Cissp Domain 1 Flashcards
Difference between least privilege and need to know
Least privilege is all about type of access rights - read , write
Need to know - required access
What are the 3 perspectives integrity can be examined?
Modifications from unauthorised
Modifications from authorised
Data to be consistent internal and external
Availability concepts
Usability
Accessibility
Timeliness : low latency response
What is Authorization about ?
Rights and previliges
Accountability is dependent on ?
Tracking activities of individual
Defense in depth
Layering or parallel
Multiple control in place
Abstraction
Simplify security by enabling you to assign security controls, restrictions or permissions to a group of objects
Data hiding Vs security through obscurity
Intentionally position data being accessed by unauthorised users
Hiding data in plain sight
What is purpose of Security Governance?
Alignment of security function to business stratergy, Goals , mission and objectives
What are the 3 types of Plans devloped by security management?
Stratergic: Long term - 5 years
Tactical:Midterm - 1 Year
Operational: Product design, system deployment
What are the process to be considered when evaluating 3rd party ?
On site assessment
Document exchange and review
Process/policy review
Third party audit
What is role of asset owner ?
To classify assets
What is role of custodian?
Implementation of prescribed security protection
6 key principles of cobit ?
Provide stakeholders value
Holistic approach
Dynamic Governance system
Governance distinct from management
Tailored to enterprise needs
End to end governance system
What is Security policy?
Scope of security needed by organization and discusses assets needed protection
What is AuP ?
Level of acceptable performance and behaviour and activity
Security standards?
Compulsory documents for homogeneous use of hardware
Baseline
Minimum level of security that every system to meet
Guidelines
Offer recommendations on how standard and baseline to be implemented
SoP
Detailed step by step implement a security mechanism, control or solution
Threat modelling
Proactive measure during design and development
Reactive after product has been designed
How to identify threats? (Focus area)
Focused on assets
Focused on attackers
Focused on software
STRIDE
Spoofing
Tampering
Repudiation
Information disclosure
DoS
Elevation of prevlige
Process of attack stimulation and threat analysis - 7 steps
Definition of objectives
Definition of technical scope
Application decomposition and analysis
Threat analysis
Weakness and vulnerability analysis
Attack modelling and simulation
Risk analysis and management