Midterm Flashcards
confidentiality
Ensuring thatonly those who are authorized have access to specific assetsand thatthose who are unauthorized are actively prevented from obtaining access
Integrity
Ensuring that data have not been tampered with and, therefore, can be trusted. It is correct, authentic, and reliable
Availability
Ensuring thatauthorized users have timely, reliable access to resources when they are needed - networks, systems, and applications are up and running
Cyber Hygiene
Patch your systems regularly
Non repudiation
Only installed signed software updates
Data Integrity
Source code changes virtually undetectable
5 pillars of cybersecurity
- governance
- secure systems engineering
- tools development
- OCO/DCO
- Test and Eval
what is governance
policy regulations/compliance standards (NIST, IEEE) norms/conventions audits procedures leadership oversight best practices
2 roles of CISO
King/Queen of NO
Empowered CISO
king/queen of NO
success= compliance
auto response with NO
primary focus is prevent liability in event of breach
wraps self in blanket of policy documentation
Empowered CISO
Leans in to address risk
collaboration with team to seek solution
primary focus is enable the business/mission
governance best practice:
least privilege
The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function
governance best practice:
2 person integrity
Requirement for multiple people to authenticate in order to perform certain administrative tasks
governance best practice:
network separation
Separation of network into separate mini-networks/segments with distinct security boundaries and protection profiles to limit ability to “pivot” from entry point
governance best practice:
enclave
A set of system resources that operate in the same security domain and that share the protection of a single, common, continuous security perimeter.
Discussion: Where in the waterfall does cybersecurity usually enter in the system?
usually in realization : solution validation right before delivery
Discussion: Where SHOULD cybersecurity enter the system?
Operational need (before requirements)
Systems security engineering
specialty engineering discipline of systems engineering
applies scientific, mathematical engineering and measurement principles, concepts and methods to coordinate, orchestrate, and direct the activities of various security engineering and other contributing engineering specialties
offensive cyber operations (OCO)
Cyberspace operations intended to project power by the application of force in or through cyberspace.
Defensive Cyber Operations (DCO)
Passive and active cyberspace operations intended to preserve the ability to utilize friendly cyberspace capabilities and protect data, networks, net-centric capabilities, and other designated systems
Continuity of Operations Plan (CooP):
A predetermined set of instructions or procedures that describe how an organization’s mission-essential functions will be sustained within 12 hours and for up to 30 days as a result of a disaster event before returning to normal operations.
1-10-60 Challenge
Combating sophisticated adversaries requires a mature process that can prevent, detect and respond to threats with speed and agility.
To effectively combat sophisticated cyberthreats:
Detect intrusions in under one minute.
Investigate and understand threats in under 10 minutes.
Contain and eliminate the adversary from the environment in under 60 minutes.
Advanced Persistent Threat
Advanced Persistent Threat (APT) attack uses continuous, clandestine, and sophisticated hacking techniques to gain access to a system and remain inside for a prolonged period of time, with potentially destructive consequences.
Modeling the APT Attack
Five Stages of an Evolving APT Attack Gain Access Establish a Foothold Deepen Access Move Laterally Look, Learn, and Remain