Domain: 7 Security Operations 13% Flashcards
Administrative Security
Provides the means to control people’s operational access to data.
Least Privilege
We give employees the minimum necessary access they need, no more, no less.
Need to know
Even if you have access, if you do not need to know, then you should not access the data.
Separation of duties
More than one individual in a single task is an internal control intended to prevent fraud and error. We do not allow the same person to enter the purchase order and issue the check.
Job rotation
Job rotation to detect errors and frauds. Makes it easier to detect fraud and there is less chance of collusion btw individuals if we use job rota
Mandatory vacations
Done to ensure one person is not always performing the same task, someone else has to cover and it can keep fraud from happening or help us detect it. Their accounts are locked and an audit is prfrmd on the accnt.
NDA (non disclosure agreement)
Can be btw employees and the org. Or btw two orgs.
Background check
references, degrees, employment history, certifications, criminal history, credit history. For sensitive pos the bckgrnd chck is an ongoing process.
Privilege monitoring
The more access and privilege an employee has the more we keep an eye on their activity. We continually audit and monitor what they access. This is normally automated.
Digital (comp) forensics
Focuses on the recovery and investigation of material found in digital devices, often in relation to comp crime. Forensics is based on gathering and protecting the evidence, where incidents responses are how we react in an event breach. We preserve the crime scene and the evidence, we can prove the integrity of it at a later needed time,oftn court.
The forensic process:
- Id the potential evidence, acquire the evidence, anayze the evidence, make a report.
- be aware of how we gather our forensic evidence, attckrs are cvring their tracks, deleting the evdnc and logs.
- This can be through malware that is only in volatile mem, if pwr is shut off (to preserve the crime scene), the malware is gone and the evidence is lost.
- Disconnect sys from ntwrk adn take bit by bit copies of the mem, drives, running processes & ntwrk cxn data.
The evidence
we collect must be accurate, complete, authentic, convincing, admissible.
Identification
Id the evidence, what is left behind.
Preservation
Evrythng is documented, chain of custody: Who had it when? What was done? When did they do it? Pull the og, put it in write protected machine, we make a hash. We ony do examinations and analysis on bit level copies, we confirm they have the same hash as the og before and after examination.
Collection
We examine and analyze the data, again we document evrythng. We handle the evidence as little as possible. Work from most volatile to least volatile, starting with the RAM and ending with the hard disks.
Incidence response plan
can include getting our HR and Legal dept involved. Ensure evidence is acquired in a legal manner remember US Cons 4th amendment.
Examination
find the facts and document them, collecting the data.
Analysis
look at the data and look for meaning or reason
Presentation in court
we present our findings and any other evidence.
Decision
The court rules on the case.
Forensic data
is normally obtained from binary images of secondary storage, portable storages devices: hard drives, flash drvs, CDs, DVDs, cell phone, mp3 players. We use binary or bit stream image copy to ensure ew get an exact copy of the device, and not just a copy of certain sectors.
Real Evidence
Tangible adn physical objects, in IT Sec: hd, usb -NOT the data on them.
Evidence Integrity
It is vital the evidences integrity cannot be questioned, we do this with hashes. Any forensics is done on copies and never the originals, we check hash on both original and copy before and after the forensics. Heresay, but admissible due to Law 803.
Chain of Custody
Chain of custody form, this is done to prove the integrity of the data. No tampering is done. Who handled it? When did they handle it? What did they do with it? Where did they handle it?