Domain 1 - Security and Risk Management COPY Flashcards
what is CIA
confidentiality
integrity
availability
what are we protecting when we are talking about integrity
ensuring there is no unauthorized modifications to the data or systems (no data has been altered)
what are we protecting when we are talking about availability
authorized persons have access to the data or system at a reasonable amount of time
what are we protecting with confidentiality
only authorized persons or systems have access to the data when they need it
tools that are used to ensure confidentiality
- encryption for data at rest (example AES256)
- secure transport protocols (SSL, TLS, IPSEC)
- best security practice for data in use ( clean desk, no shoulder surfing, screen view protector, pc locking policy,
- strong passwords, multi-factor authentication, masking data entry, access controls, need-to-know, least privilege
threats to confidentiality
- attacks on encryption (cryptanalyst)
- social engineering
- key loggers (software/hardware), cameras, steganography
- IOT (internet of things) the numbers of these items pose a threat. less secure, most are not updated, can be used as backdoors to other systems
what software/tools can we use to ensure integrity
- cryptography (again)
- check sums (this could be CRC)
- message digest (hash) this could be MD5, SHA1 or SHA2
- digital signatures
- access control
examples of threats to integrity
- alteration of our data
- code injection
- attacks on your encryption (cryptanalysis)
tools used to ensure availability
- IPS/IDS
- Patch management
- redundancy (multiple power supplies/UPS’s/generators), disks (raid), traffic paths(network design), HVAC, staff, HA and more
- SLA’s - how much uptime do we want (what is that cost?)
threats to availability
- malicious attacks (DDOS, physical, system compromise, staff)
- application failures (errors in the code)
- component failure (hardware)
what does IAAA stand for
identification
authentication
authorization
accountability (monitoring/logging)
what is Identification
you name, username, serial number, id number, employee number
“I am XXXX”
what is authentication
proving you are who you say you are (always should be multifactor)
what is Type 1 authentication
something you know -Type 1 Authentication: (passwords, pass phrase, PIN, etc.)
what is type 2 authentication
something you have -Type 2 Authentication: (ID, passport, smart card, token, cookies on PC, one time password (OTP) etc. )
what is type 3 authentication
something you are - Type 3 Authentication: (biometrics) fingerprint, iris scan, facial geometry, etc)
what is the opposite of CIA
Disclosure - (confidentiality)
destruction - (availability)
alteration - (integrity)
formula for risk
risk = threat X vulnerability
Sometimes an added variable of impact is added
Risk = threat x vulnerability x impact
if there is a vulnerability but no threat towards that vulnerability, is there risk?
no
if there is not threat towards the vulnerability there is not current risk
what is authorization?
- what you are allowed to access
2. access control models ( DAC, MAC, RBAC(role based access), RUBAC(rule based access))
what is the last A in IAAA
accountability -
- auditing(logs)
- prove who/what a given action was performed by (non-repudiation)
explain least privilege
- give users/system exactly the access they need, no more
explain need to know
- you are generally given more access than you need(in a need to know environment) but if you do not have a need then you should not be accessing that data.
example: doctors, they need to have access to all patients but if they are not their patients the do not have the need to access their data
what is non-repudiation and what two functions are used to provide it
- can not deny having performed a certain action
- authentication
- integrity
what is a subject
(active) most often a user but can be a system. subjects manipulate objects
what is an object
- (passive) object is manipulated by subjects
- any passive data (both physical paper and data)
- a program can be both object and subject depending on if its accessing data or something is accessing it
what is governance not (security governance)
- how an organization is managed
* actions and controls placed on those charged with managing a business entity
what is security governance
- how security is managed through policies, roles, processes used to make security decisions.
In this list there are 6 truths about organizational security goals. name as many as you can
• security must align with the organization goals, not dominate or drive them
• security is optional, its a support function
security and the budget that funds it, can be done away with at any time (probably not wise but it can be)
• security practitioners must align with organizational goals
• implemented correctly, it helps keep cost down
• the security program must serve the organization properly
what is a governance committee
a formal decision making body within the organization
list the need to know C-level (senior leadership) - ultimately liable.
- CEO - chief executive officer
- COO - chief operations officer
- CIO - chief information officer
- CTO - chief technology officer
- CSO - chief security officer
- CISO - chief information security officer
7 CFO - chief financial officer
what does pci-dss stand for and what is it
payment card industry data security standard..
its a standard but IS required if you want to handle credit cards or debits cards
what is COBIT and what to remember about it
- framework created by ISACA for IT management and governance
- has 5 principals
- business framework for governance and management of enterprise IT
what is the goal behind COSO
- auditing controls framework
- designed to prevent fraud reporting of financial activities
- provides guiding principles for internal controls over the entire enterprise
what is ITIL
- is a framework (best practices) for IT service management for (ITSM)
- ITIL v4, essentially it’s a best practice for service management (IT)
what does ITSM stand for and what is it
Information Technology service management..
• improving business performance through better IT deliver.
• making IT better for
••• business operations
••• Employees
••• customers
Define ITSM
- information technology service management
- the craft of implementing, managing, and delivering and improving IT services
- focuses on aligning IT processes and services with the business objectives to help an organization grow
quickly define the FRAP methodology
- focus is on IT security threats
- qualitative risk management
- focus only on systems that really need assessing, reducing cost and time needed
- the author felt that trying to use mathematical formulas to figure risk was too complicated
what is ISO/IEC 27001?
this international standard provides requirements for establishing, implementing, maintaining and improving an Information Security management System (ISMS)
what does ISO/IEC 27002 accomplish
it is to be used as a reference for determining and implementing controls for information security risk treatment in a information security management system (ISMS) based on ISO/IEC 27001
what does ISO/IEC 27004 accomplish
intended to assist organizations to evaluate the performance and effectiveness of and ISMS (information, security management system).
* monitor
* measurement
* analysis
* evaluation
based from ISO 27001
what does ISO/IEC 27005 provide
guidelines for information security risk management in an organization.
• its just guidelines, it is up to the organization to define their approach to risk management
what does IS/IEC 27799 provid
standard that provides guidance to healthcare organizations and other custodians of protected health information (PHI) on how to best protect confidentiality, integrity and availability of that information
a couple of facts about criminal law
- society is the victim
- proof must be beyond a reasonable doubt
- incarceration, death, financial fines
facts about civil law
- another name is tort law
- individuals, groups and organizations are the victims
- proof must be “the majority of proof”
- financial fines to compensate the victim(s)
facts about administrative law
- regulatory law
* enacted by government agencies (FDA laws, HIPAA, FAA laws etc.)
facts about private regulations
• compliance is required by contract (example: PCI-DSS)
facts about customary laws
- mostly handles personal conduct and patterns of behavior
* traditions and customs of the area or region
facts about religious law
- pretty much what it sounds like
- religious beliefs in that area or country
- often include their code of ethics and morality
who is ultimately liable?
- senior leadership
* this does not mean you are not liable if you did something wrong (depends on due care)
what is due care
- actions/behaviors
- prudent person rule
- what would a prudent(reasonable) person would do in this/that situation
- implementing/applying proper policies, procedures, processes etc.
- examples: changing systems settings (crypt algorithms, key size, protocols), employee training and awareness about security and their responsibility, disabling employee access when needed.
what is due diligence
- researching
- preparation
- leg work
- knowledge and understanding
- making sure the right things are done correctly (research, investigation)
- anything done before decisions are made
- example: knowledge of laws, regulations, industry standards, knowledge of best practices
explain negligence
- opposite of due care
* if your systems are compromised and you did nothing to prevent it, you are likely negligent or gross negligent
explain real evidence
• tangible and physical objects (hard disks, usb drives) (but not the data))
what does evidence have to be in order to be considered in court
- relevant
- material
- complete
direct evidence is
- testimony from first hand witness
* what they experiences with their 5 senses
what is circumstantial evidence
• evidence to support circumstances or other evidence
explain hearsay evidence
- mostly what it sounds like - not first hand knowledge
* computer generated records
what type of evidence are logs and documents from the system
secondary evidence
the integrity of evidence is mandatory, what are a few things done during forensics
- disks are hashed (cd, hard drive, sd card, blue ray etc.)
- make a copy using a write blocker to prevent changes to drive - hash again to make sure there was no change
- all investigation is done on the copy
- hash the copy when done to prove no changes were made
evidence chain of custody
- who obtained the evidence and secured it
- where and when it was obtained
- who had control or possession of the evidence
- secure storage in a monitored vault is common
reasonable searches - a few details
- the fourth amendment protects citizens from unreasonable search and seizure by the government
- in all cases the court will decide if the evidence was obtained legally
- exigent circumstances
when does exigent circumstances apply
- if there is an immediate threat to human life
* or if evidence is about to be destroyed
define entrapement
- illegal and unethical
* when someone is persuaded to commit a crime that they did not intend to and charged for that crime
define enticement
- legal and ethical
- making committing a crime more enticing - the person has broken the law or at least decided to do so
- an example would be honeypots
- check with legal before department before using honeypots - they pose both legal and practical risks
what does copyright cover
books, art, music, software
how long does a copyright last
- 70 years after creator’s death
* 95 years after creation by a corporation
what is the exceptions to copyright law
- first sale
* fair use
what do trademarks cover
• brand names, logos, slogans(must be registered)
how long do trademarks last
- valid for 10 years
* can be renewed indefinitely
what do patents cover
- inventions
* cryptographic algorithms can be patented
how long do patents last
• 20 years
what is the criteria for a patent
- profitable
- novel
- previously unknown
- nonobvious
- music\books\art
- useful
- novel (new idea no one has had before)
- useful (can be used and is useful to others)
- nonobvious (inventive work involved)
trade secret attributes
- you keep your secret recipe secret (KFC)
- if discovered, anyone can use it
- there is no protection
what are some attacks on a copyright
- piracy (software piracy is the most common)
* copyright infringement (use of someone else’s copyrighted material, often songs and images)
what are some attacks on trademarks
• counterfeiting (fake Rolexes, Prada, Nike) either using the real name or something similar
what are some attacks on patents
• patent infringement - using someone else’s patent in your product without permission
what are some attacks on tradesecrets
• there is no law that protect trade secrets but you also cant break the law to discover it.
what is cybersquating
• buying a URL that you know someone else will need for the soul purpose of selling at a profit
what is typo squatting
• buying URL that are very close the the real thing (this can be illegal in some circumstances)
what does HIPAA stand for
• Health Insurance Portability and Accountability Act
what is the core protection of HIPAA
• Strict privacy and security rules on handling PHI (protected health information)
what does PHI stand for
• protected health information
what does SOX stand for, what was it and when was it created
- Sarbanes-Oxley Act
- created 2002
- created to prevent a repeat of accounting scandals in the 1990s
what sector is Gramm-Leach-Briley act (GLBA) aimed at
- applies to financial institutions
* drive by the federal financial instutution
what did the patriot act do
when was it
- expand law enforcement electronic monitoring capabilities
- allows search and seizure without immediate disclosure
- 2001
what does PCI-DSS stand for
• Payment Card Industry Data Security Standard
is PCI-DSS a law
• no, its a standard enforced by the payment card industry
what do PCI-DSS standards apply to and what is its purpose
- credit cards
- debit cards
- requires merchants and anyone dealing with credit cards and debit cards to meet a minimum set of security requirements
what does GDPR stand for and when was it enacted
• General data protection regulations
• enacted in 2016
° enforced in 2018
what region does GDPR apply to
• anyone living in the European Union