Domain 1 - Security and Risk Management Flashcards
Administrative, Physical, and Technical controls
Three categories of access controls
Technical Control
Protects access to systems, network architecture, control zones, auditing, and encryption and protocols (Access Control categories). AC category that restricts access.
Administrative Control
Dictates how security policies are implemented to fulfill the company’s security goals. Includes policies, procedures, personnel controls, supervisory structure, security training, and testing. Includes policies and procedures, personnel controls, supervisory structure, security training, and testing (Access Control category).
Physical Control
Access control category that includes badges, locks, guards, network segregation, perimeter security, computer controls, work area separation, backups, and cabling; used to secure physical access to an object, such as a building, a room, or a computer (access control category).
Preventive control
Prevents security breaches and avoids risks.
Detective control
Looks for security breaches as they occur.
Corrective control
Restores control and attempts to recover from any damage that was inflicted during a security breach.
Deterrent control
Stops potential violations.
Recovery control
Restores resources.
Compensative control
Provides an alternative control if another control may be too expensive. All controls are generally considered this type of control.
Directive controls
Provides mandatory controls based on regulations or environmental requirements.
Recovery-Technical control
Restores system capabilities and covers data backups.
Detective-Technical control
Detects when a security breach occurs; covers audit logs and intrusion detection systems (IDS).
Corrective-Technical control
Corrects any issue that arises because of security breaches; Antivirus software and server images are included in this category.
Compensative-Technical control
Considered an alternative to other controls (example, server isolation).
Preventative-Technical control
A router plus encryption used to improve network security.
Deterrent, Preventive, Detective, Compensative, Corrective, Recovery, and Directive.
Access control types (types, not categories).
Preventative control measures
Security awareness training, Firewalls, Anti-virus, security guards, and IPS.
Detective control measures
System monitoring, IDS, Anti-Virus, motion detector, IPS.
Corrective control measures
OS upgrade, backup data rostral, Anti-virus, vulnerability mitigation.
Compensatory control measures
Backup generator, hot site, server isolation.
To prevent the threat from coming into contact with the weakness.
Purpose for Preventative controls.
To identify that a threat has landed in a system.
Purpose for Detective controls.
To mitigate or lesson the effects of the threat that has manifested.
Purpose for Corrective controls.
ISO/IEC 27000
ISO/IEC standard on developing and maintaining information security management systems (ISMS).
Zachman Framework
An enterprise schema with two dimensional classification: six questions and six views intersecting in a matrix (what, how, where, who, when, why + planner, owner, designer, builder, programmer, users). This framework is NOT security orientated; it is used to relay information for personnel in a common language that is helpful to different groups in understanding each group’s responsibilities.
TOGAF (The Open Group Architecture Framework)
An enterprise framework that helps organizations design, plan, implement, and govern enterprise information architecture. Its four domains are technology, applications, data, and, business.
DoDAF (Department of Defense Architecture Framework)
Architect framework with 8 viewpoints used to ensure DoD technologies integrate correctly with current infrastructures.
All Viewpoint (AV); Capability Viewpoint (CV); Data and Information Viewpoint (DIV); Operation Viewpoint (OV); Project Viewpoint (PV); Services Viewpoint (SvcV); Standards Viewpoint (STDV); and Systems Viewpoint (SV).
The eight views of the DoDAF
MODAF (British Ministry of Defense Architecture Framework)
An Architecture Framework which divides information into seven views points.
SABSA (Sherwood Applied Business Security Architecture)
An enterprise security architecture, which asks six communication questions that intersect with six layers; it is a a risk-driven architecture. The six layers of questions include: What, Where, When, Why, Who, and How. These question layers intersect with six additional layers: Operational, Component, Physical, Logical, Conceptual, and Contextual.
CobiT (Control Objectives for Information and Related Technology)
A security controls development framework documenting five principles, which drive control objectives of seven enablers: Meeting stakeholder needs; Steering the enterprise end-to-end; Applying a single integrated framework; Enabling a holistic approach; Separating and governance from management. The seven enablers include: Principles; Policies, and frameworks; Processes; Organizational structures; Culture, ethics, and behaviors; Information; Services, infrastructure, and applications; and People, skills, and competencies.
Meeting stakeholder needs; Steering the enterprise end-to-end; Applying a single integrated framework; Enabling a holistic approach; Separating and governance from management.
Five principles of CobiT
Principles, Policies, and frameworks; Processes; Organizational structures; Culture, ethics, and behaviors; Information; Services, infrastructure, and applications; and People, skills, and competencies.
Seven enablers of Cobit
Downstream Liabilities
When you outsource a system - you can outsource responsibility but you cannot outsource accountability
What is Due Care?
Setting and enforcing policy to bring organisation into compliance.
What does IAAA stand for?
Identification, Authentication, Authorization, Accountability
What is the difference between Authentication and Authorization?
Authentication is using your password to access a file which you have permissions (Authorization) to access.
What is a control?
A control or countermeasure is put into place to mitigate (reduce) the potential risk. It’s PREVENTATIVE.
What is Strategic Alignment?
Strategic Alignment means that business drivers and the regulatory and legal requirements are being met by the security enterprise architecture.
What does Security Effectivenes deal with?
Security Effectiveness deals with metrics, SLA requirements, achieving ROI, meeting set baselines etc.
What is a Computer Assisted Crime?
Computer Assisted Crime is where a computer was used as a tool to help carry out a crime.
What is a Computer Targetted Crime?
A Computer Targetted Crime occurs when a computer is the victim of an attack crafted to harm it and its owners specifically.
What is a Computer Incidential Crime?
Where a computer happens to have been part of the crime, but did not assist the criminal and was not the victim.
In GDPR, who is the Data Subject?
The Individual to whom the data pertains
In GDPR, what is the Data Controller?
Any organization that collects data on EU residents
In GDPR, what is the Data Processor?
Any organization that processes datra for a data controller
What is the Concent provision for GDPR?
Data Collectors and Data Processors cannot use personal data without explicit consent of the data subjects
What is the Right to be Informed provision for GDPR?
Data Controllers and Data Processors must inform data subjects about how their data is, will, or could be used.
What is the Right to Restrict Processing provision for GDPR?
Data Subjects can agree to have their data stored by a collector but disallow it to be processed.
What is Right to Be Forgotten provision for in GDPR?
Data Subjects can request that their personal data be permanently deleted.
What is the Data Breaches provision for in GDPR?
Data Controllers must report a data breach within 72 hours of becoming aware of it.
What is a Trade Secret?
A Trade Secret is something that is proprietary to a company and important for it’s survival and profitability.
What is a Copyright?
Copyright Law protects the right of the creator of an original work to control the public distribution, reproduction, display and adaptation of that original work.
What is a Trademark?
A Trademark is slightly different from a copyright in that it is used to protect a word, name, symbol, sound, shape, color etc.
What is a Patent?
Patents are given to individuals or companies to grant them legal ownership of, and enable them to exclude others from using or copying, the invention covered by the patent.