Domain 2 - Security Operations Flashcards
What is a baseline?
A detailed configuration standard that includes specific security settings.
Some examples of Security Guidelines?
- Method for selecting a strong password.
- criteria for evaluating new security technology
- Suggest training curricula for staff.
What is a standard?
A formal, documented requirement that set uniform criteria for a specific technology, configuration, nomenclature, or method.
What helps organizations help maintain consistency in the way security risks are addressed?
Standards, baselines, procedures, and even guidelines.
What is a procedure?
Step-by-step instructions for performing a specific task or set of tasks.
What are the typical components of a procedure?
Purpose Applicability Steps Figures Decision Points
What is release management?
A software engineering discipline that controls the release of applications, updates, and patches to the production environment.
What is the goal of release management?
To provide assurance that only tested and approved application code is promoted to production or distributed for use.
Code Signing?
Assists users in validating that the application was issued by a trust source.
Typically used for web apps running Java or ActiveX
Smoke Tested?
High-level, scripted testing of the major application components and interfaces to validate the integrity of the application before making it available.
Systems Assurance?
Process of validating that existing security controls are configured and functioning as expected.
Change Control?
Process adopted by an organization to ensure that all changes to system and application software are subject to the appropriate level of management control.
Change Control Process?
Request Submission Recording Analysis/Impact Assessment Decision Making and Prioritization Approval Status Tracking
CM
CONFIGURATION MANAGEMENT
Discipline that seeks to manage configuration changes so that they are appropriately approved and documented.
“Technical and Administrative’ Process
Typical Steps in the configuration management process.
Change Request Approval Documentation Testing Implementation Reporting
Four Operational Aspects of CM
Identification
Control
Accounting
Auditing
CMBD
CONFIGURATION MANAGEMENT DATABASE
Holds information about the structure of the system.
CI
CONFIGURATION ITEM
Component of each system listed in the CMBD using a name, number, and version ID.
Security Impact Assessment
Analysis conducted by qualified staff within an organization to determine the extent to which changes to the information system affect the security posture of the system.
Interoperability
Describe the extent to which systems and devices can exchange data and interpret that shared data.
Syntactical Interoperability
Two or more systems that are capable of communicating and exchanging data.
Patch Management Process
- Acquisition - Find Patch
- Testing - Test Patch before installation
- Approval - Approve for deployment
- Packaging - Package or configure for OS.
- Deployment
- Verification
SSCP Domains
Access Controls Analysis and Monitoring Cryptography Malicious Code Networks & Telecom Risk, Response, & Recovery Security operations and administration
BMS
BALANCED MAGNETIC STRIP
Device that uses a magnetic strip to determine if an alarm signal is initiated.
PIR
PASSIVE INFRARED SENSORS
Common interior intrusion detection sensors.
ex. Occ Sensor
Electric Locks vs Electric Strikes
Electric Locks use the doors physical locks.
Electric Strikes - bolts remains the same, but strike is changed.
Anti-Passback
Strategy where a person must present a credential to enter an area and again to leave.
‘Mantrap”
When a person opens a door, and for the next door to open, the one just enter must securely close.
Rim Lock
Lock (or latch) typically mounted on the surface of a door.
Ex - dead bolt
Mortise Lock
Lock (or latch) that is recessed into the edge of a door rather than on the surface.
Ex - Handle + Lock in single package.
Locking Cylinders
Pin Tumbler cylinder is composed of circular pin tumblers that fit into matching circular holes on two internal parts of the lock.
Cipher Lock
Controlled by a mechanical key pad.
Think of front door handle with PIN pad on it.
Vaults - Class M
One 1/4 hour
Vaults - Class 1
One 1/2 hour
Vaults - Class 2
One hour
Vaults - Class 3
Two hours
Classified Container
Reinforced Filing Cabinet that can store proprietary and sensitive information.
Cable Plant Management
Design, Documentation, and management of layer 1 in the OSI model, the Physical Layer.
MTBF
MEAN TIME BEFORE FAILURE
Two-Person Rule
Strategy where two people must be in an area together, making it impossible for a person to be in the area alone.
Two main categories of smoke detectors
- Optical (Photoelectric)
2. Physical (Ionization)
Three Types of Fire Detectors
- Flame Detectors
- Smoke Detectors
- Heat Detectors
Two Types of Flame Detectors
- IR
2. UV
Four Groups of Sprinkler Systems
- Wet Systems - Constant supply of water
- Dry Systems - Releases when value is stimulated by excess heat.
- Pre-Action - No water until detectors in the area are activated. Removes ‘False Alarms’.
- Deluge - Same as pre-action, but all sprinkler heads are in the open position.
2 Types of Gas Suppression
- Aero-K: Uses aerosol of potassium
2. FM-200: Colorless, liquefied compressed gas.
6 Aspects in the Change Control Policy Document
- Request Submission
- Recording
- Analysis/Impact Assessment
- Decision Making & Prioritization
- Approval
- Status Tracking
Operational Aspects of CM?
Identification, Control, Accounting, Auditing
Systems Certification Process?
Method of validating adherence to security requirements.
Dual Control
Antifraud measure that requires two people to complete a transaction.
Waterfall Model
Development method that follows a linear sequence of steps.
What two things are used to accomplish non-repudiation?
Digital Signatures
Public Key Infrastructure
What are the elements that make up IS risks?
Threat, Vulnerability, Impact
Risk = Threat + Vulnerability + Impact
Remote Attestation
Form of integrity protection that makes use of a hashed copy of hardware and software configuration to verify that configurations have not been altered.
4 Tenets of the Code of Ethics
- Protect Society, commonwealth, and infrastructure
- Act honorably
- Provide Diligent service to principals
- Advance/Protect Profession