Security and Risk Management Flashcards
5 Pillars of information security
- Confidentiality: Secure read access
- Integrity: Secure write access
- Availability: Systems are available for normal business use
- Authenticity: Proving an identity claim
- Nonrepudiation: The combination of integrity and authenticity
CIA Opposite
Disclosure, Alteration, Destruction
Confidentiality (opp Disclosure)
Aims to prevent the unauthorized disclosure of information
Integrity ( Opp Alteration)
Focuses on the prevention of unauthorized modification of assets.
Applies to both data and systems
Malware installation would be a violation of a system’s integrity
Availability (Opp Destruction)
Ensures that required access to resources remains possible
Ransomware and denial of service(DoS) attacks represent breaches of availability
Privacy
defined as confidentiality and protection of PII
Identification
Provides a weak and unproven claim of identity
providing a username - an example of identification
Authenticity
serves as proof a user’s identity claim is legitimate
strong authentication implies higher integrity means of proof
Nonrepudiation
Combination of integrity and authenticity
Eg: proving a user signed a contract, while also proving that the contract was not subsequently altered
Authorization
proceeds after successful authentication and determines what the authenticated user can do
Accounting
details the interactions performed by individuals
Audit logs could be generated for accountability / documented actions
4 main categories of authentication
something you know
something you have
something you are
someplace you are (GPS ) - SANS
Two-factor or multi-factor authentication
using 2 of the categories
PoLP
Principle of least privilege(PoLP) known as Min necessary access
fundamental principle of security
Any additional rights, permissions, privileges, or entitlements violate this principle
Separation of Duties (SoD)
Goal of SoD is to limit risk associated with critical functions/transactions
Risk is mitigated by requireing two parties to perform what one person could
Eg: Requiring multiple individuals to sign a check (financial transactions)
Rotation of duties
Another policy for fraud deterrence/detection
- force other people to be in charge of key tasks
eg: printing payroll checks
Due Care and Due Deligence
Due Care: acting as any reasonable person would (referred to as prudent man rule)
Due diligence: practices to processes that ensure the decided upon standard of care is maintained
types of controls
preventive :deny unauthorised access to resources
detective: tries to detect that ther eis a pbm after an attack
corrective: reacts to an attack
deterrent: discourages security violations
recovery : restores after an attack/failure
compensating: used to shore up existing controls deficiencies
controls implemented across
Administrative : Background checks, policies n procedures
Technical: Encryption, smart cards
Physical: Locks, security laptops n magnetic media, protection of cable
detective control eg
eg: Auditing and IDS (Intrusion detection system)
CCTV, Motion sensors
preventive n deterrent control difference
eg: preventive control will not allow a user to violate the security policy
deterrent control will present a banner indicating not legal to use , but not orevent: eg: no trespassing sign
NIST SP 800-30
Risk mgmt guide for information technology systems
Asset Identification and Evaluation
understanding assets is key to effective risk analysis
inventory assets and assess their role in the org
Evaluate the asset value
understand how uncertain the data obtained is
Risk
Risk = Threat * Vulnerability
Threat
Threat: anything that can cause harm to an infosystem
threat agents / threat sources are who (Adversary)
Threat agent: organised crime
threat: sys compromise thru server-side attack
Vulenrabilities
a weakness in a system that could potentially be exploited
zero-day vulnerabilities
are those not publicly known (targeted with zero-day exploits)
Exploits & the payload
Exploitation is the process of a threat taking advantage of a vulnerability
the actions triggered by the exploit are called the payload
Risk Analysis - Quantitative and Qualitative risk analysis
Quantitative formulas (SLE,ARO,ALE)
TCO , ROI, Cost/Benefit Analysis
SLE- Single loss expectancy
ARO -Annualised rate of occurrence
ALE - Annualised loss expectancy
SLE = EF (Exposure factor) * AV (Asset value)
ALE = SLE * ARO
TCO - Total cost of ownership
ROI - Return on investment
Risk Management Key Formulas
Quantitative
Asset Value(AV) : The value os the asset
ARO: Frequency of threat occurrence per year
Exposure Factor (EF) : % of asset value at risk due to a threat
SLE = AV EF
ALE : SLEARO
Qualitative risk analysis
Likehood and impact
Excessive Risk
level of risk is unacceptable to the decision makers
eg: Injury or loss of life
Risk mitigation
taking actions that decreases the risk
mitigation can come in flavours:
1. threat oriented : focused on reducing motivation of the threat agents
2.vulnerability oriented : reducing vulns
3.Impact oriented : reducing the impact
4. likelihood oriented : reducing likelihood
Risk avoidance
not to move fwd with a new project that introduces risk
transferring risk
eg:purchase of insurance
outsource risky systems to a third party
Eg:data breach insurance
Accepting risk
accept residual risk
accept a certain level of risk
controls identification and assessment
after identification, assess
TCO
ROI
Security architecture: mergers n acquisitions
divestitures (demergers or deacquisitions)
acquisitions - challenge
deacquisitions - nightmare
RFI / RFP/ / RFQ
Request for information / proposal / quote
BPA (Business process agreement)
typically addresses things like ownership, profit/losses, partner contributions
MOU / MOA
Memorandum of understanding or agreement -
goal is to establish the basic roles, responsibilities, and requirements for interconnection
NIST 800-47
Security guide for interconnecting info technology systems
SLA / OLA /ELA
OLA is an internal agreement that supports SLA
SLA: Expectations customer has for their service provider
ELA : Enterprise license agreement
FedRAMP
Federal risk and authorization management program
SCRM - Supply chain risk management