DOMAIN 1: Security and Risk Management Flashcards
CIA Confidentiality
Protecting secrets (ex: military, pharmaceutical
CIA - Integrity
Protecting accuracy and authenticity (ex: banks, brokerage firms)
CIA- Availability
Protecting stability and reliability . (ex: ISP, Telecomm)
DAD
- Disclosure, Alteration, and Destruction (NEGATIVE)
Information/data owners (Data Controllers)
ACCOUNTABLE for Assets
Business unit/division. Usually a person in the unit will be designated as the “owner”.
1) Must identify assets
2) Classify the assets
3) Determines access permissions for the assets
Custodians (stewards) (RESPONSIBLE for assets)
They don’t own the data, but they have
maintenance responsibilities for the assets.
(IT, operations, helpdesk, etc.)
- Perform day-to-day tasks: ensure CIA, perform backups,
implements security controls, etc.
System Owners
“Own” the equipment , systems, networks, etc.
(ex: IT department) Here, “own” means “responsible for”
Auditors
Check for compliance . They bring an outside
scope or perspective. Can be internal or external auditors, but from a different department at least
Users
They may take assets home, but they must keep
them secure! This is why we have to convince them to take security seriously
Due Care
Setting best or reasonable practices as a
responsible individual/organization should. “Doing the right
thing” (Similar to “The Prudent Person Rule”)
- The company did all that it could have reasonably done to
prevent the breach: They did exercise due care
Due Diligence
Providing a record or history of compliance and
enforcement . Providing evidence that you
are doing the right thing. (the proof of following the policy)
- Auditors care about BOTH due care AND due diligence
Legal standards: PCI - DSS
Payment Card Industry - Data Security Standard
- Security standard requiring businesses that accept, process,
transmit, or store credit or
debit card information to implement certain
controls in order to reduce credit card fraud.
Sarbanes -Oxley Act (SOX)
Protects investors from fraudulent corporate
accounting activities (you can’t lie to your investors!)
- Section 302: CEO SIGN; CFO’s and CEO’s can go to jail if the info they sign is false
- Section 404: Internal controls assessment. Good auditing and security of accounting files
Health Insurance Portability and Accountability Act (HIPAA)
Laws requiring the protection of: Personal Health Information (PHI)
Federal Information Systems Management Act (FISMA)
US law for government agencies to secure their IT environments .
Legal systems: Common Law
(US, Canada, UK, Australia, NZ, etc) Enforcement is based on legal precedent. This includes: 1) Written law passed by legislators 2) Court decisions 3) Judges legal opinions (ex: judge says "this is unconstitutional")
Civil Law (Code Law)
(Europe, South America, etc.) Enforcement of the law is based on:
1) Written law
2) Abstract rules and concepts (ex:
democracy, property protection)
3) Academic writings on concepts of law by the
legal scholars
Religious Law
(Vatican, Africa, Indonesia, Islamic law (Middle-East))
1) Religion is endorsed by the government
2) Perhaps with little or no separation between
religion and state
Subdivisions of Common Law include:
Criminal Law
Punishing behavior harmful to society.
Punishments include: jail, death (capitol punishment), fines, losing certain rights as an individual
Civil or Tort Law
(Law suits) Punishing wrongs against individuals or businesses
that result in harm . Punishments are usually
financial
Administrative or Regulatory Law
Special rules that apply to particular industries.
Regulators check businesses to make sure they’re
compliant.
USA branches of law:
Legislative : writes laws
Executive : enforces laws
Judicial : interprets laws
Computer Crimes
For classification as a computer crime, computers:
1) Can be a tool of crime (ex: digital
manipulation)
2) Can be a target of crime (victim of digital
manipulation)
3) Can be incidental to the crime (not a tool or
target, but contains evidence) (Ex: logs on the router, or browser cache)
Intellectual property includes:
Patents (strongest)
Protections awarded by the government for useful, novel, and non-obvious inventions. US patents last for
20 years from the date of registration/filing of the
patent.
Trademarks (must be registered)
Any symbol, word, name, colors, musical tunes, or design to identify a product or service . You have to use it in commerce, and continue to use it to claim it’s still yours. Otherwise, it doesn’t expire.
Copyrights
Protections for creative expressions of ideas .
(books, movies, songs, software) US copyrights last for
70 years after the death of the author.
Trade Secrets
Any information, device, method, technique, or process that derives economic value from not being
generally known, and is kept a secret. Must continue to protect it as a secret.
IP software licensing: Public Domain
Available for anyone to use
Open Source
Source code available for free to study, modify, use, and distribute
Freeware (Shareware)
Proprietary software available for free, but there are some restrictions on modifications and redistribution
Site & Per-Seat licensing
Buy a license for entire org, or one license per-user or per- “seat”
DRM (Digital Rights Management)
Uses encryption to enforce copyright restrictions on digital media. This is done to protect Intellectual Property