Methodologies Flashcards
(ISC)2 Code of Ethics
- Protect society, the commonwealth, and the infrastructure
- Act honorably, honestly, justly, responsibly, and legally
- Provide diligent and competent service to principals
- Advance and protect the profession
- Protect society, the commonwealth, and the infrastructure(ISC)2 Code of Ethics
Promote and preserve public trust and confidence in information and systems.
Promote the understanding and acceptance of careful information security measures.
Preserve and strengthen the integrity of the public infrastructure.
Discourage unsafe practice
- Act honorably, honestly, justly, responsibly, and legally
Tell the truth; make all stakeholders aware of your actions on a timely basis.
Observe all contracts and agreements, express or implied.
Treat all constituents fairly. In resolving conflicts, consider public safety and duties to principals, individuals, and the profession in that order.
Give prudent advice; avoid raising unnecessary alarm or giving unwarranted comfort. Take care to be truthful, objective, cautious, and within your competence.
When resolving differing laws in different jurisdictions, give preference to the laws of the jurisdiction in which you render your service.
- Provide diligent and competent service to principals
Preserve the value of their systems, applications, and information.
Respect their trust and the privileges that they grant you.
Avoid conflicts of interest or the appearance thereof.
Render only those services for which you are fully competent and qualified.
- Advance and protect the profession
Sponsor for professional advancement those best qualified. All other things equal, prefer those who are certified and who adhere to these canons. Avoid professional association with those whose practices or reputation might diminish the profession.
Take care not to injure the reputation of other professionals through malice or indifference.
Maintain your competence; keep your skills and knowledge current. Give generously of your time and knowledge in training others.
Computer Ethics Institute
- Thou shalt not use a computer to harm other people.
- Thou shalt not interfere with other people’s computer work.
- Thou shalt not snoop around in other people’s computer files.
- Thou shalt not use a computer to steal.
- Thou shalt not use a computer to bear false witness.
- Thou shalt not copy or use proprietary software for which you have not paid.
- Thou shalt not use other people’s computer resources without authorization or proper compensation.
- Thou shalt not appropriate other people’s intellectual output.
- Thou shalt think about the social consequences of the program you are writing or the system you are designing.
- Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
Internet Activities Board’s (IAB)
- Seeks to gain unauthorized access to the resources of the Internet;
- Disrupts the intended use of the Internet;
- Wastes resources (people, capacity, computer) through such actions;
- Destroys the integrity of computer-based information;
- Compromises the privacy of users.
NIST Special Publication 800-61 outlines the incident response life cycle
1) Preparation: steps taken before an incident occurs. These include training, writing incident response policies and procedures, and providing tools to handle incidents effectively.
2) Detection and analysis (identification): analyze events to is determined whether an incident is actually occurring or has occurred.
3) Containment: Keep further damage from occurring as a result of the incident but the threat still there, perform a binary (bit by bit) forensic backup, Capture volatile data,
4) Eradication (Remediation and review): remove threats, Understanding the root cause of the incident. Restore the system to a good state and should not be vulnerable to further impact. The restore involves either rebuilding the system from scratch or restoring from a known good backup
5) Recovery: It ensures that the system is validated, properly restored to operation status, and monitored for potential further compromise.
6) Lesson learned:
goal is to provide a final report on the incident, which will be delivered to management. Feedback from this phase feeds directly into continued preparation, where the lessons learned are applied to improve preparation for handling future incidents.
The six phases in incident response according to (ISC)2?
1) triage
2) notification and identification
3) action/reaction
4) containment, analysis, tracing
5) follow-up
6) repair, recovery, prevention
The six phases in incident response according to (ISC)2?
1. Triage phase: encompasses the detection, identification, and notification subphases.
- Determine the seriousness of the incident and to filter out false-positives.
- Classify the type of incident.
- Determine the level of potential risk or criticality of the incident.
2. Investigate phase: analysis, interpretation, reaction, and recovery from an incident.
- Reduce the impact of the incident, identify the root cause, get back up and running, and prevent the incident from occurring again.
- Chain of custody.
3. Containment: contain the incident to prevent an outbreak.
4. Analysis and Tracking: examine and analyze what has occurred, with a focus on determining the root cause.
• Ultimate goal is to obtain sufficient information to stop the current incident, prevent future “like” incidents from occurring, and identify what or whom is responsible.
5. Recovery: deals with recovery, repair, and prevention of the affected systems and assets.
• The goal is to get the business back up and running.
The six phases in incident response according to (ISC)2?
- Containment: contain the incident to prevent an outbreak.
- Analysis and Tracking: examine and analyze what has occurred, with a focus on determining the root cause.
• Ultimate goal is to obtain sufficient information to stop the current incident, prevent future “like” incidents from occurring, and identify what or whom is responsible.
- Recovery: deals with recovery, repair, and prevention of the affected systems and assets.
• The goal is to get the business back up and running
Publication 800-30, Risk Management Guide for IT Systems - Risk Assessment methodology
- System Characterization: describes the scope of the risk management effort and the systems that will be analyzed.
- Threat Identification.
- Vulnerability Identification.
4. Control Analysis: analyzes the security controls (safeguards) that are in place or planned to mitigate risk. List of controls and planned controls.
- Likelihood Determination: likelihood rating.
- Impact Analysis: loss of C.I.A. and impact rating.
- Risk Determination: especially those risks with high-likelihood/high-impact/consequences.
- Control Recommendations: These 7 steps are used to determine Control recommendations.
- Results Documentation: the strategy is documented and RA report.
OCTAVE
stands for Operationally Critical Threat, Asset, and Vulnerability Evaluation, a risk management framework from Carnegie Mellon University.
o Phase 1 identifies staff knowledge, assets, and threats.
o Phase 2 identifies vulnerabilities and evaluates safeguards.
o Phase 3 conducts the Risk Analysis and develops the risk mitigation strategy.
Within the Common Criteria, there are seven EALs
• EAL 1 – Functionally tested - A user wants the system to operate but ignores security threats.
• EAL 2 – Structurally tested - Developers use good design practices but security is not a high priority.
• EAL 3 – Methodically tested and checked - Developers provide moderate levels of security.
• EAL 4 - Methodically designed, tested, and reviewed - Security configuration is based on good commercial development. This level is the common benchmark for commercial systems, including operating systems and products.
- EAL 5 – Semi-formally designed and tested - Security is implemented starting in early design. It provides high levels of security assurance.
- EAL 6 - Semi-formally verified, designed and tested - Specialized security engineering provides high levels of assurance. This level will be highly security from penetration attackers.
• EAL 7 – Formally verified, designed and tested - Extremely high levels of security are provided. This level requires extensive testing, measurement, and independent testing.
What are the steps in the business continuity planning process?
Develop the continuity planning policy statement.
Conduct the BIA.
Identify preventative controls.
Develop recovery strategies.
Develop the contingency plan.
Test the plan, and conduct training and exercises.
Maintain the plan.