Security standards organizations Flashcards
Center for Internet Security (CIS)
A non-profit organization formed by a large number of commercial, academic, and government organizations. The CIS’s mission is to identify, develop, and promote best practices in cybersecurity. To this end, it develops security benchmarks and assessment tools for a wide variety of operating systems and network applications.
Institute of Electrical and Electronics Engineers (IEEE)
A professional association of engineers and scientists of many disciplines, including computer scientists, software developers, and IT professionals. The IEEE’s mission is to advance technological innovation of all sorts, and they publish standards in many technological fields. One family you’re likely familiar with is the IEEE 802 networking standards, such as Ethernet (802.3) and Wi-Fi (802.11).
Internet Engineering Task Force (IETF)
An open standards organization under the management of the Internet Society, consisting of volunteer contributors. It developed many common Internet protocols by consensus, distributing numbered Request For Comments (RFC) documents via internal mailing lists. A specification that advances through the review process is classified as a Proposed Standard, and finally, an Internet Standard.
International Organization for Standardization (ISO)
An international organization comprised of the standards bodies of over 160 member nations. ISO standards include everything from the OSI network model (ISO/IEC 7498-1) to the twist direction of yarn (ISO 2); many involve information technology or security standards and practices. When ISO standards are revised, their years are attached: In 2013, ISO 27001:2013 replaced the older ISO 27001:2005.
Internet Society (ISOC)
The parent organization of the IETF and several other organizations and committees involved in Internet development. The ISOC doesn’t directly develop standards: instead, it focuses primarily on providing organizing conferences, seminars, and training services for its member organizations.
International Telecommunication Union (ITU)
A UN agency charged with global tasks related to telecommunications. It allocates shared global use of the radio spectrum, coordinates national governments in assigning satellite orbits, and promotes global technical standards related to networking and communication. Many ITU standards are recognizable by their “letter-period-number” format: some you might have heard of include X.509 (Digital certificates) used by secure websites, and H.264 (MPEG-4) used for digital video encoding both on the Internet and by television providers.
National Institute of Standards and Technology (NIST)
A US government agency charged with developing and supporting standards used by other government organizations: while it primarily promotes standards for use by the US government, they frequently are used by others with similar technology needs. In recent years, computer security standards have become a major part of its mission. NIST shares most of its findings with the broader security community and regularly publishes information about known software vulnerabilities and security best practices.
National Security Agency (NSA)
A US signals intelligence agency, responsible for information gathering, codebreaking, and codemaking. The NSA develops cryptographic standards and secures government information against attack. Much of the NSA’s work is classified, but it has had a visible role in designing and standardizing some of the most widely used cryptographic standards, such as DES, AES, and SHA.
Open Web Application Security Project (OWASP)
An international non-profit organization founded to further the state of web application security. OWASP provides freely available guidelines, articles, software tools, and other resources, all of which are devoted to the development and testing of secure web applications. Their regularly updated “Top Ten” list is a popular resource for common web application vulnerabilities.
World Wide Web Consortium (W3C)
A standards organization founded to develop and maintain interoperable standards for the World Wide Web (WWW) used by web browsers, servers, and other technologies. W3C standards include HTML, XML, CSS, and many others used for web-based communications. While the W3C’s publications don’t focus on security technologies, the security of web standards is an essential topic in information security.
Consider a network service you regularly use, such as email. How could its confidentiality be compromised?
One example could be someone reading or intercepting it.
How could its integrity be compromised?
Mail could be altered when you send or receive it.
How could its availability be compromised?
You could be unable to access your mail when you need to.
There’s been a rash of burglaries in your area, and you notice that one door into a part of the building with valuable equipment has a keypad lock set to “12345.” Identify the asset, the vulnerability, the threat, and the risk in the situation.
The asset is valuable equipment in the building. The vulnerability is that a lock with an easily-guessed access code is simple to bypass. The threat is burglars in the area. The risk is the combination of how likely you are to be burglarized, how hard stolen equipment would be to replace, and how much its loss would otherwise affect your business.
You’ve set a stronger passcode and added a security alarm. How does this affect the vulnerability, threat, and risk of the situation?
Strengthened or added security measures reduce vulnerabilities, which in turn reduces risk. In this case, the threat is unchanged: the burglars are still out there, just less likely to get in unnoticed