioning the data in a logical storage compartment that is not accessible or seen by the subject. Such as polyinstantiaton.
What is the weakest element in any security solution?
Humans
What role does job descriptions play when hiring new staff?
Ensure job descriptions consider separation of duties to separate key functions to limit ability for one employee to circumvent key security controls. Further, ensure a classification for the job.
What is ‘job rotation’?
Rotating employees among multiple job positions. This is the best way to investigate an employee’s daily business activity to uncover any potential fraud that may be taking place.
Strategic Plan
Long term plan defining organisation’s security purpose. Aligns the plan with the organisations goals, mission, objectives. This is a 5 year plan with annual reviews
Tactical Plan
Mid term plan developed to provide more details on accomplishing the goals set forth in the strategic plan or can be crafted ad hoc based upon unpredictable events. This lasts a year
Operational Plan
Short term (for a month or quarter) highly detailed plan. Purpose to retain compliance with tactical plans. The plans may include: resource allotments, budgetary requirements.
Data Classification Process
Identify the custodian, specify evaluation criteria, document any exceptions, select security controls for each level, specify the procedures for declassifying, and create enterprise wide awareness program
Levels of Government/military classification
Top Secret, Secret, Confidential, Sensitive but Unclassified, Unclassified
Levels of Corporate classifications
Confidential, Private, Sensitive, Public
Due care
Using responsible care to protect the interests of an organisation. Company must do all that it could have reasonably done to try and prevent a security breach /compromise/disaster, and take the necessary steps required as countermeasures/controls (safeguards).
Due diligence
Practicing activities that maintain due care effort. Company properly investigated all of its possible weaknesses and vulnerabilities AKA understanding the threats.
Information security program
Designing and implementing security practices to protect critical business process and assets.
Types of policies
Corporate policy, security policy, system specific policy and issue specific policy
Dual control
Where two people must simultaneously authorise an action, such as use of two keys. This is similar to M of N control
What is the order of security documents in an organisation?
Policies –> Standards/Baseline –> Guidelines –> Procedures
What is a security policy?
Document that defines the scope of security needed by the organisation at a high level. Discusses the assets that require protection, and assigns roles and responsibilities.
What is a ‘standard document’?
Mandatory document that provides compulsory requirements for systems to enable consistent use
Guidelines
Not mandatory, suggestive in nature actions to guide users
Procedure documents
For example, these are Standard Operating Procedures that provide step by step instructions on a given topic
Baselines
Mandatory minimum acceptable security configuration for a system or process, e.g. performing hardening, has a standard image
Risk
Possibility or likelihood of a threat exploiting a vulnerability to cause harm. Calculated as Risk = Threat x Vulnerability
Threat
Potential cause of an unwanted incident, which may result in harm to a system or organisation. Threats exploit vulnerabilities.
Vulnerability
Weakness in a system that allows a threat source to compromise its security
Exposure
Being susceptible to asset loss because of a threat
Safeguards
Security control to reduce/remove a vulnerability. Can be a technical, physical or administrative control
Attack
Exploitation of a vulnerability by a threat agent
Breach
Intentional or unintentional release of private data to an untrusted environment.
Threat agent
Entity that takes advantage of a vulnerability
What is ‘DAD’?
Negative to CIA, this is the
- Disclosure
- Alteration
- Destruction
Privacy
Maintaining the confidentiality of data
ISO 27005
Risk management framework
Risk management approach
It is not possible to get rid of all risk, therefore, aim is to bring risk to an acceptable/tolerable level
Responsibilities of the Information Security Officer
- Written products - ensure they are done
- Cyber Incident Response Team - implement and operate
- Security awareness - provide leadership
- Communicate - risk to higher management
- Report to as high a level as possible
- Security is everyone’s responsibility
Control Frameworks
Ensure control frameworks are:
- Consistent - approach and application
- Measurable - way to determine progress
- Standardised - all the same
- Comprehension - examine everything
- Modular - to help in review and adaptive. Layered, abstraction.
Patent
Grants ownership of an invention and provides enforcement for owner to exclude others from practicing the invention. After 20 years the idea is open source of application.
Copyright
Protects the expression of ideas but not necessarily the idea itself. For example, poem or song. Expires 70 years after author dies.
Trade secret
Something that is proprietary to a company and important for its survival and profitability (like formula of Coke or Pepsi). This is NOT registered
Trademarks
Words, name, product shape, symbol, color or a combination used to identify products and distinguish them from competitor products. For example, McDonald’s ‘M’. Expires in 10 years
Wassenaar Agreement (WA) AKA International Traffic in Arms Regulations
Agreement which implemented controls on the export of cryptographic systems.
SOX
Sarbanes Oxley. Protects shareholders and the general public from accounting errors and fraudulent practices in enterprises, and to improve the accuracy of corporate disclosures.
Section 302 SOX
CEO’s and CFO’s can be sent to jail when the information they sign is incorrect. CEO must sign
Section 404 SOX
This is about internal controls assessment: describing logical controls over accounting files, good auditing and information security.
Legal Liability for Executives
Executives are now held liable if the organisation they represent is not compliant with the law
Negligence
It is a breach of duty of care. This occurs if there is a failure to implement recommended precautions, if there is no contingency/disaster recovery plan, failure to conduct appropriate background checks, failure to institute appropriate information security measures, failure to follow policy or local laws and regulations.
COSO
Internal control system/framework to work with Sarbanes Oxley 404 compliance. Developed a model for evaluating internal controls. This model has been adopted as the generally accepted framework for internal control and is widely recognised as the definitive standard against which organisations measure the effectiveness of their systems of internal control.
COBIT
IT governance and management framework created by ISACA.
Incident
An event that has the potential to do harm
Data disclosure
Unauthorised acquisition of personal information
Event
Threat events are accidental and intentional exploitations of vulnerabilities
Fourth Amendment
Basis for privacy rights in fourth amendment to the constitution
1974 US Privacy Act
Protection of PII on federal databases
1980 OECD Privacy Guidelines
Established the first internationally agreed upon privacy principles.
1986 US Computer Fraud and Abuses Act
Protects computers used by the Government or in interstate commerce from a variety of abuses.
1986 Electronic Communications Privacy Act
Makes it a crime to invade the privacy of an individual
Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH)
Amended version of HIPAA. The HITECH Act encouraged healthcare providers to adopt electronic health records and improved privacy and security protections for healthcare data. Federal law requires notification of individuals when a HIPAA-covered entity breaches their protected health information.
Digital Millennium Copyright Act
Prohibits the circumvention of copy protection mechanisms placed in digital media and limits the liability of ISP’s for the activities of their users. ISP’s are no longer liable for the transitory activities of the user.
Economic Espionage Act 1996
Provides penalties for individuals found guilty of the theft of trade secrets. Harsher penalties apply when the individual knows that the information will benefit a foreign government.
GDPR
General Data Protection Regulation governs the use and exchange of personal information.
ISC2 Code of Ethics Cannons
ISC has established four key cannon/principles
ISC Cannon 1
Protect society, the commonwealth, and the infrastructure