Lesson 1 Security Roles and Controls Flashcards

1
Q

CIA Triad

A

Secure information has three important properties, often referred to as the CIA Triad:
Confidentiality
- information known to certain people
- enforced by permissions, Authentication, encryption : Gov likes
Integrity
- data is correct and transferred as intended
- enforced by hash/cksum
Availability
- data is accessible by authorized users to view/modify
- enforced by backups/redundancy
a 4th properties: non-repudiation
- subject can not deny creating or modifying the data
-enforced by signing electronically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

non-repudiation

A

Another important property of InfoSec

Non-repudiation means that a subject cannot deny doing something, such as creating, modifying, or sending a resource

Enforced by signing electronically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Control Categories

A

Managerial
- Controls which give oversight of the system

Operational
- Controls which depend on a person for implementation

Technical
- Controls implemented in operating systems, sw, and security appliances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Control Functional Types

A

Type 1:
Preventative - before attack - physical or logical
Detective - during attack - record successful or failed attacks - security guard monitoring camera
Corrective - after attack - responds to and/or fixes an incident - security guard response

Type 2:
Deterrent - psychological - unmonitored camera, signs
Physical - gates, fences, locks, camera
Compensating - substitute for principle control as recommended by security standard

lesson 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST Cybersecurity Framework

A

Provides:
statement of current capabilities
measure progress
verifiable for regulatory compliance reporting

recall diagram for it's 5 functions to protect against attacks
identify
protect
detect
respond
recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Info Sec Roles
CSO
CISO
ISSO

A
Overall responsibility for internal security
CSO - Chief Security Officer
CISO - Chief Info Sec Office
Managerial 
- responsible for domain
Technical
ISSO - Info Sys Sec Officer - implements, monitors and maintains the policy 
non-technical
Due care/liablity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SOC

A

Sec Ops Center

part of Info Sec Business Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIRT

A

Cyber Incident response team

part of incident response for Info Sec business Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSIRT

A

Computer Sec Incident Response Team

part of incident response for a Info Sec Business Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CERT

A

Computer Emergency Response Team

part of incident response for a Info Sec Business Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISO Framework

A
International Organization for Standards
27k - info sec standards
27001 - rules and regs for Info sec
27002 - best pracitices for Info sec
27701 - rules tied to privacy for Info sec

31k - Enterprise Risk Management (ERM)
suggestions for managing risk and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Frameworks

A

Cloud Security Alliance
Sec guides for CSPs (cloud service providers)
Enterprise reference architecture
Cloud controls matrix

SSAE - Statements on Standards for Attestation Engagements
SOC - Service Organization Control
SOC2 for service provider evaluation
SOC3 for public compliance report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Benchmarks and Secure Configuration Guides

A

CIS - Center for Internet Security

OS/network platform/vender-specific guides and benchmarks

  • vendor provided info
  • CIS benchmarks
  • DoD Cyber Exchange
  • NIST National Checklist Program (NCP)

App Svrs and Web Svr Apps

  • client/svr
  • multi-tier (front end, middleware (business logic), back end (data)
  • OWASP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Regs, Stnrds, Legislation

A

Due Diligence:
Sarbanes-Oxley (SOX)
Computer Sec Act (1987)
Federal Info Sec Mgmt Act (FISMA)

General Data Protection Regulation (GPDR)
-EU based privacy for Info Sec

National, territory or state laws
GLBA
HIPAA
CCPA - Calif Consumer Privacy Act

PCI DSS
Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PCI DSS requirements

A

Top three:
Annual security test/audit of the companies security policies
All user accounts must be unique
Never storing the CVV code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly