Domain 1: Security and Risk Management Flashcards
What is type 1 authentication?
Something you know (passwords, pass phrase, PIN etc.).
What is type 2 authentication?
Something you have (ID, passport, smart card, token, cookie on PC etc.).
What is type 3 authentication?
Something you are (and Biometrics) (Fingerprint, iris scan, facial geometry etc.).
What is type 4 authentication?
Somewhere you are (IP/MAC Address).
What is type 5 authentication?
Something you do (Signature, pattern unlock).
How does top down security management differ from bottom up security management?
Bottom-Up: IT Security is seen as a nuisance and not a helper, often change when breaches happen.
Top-Down: IT leadership is on board with IT Security, they lead and set the direction. (The exam).
What is OCTAVE?
OCTAVE® - Operationally Critical Threat, Asset, and Vulnerability Evaluation. Self Directed Risk Management.
What is COBIT?
COBIT - Control Objectives for Information and related Technology. COBIT is a control framework for employing information security governance best practices within an organization. Goals for IT – Stakeholder needs are mapped down to IT related goals.
What is COSO?
COSO – Committee Of Sponsoring Organizations. Goals for the entire organization.
What is FRAP?
FRAP - Facilitated Risk Analysis Process. Analyses one business unit, application or system at a time in a roundtable brainstorm with internal employees. Impact analyzed, threats and risks prioritized.
What is the purpose of ISO 27001?
ISO 27001: Establish, implement, control and improve the ISMS. Uses PDCA (Plan, Do, Check, Act)
What is the purpose of ISO 27002?
ISO 27002: (Formerly ISO 17799) Provides practical advice on how to implement security controls. It has 10 domains it uses for ISMS.
What is the purpose of ISO 27004?
ISO 27004: Provides metrics for measuring the success of your ISMS.
What does ISO 27005 contain?
ISO 27005: Standards-based approach to risk management.
What does ISO 27799 contain?
ISO 27799: Directives on how to protect PHI (Protected Health Information)
What are the four types of evidence?
Real Evidence, Direct Evidence, and Circumstantial Evidence, Corroborative Evidence
What is real evidence?
Real Evidence: Tangible and physical objects in IT Security: Hard disks, USB drives – NOT the data on them.
What is direct evidence?
Direct Evidence: Testimony from a firsthand witness, what they experienced with their 5 senses.
What is circumstantial evidence?
Circumstantial Evidence: Evidence to support circumstances for a point or other evidence.
What is corroborative evidence?
Corroborative Evidence: Supports facts or elements of the case: not a fact on its own, but support other facts.
What is hearsay?
Hearsay: Not first-hand knowledge – normally inadmissible in a case
What does the fourth amendment protect against?
The Fourth Amendment to the United States Constitution protects citizens from unreasonable search and seizure by the government
When do exigent circumstances apply? Who decides this?
Exigent circumstances apply if there is an immediate threat to human life or of evidence destruction. This will later be decided by a court if it was justified. Only applies to law enforcement and those operating under the “color of law” – Title 18. U.S.C. Section 242 – Deprivation of Rights Under the Color of Law.
What is entrapment?
Entrapment (Illegal and unethical): When someone is persuaded to commit a crime they had no intention of committing and is then charged with it.
What is enticement?
Enticement (Legal and ethical): Making committing a crime more enticing, but the person has already broken the law or at least has decided to do so.
What is the GPDR?
GDPR (General Data Protection Regulation) is a regulation in EU law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA). It does not matter where we are based, if we have customers in EU/EEA we have to adhere to the GDPR.
What is required for personal data to be processed under the GPDR?
Unless a data subject has provided informed consent to data processing for one or more purposes, personal data may not be processed unless there is at least one legal basis to do so.
What is right to access under the GPDR?
Right to access: Data controllers must be able to provide a free copy of an individual’s data if requested.
What is right to erasure under the GPDR?
Right to erasure: All users have a ‘right to be forgotten’.
What is data portability under the GPDR?
Data portability: All users will be able to request access to their data ‘in an electronic format’.
What is the data breach notification requirement under the GPDR?
Data breach notification: Users and data controllers must be notified of data breaches within 72 hours.
What is privacy by design under the GPDR?
Privacy by design: When designing data processes, care must be taken to ensure personal data is secure. Companies must ensure that data collection is only ‘absolutely necessary for the completion of duties’.
What are the 3 rules of HIPAA? What 3 safeguards do they mandate?
HIPAA has 3 rules – Privacy rule, Security rule and Breach Notification rule.
The rules mandate Administrative, Physical and Technical safeguards.
What is the purpose of the ECPA?
Electronic Communications Privacy Act (ECPA): Protection of electronic communications against warrantless wiretapping. The Act was weakened by the Patriot Act.
What is the purpose of the Patriot Act?
PATRIOT Act of 2001. : Expands law enforcement electronic monitoring capabilities. Allows search and seizure without immediate disclosure.
What is the CFAA?
Computer Fraud and Abuse Act (CFAA) – Title 18 Section 1030. Most commonly used law to prosecute computer crimes.
Who does the GLBA apply to? Who drives it?
Gramm-Leach-Bliley Act (GLBA): Applies to financial institutions; driven by the Federal Financial Institutions
What are the requirements of the EU Data Protection Directive? (4 points)
EU Data Protection Directive Very aggressive pro-privacy law.
- Organizations must notify individuals of how their data is gathered and used.
- Organizations must allow for opt-out for sharing with 3rd parties.
- Opt-in is required for sharing “most” sensitive data.
- No transmission out of EU unless the receiving country is perceived to have adequate (equal) privacy protections; the US does NOT meet this standard. EU-US Safe Harbor, optional between organization and EU
What is the ISC2 code of ethics preamble?
Code of Ethics Preamble:
The safety and welfare of society and the common good, duty to our principles, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior. Therefore, strict adherence to this code is a condition of certification.
What are the ISC2 code of ethics canons?
Code of Ethics Canons:
Protect society, the common good, necessary public trust and confidence, and the infrastructure.
Act honorably, honestly, justly, responsibly, and legally.
Provide diligent and competent service to principles.
Advance and protect the profession.
What are the 5 components of information security governance?
Information Security Governance:
Policies – High level, non-specific
Standards – Describes specific use of a technology
Guidelines – Recommendatins
Procedures – Specific step by step guides
Baselines (Benchmarks) - Minimum requirements.
What are policies within information security governance?
Policies
- High level management directives, non-specific.
- They can contain “Patches, updates, strong encryption”
- They will not be specific to “OS, encryption type, vendor Technology”
What are standards within information security governance?
Standards
-Describes a specific use of technology (All laptops are W10, 64bit, 8gig memory … )
What are guidelines within information security governance?
Guidelines
- Recommendations, discretionary
- Suggestions on how you would to do it.
What are procedures within information security governance?
Procedures
- Low level step-by-step guides, specific.
- They will contain “OS, encryption type, vendor Technology”
What are baselines within information security governance?
Baselines (Benchmarks)
Baselines are uniform ways of implementing a standard. Serves as a minimum requirement.
What are the 7 access control types?
Access Control Defensive Types:
Preventive: Prevents an action from occurring
Detective: Controls that Detect during or after an attack – IDS, CCTV, alarms, antivirus.
Corrective: Controls that Correct an attack – Anti-virus, patches, IPS.
Recovery: Controls that help us Recover after an attack – DR Environment,backups, HA Environments .
Deterrent: Controls that Deter an attack – Fences, security guards, dogs, lights, Beware of the dog signs.
Compensating: Controls that Compensate – other controls that are impossible or too costly to implement.
Directive: directs, confines, or controls the actions of subjects to force or encourage compliance with security policy