Sec+601 Flashcards
3 key objectives of cybersecurity programs
confidentiality, integrity, and availability
Confidentiality
ensures that unauthorized individuals are not able to gain access to sensitive information. Cybersecurity professionals develop and implement security controls, including firewalls, access control lists, and encryption, to prevent unauthorized access to information.
Integrity
ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally. Integrity controls, such as hashing and integrity monitoring solutions, seek to enforce this requirement. Integrity threats may come from attackers seeking the alteration of information without authorization or non-malicious sources, such as a power spike causing the corruption of information.
Availability
ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them. Availability controls, such as fault tolerance, clustering, and backups, seek to ensure that legitimate users may gain access as needed. Similar to integrity threats, availability threats may come either from attackers seeking the disruption of access or non-malicious sources, such as a fire destroying a datacenter that contains valuable information or services.
Security incidents
occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.
3 key threats to cybersecurity efforts:
DAD Triad - Disclosure, Alteration and Denial
Disclosure is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss. Disclosure is a violation of the principle of confidentiality. Attackers who gain access to sensitive information and remove it from the organization are said to be performing data exfiltration. Disclosure may also occur accidentally, such as when an administrator misconfigures access controls or an employee loses a device.
Alteration is the unauthorized modification of information and is a violation of the principle of integrity. Attackers may seek to modify records contained in a system for financial gain, such as adding fraudulent transactions to a financial account. Alteration may occur as the result of natural activity, such as a power surge causing a “bit flip” that modifies stored data. Accidental alteration is also a possibility, if users unintentionally modify information stored in a critical system as the result of a typo or other unintended activity.
Denial is the unintended disruption of an authorized user’s legitimate access to information. Denial events violate the principle of availability. This availability loss may be intentional, such as when an attacker launches a distributed denial-of-service (DDoS) attack against a website. Denial may also occur as the result of accidental activity, such as the failure of a critical server, or as the result of natural activity, such as a natural disaster impacting a communications circuit.
Attackers who gain access to sensitive information and remove it from the organization are said to be performing:
data exfiltration
We can categorize the potential impact of a security incident using the same categories that businesses generally use to describe any type of risk:
financial, reputational, strategic, operational, and compliance.
(Breach impact risk) as the name implies, the risk of monetary damage to the organization as the result of a data breach. This may be very direct financial damage, such as the costs of rebuilding a datacenter after it is physically destroyed or the costs of contracting experts for incident response and forensic analysis services.
Financial Risk
(Breach impact risk) occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders. It is often difficult to quantify reputational damage, as these stakeholders may not come out and directly say that they will reduce or eliminate their volume of business with the organization as a result of the security breach. However, the breach may still have an impact on their future decisions about doing business with the organization.
Reputational risk
(Breach impact risk) is the risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.
Strategic risk
(Breach impact risk) occurs when a security breach causes an organization to run afoul of legal or regulatory requirements. For example, the Health Insurance Portability and Accountability Act (HIPAA) requires that health-care providers and other covered entities protect the confidentiality, integrity, and availability of protected health information (PHI). If an organization loses patient medical records, they violate HIPAA requirements and are subject to sanctions and fines from the U.S. Department of Health and Human Services. That’s an example of compliance risk.
Compliance risk
As an organization analyzes its risk environment, technical and business leaders determine the level of protection required to preserve the confidentiality, integrity, and availability of their information and systems. They express these requirements by writing the () that the organization wishes to achieve. These () are statements of a desired security state, but they do not, by themselves, actually carry out security activities.
control objectives
are specific measures that fulfill the security objectives of an organization.
Security controls
Security Control Categories
Technical, Operational, and Managerial
enforce confidentiality, integrity, and availability in the digital space. Examples of ()l security controls include firewall rules, access control lists, intrusion prevention systems, and enc
Technical controls
include the processes that we put in place to manage technology in a secure manner. These include user access reviews, log monitoring, and vulnerability management. (Under security controls)
Operational controls
are procedural mechanisms that focus on the mechanics of the risk management process. Examples of administrative controls include periodic risk assessments, security planning exercises, and the incorporation of security into the organization’s change management, service acquisition, and project management practices. (Under security controls)
Managerial control
intend to stop a security issue before it occurs. Firewalls and encryption are examples of () controls. (CompTIA version of security control types)
Preventive
identify security events that have already occurred. Intrusion detection systems are () controls. (CompTIA version of security control types)
Detective
remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example of a () control. (CompTIA version of security control types)
Corrective
seek to prevent an attacker from attempting to violate security policies. Vicious guard dogs and barbed wire fences are examples of deterrent controls. (CompTIA version of security control types)
Deterrent
are security controls that impact the physical world. Examples of physical security controls include fences, perimeter lighting, locks, fire suppression systems, and burglar alarms. (CompTIA version of security control types)
Physical
are controls designed to mitigate the risk associated with exceptions made to a security policy. (CompTIA version of security control types)
Compensating