CISSP Domain 1 - Flashcards

1
Q

CIA - Confidentiality

A
  • High level of assurance that info is kept from unauthorized parties
  • Attacks: Shoulder surfing, social engineering, decryption, brute-force
  • Defense: Encryption, access controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA - Confidentiality - Definition

A

High level of assurance that info is kept from unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA - Confidentiality - Attacks

A
  • Shoulder surfing
  • Social engineering
  • Decryption
  • Brute-force
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA - Confidentiality - Defense

A
  • Encryption

* Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA - Confidentiality - Related concepts

A
  • Sensitivity: What could happen if this info was disclosed
  • Discretion: When you choose to control the information disclosure to limit damage
  • Concealment: Act of hiding or preventing disclosure
  • Secrecy: Keeping something secret
  • Privacy: Keeping sensible info confidential
  • Seclusion: Storing something in an out-of-the-way manner
  • Isolation: Keeping something separated from others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

<p>Sensitivity</p>

A

<p>What could happen if this info was disclosed</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

<p>Discretion</p>

A

<p>When you choose to control the information disclosure to limit damage</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

<p>Concealment</p>

A

<p>Act of hiding or preventing disclosure</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

<p>Secrecy</p>

A

<p>Keeping something secret</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

<p>Privacy</p>

A

<p>Keeping sensible info confidential</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

<p>Seclusion</p>

A

<p>Storing something in an out-of-the-way location. This<br></br>
location can also provide strict access controls. Seclusion can help enforcement of<br></br>
confidentiality protections</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

<p>Isolation</p>

A

<p>Keeping something separated from others</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

<p>CIA - Integrity</p>

A

<p>When info remains unaltered by unauthorized parties<br></br>
Approaches:<br></br>
Preventing intentional unauthorized modification<br></br>
Preventing accidental modifications<br></br>
Ensure internal and external consistency of the information</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

<p>CIA - Availability</p>

A
<p>Usable access to a resource is always provided in a timely and uninterrupted manner<br>
* Examples:<br>
- Load Balancing<br>
- Clustering<br>
- Backups<br>
- Redundancy</p>
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

<p>AAA (IAAAA)</p>

A

<p>- Identification: A subject claims a specific identity<br></br>

- Authentication: A subject proves he is who he claims to be<br></br>
- Authorization: Deciding what the subject can access and how can it be used<br></br>
- Auditing: Recording activities of the subject in a log<br></br>
- Accountability: Reviewing the log to check for compliance</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

<p>From Vulnerability to Exposure - Vulnerability</p>

A

<p>A weakness in a system that allows a threat to compromise security<br></br>
Examples:<br></br>
* AP without security enabled<br></br>
* Too many ports allowed on a firewall<br></br>
* Unneeded service running on a server</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

<p>From Vulnerability to Exposure - Exploit</p>

A

<p>Occurs when a vulnerability is taken advantage of by an attacker</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

<p>From Vulnerability to Exposure - Threat</p>

A

<p>Danger that a vulnerability will be exploited</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

<p>From Vulnerability to Exposure - Threat Agent</p>

A

<p>Entity that exploits a vulnerability</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

<p>From Vulnerability to Exposure - Risk</p>

A

<p>The likelihood that a threat agent will exploit a vulnerability combined with the damage that could result</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

<p>From Vulnerability to Exposure - Exposure</p>

A

<p>Single real-world instance of a vulnerability being exploited by a threat agent</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

<p>From Vulnerability to Exposure - Control</p>

A

<p>Countermeasure put into place to mitigate the risk</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

<p>Controls - Categories</p>

A

<p>* Administrative Controls: Controls put in place by management<br></br>
Examples<br></br>
Training<br></br>
Security Policy<br></br>
* Technical Controls: Software elements such as hashing, encryption or authentication enforcement<br></br>
* Physical Controls: Controls that are physical<br></br>
* Examples<br></br>
- Lighting<br></br>
- Fences<br></br>
- Keycards<br></br>
- Security Guards</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

<p>Controls - Functions</p>

A

<p>* Preventative: Avoid an incident<br></br>

* Corrective: Fix a component or system<br></br>
* Deterrent: Discourage an attacker<br></br>
* Detective: Identify an intruder<br></br>
* Recovery: Bring environment back to normal operation<br></br>
* Compensating: Alternative control if the first choice is unavailable</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25

Security Frameworks - ISO 27000 Series - BS7799

* Created in 1995
* Published by British Standards Institute
* Outlines how an ISMS should be created and maintained
* Part 1
 Describes controls
* Part 2
 Shows how an ISMS can be setup

26

Security Frameworks - ISO 27000 Series (1-8,11, 14-15,31-35,37,799)

```

ISO 27000
 Overview and vocabulary for the rest of the 27000 series
ISO 27001
 Standard for creation, implementation, control and improvement of ISMS
ISO 27002
 General guidelines for implementing an ISMS
ISO 27003
 ISMS implementation
ISO 27004
 ISMS measurement
ISO 27005
 Risk management
ISO 27006
 Certification body requirements
ISO 27007
 ISMS auditing
ISO 27008
 Guidance for auditors
ISO 27011
 Telecommunications organizations
ISO 27014
 Information security governance
ISO 27015
 Financial sector
ISO 27031
 Business continuity
ISO 27032
 Cybersecurity
ISO 27033
 Network security
ISO 27034
 Application security
ISO 27035
 Incident management
ISO 27037
 Digital evidence collection and preservation
ISO 27799
 Health organizations

```
27

ISO 27000

Overview and vocabulary for the rest of the 27000 series

28

ISO 27001

Standard for creation, implementation, control and improvement of ISMS

29

ISO 27002

General guidelines for implementing an ISMS

30

ISO 27003

ISMS implementation

31

ISO 27004

ISMS measurement

32

ISO 27005

Risk management

33

ISO 27006

Certification body requirements

34

ISO 27007

ISMS auditing

35

ISO 27008

Guidance for auditors

36

ISO 27011

Telecommunications organizations

37

ISO 27014

Information security governance

38

ISO 27015

Financial sector

39

ISO 27031

Business continuity

40

ISO 27032

Cybersecurity

41

ISO 27033

Network security

42

ISO 27034

Application security

43

ISO 27035

Incident management

44

ISO 27037

Digital evidence collection and preservation

45

ISO 27799

Health organizations

46

Security Frameworks - Enterprise Architecture Development - Introduction

* Addresses the structure and behavior of an organization
* It's a guidance on how to build an architecture
* Allows each group of people within an organization to view the business in terms they can understand

47

Security Frameworks - Enterprise Architecture Development - Zachman

* Created by John Zachman in the 80s
* This framework is not security oriented, but it is a good template to work with because it offers direction on how to understand an actual enterprise in a modular fashion
* 2-dimensional matrix
 X-axis
 5 different audiences
 Y-axis
 6 different views

48

Security Frameworks - Enterprise Architecture Development - Zachman (audiencies - views)

Audiences:
* Executives
* Business Managers
* System Architects
* Engineers
* Technicians
* Entire enterprise

Views
* What
* How
* Where
* Who
* When
* Why

49

Security Frameworks - Enterprise Architecture Development - TOGAF

* Created by US DoD
* Architecture types
 Business
 Data
 Application
 Technology
* Architecture Development Method (ADM)
 Used to create each type
 The last step feeds back into the first step
 After each iteration, the process has been improved to reflect changing requirements
 Each iteration addresses each of the four views

50

Security Frameworks - Enterprise Architecture Development - Military Oriented

* Department of Defense Architecture Framework:
 - Involves things as command, control, surveillance and reconnaissance
 - One of its primary objectives is to ensure a common communication protocol and standard payloads
* Ministry of Defence Architecture Framework
 - British version of DoDAF

51

Security Frameworks - Enterprise Architecture Development - Sherwood Applied Business Security Architecture (SABSA)

```

* It's an Enterprise Security Architecture: Ensures an organization has an effective ISMS in place
* Similar to Zachman
* Views:
 - Assets (What)
 - Motivation (Why)
 - Process (How)
 - People (Who)
 - Location (Where)
Time (When)
* Y-Axis from wide to narrow
 - Contextual
 - Conceptual
 - Logical
 - Physical
 - Component
 - Operational
* Difference between SABSA and the others
 - It is also a methodology
 - Provides an actual process to follow
 - It is geared toward security

```
52

Security Frameworks - Architecture Framework Terms

* Strategic Alignment: An architecture is strategically aligned when it meets the needs of the business and all legal or regulatory requirements
* Business Enablement: A good security architecture must enable the business to thrive by not getting in the way, but still providing proper security
* Process Enhancement: Security forces us to take a closer look at existing processes. This could lead us to improve them
* Security Effectiveness: Most quantifiable of the attributes. Examples: ROI, SLA achievements

53

Security Frameworks - Frameworks for Implementation

* COSO Internal Control
* COBIT
* NIST SP 800-53

54

Security Frameworks - Frameworks for Implementation - COSO IC

```

* Identifies 17 control principles grouped into 5 categories
* Created in the 80s as a result of financial fraud
* Provides Corporate Governance
* Categories
 - Control Environments
 - Risk Assessments
 - Control Activities
 - Information and Communication
 - Monitoring Activities

```
55

Security Frameworks - Frameworks for Implementation - COBIT

* Created by ISACA and ITGI
* Defines 17 enterprise and 17 IT goals
* It's not strictly security related
* It is an IT related subset of COSO IC
* Principles
 Meeting stakeholder needs
 Covering the enterprise end-to-end
 Applying a single integrated framework
 Enabling a holistic approach
 Separating governance from management

56

Security Frameworks - Frameworks for Implementation - NIST SP 800-53

* Created by the US government
* Specifies the control that federal agencies must implement
* If an agency doesn't comply, they are violating the FISMA (Federal Information Security Management Act of 2002)
* Contains a list of 18 control categories

57

Security Frameworks - Frameworks for Implementation - Private vs Federal controls

```

Administrative = Management
Technical = Technical
Physical = Operational

```
58

Security Frameworks - Process Development

* ITIL
* Six Sigma
* Capability Maturity Model Integration (CMMI)

59

Security Frameworks - Process Development - ITIL

* Developed in the UK in the 80s
* De facto standard for IT management best practices
* Focuses on achieving SLAs between the IT department and its customer
* Stages
 - Design
 - Transition
 - Operation
* Each stage has between 3 and 5 steps

60

Security Frameworks - Process Development - Six Sigma

* Measures process quality by using statistical calculations
* A sigma rating is applied to a process to indicate the percentage of defects it contains

61

Security Frameworks - Process Development - Capability Maturity Model Integration (CMMI)

* Created by Carnegie Mellon for US DoD
* Determines the maturity of an organization's processes
* Designed to make improvements in an incremental and standard manner
* Levels:
 - Level 0: Nonexistent Management
 - Level 1: Unpredictable Processes
 - Level 2: Repeatable Processes
 - Level 3: Defined Processes
 - Level 4: Managed Processes
 - Level 5: Optimized Processes

62

Security Frameworks - The Process Life Cycle

* Focuses on how to keep processes up-to-date and healthy
* Four steps, and the last one feeds right back into the first one to start a new iteration
* Steps: Plan, Implement, Operate, Evaluate

63

Security Frameworks - The Process Life Cycle - Steps - 1: Plan (6)

- Establish MGMT and oversight committees
 - Identify business drivers and threats
 - Perform a risk assessment
 - Create security architectures for the business, data, application and infrastructure
 - Select possible solutions for the problems identified
 - Get mgmt approval to move to the next steps

64

Security Frameworks - The Process Life Cycle - Steps - 2: Implement (8)

- Assign duties
 - Establish baselines
 - Put security policies into operation
 - Identify data that needs to be secured
 - Create blueprints
 - Implement controls based on the blueprints
 - Implement solutions to monitor the controls based on the blueprints
 - Establish goals, SLAs and metrics based on the blueprints

65

Security Frameworks - The Process Life Cycle - Steps - 3: Operate (4)

- Follow established procedures to ensure baselines met the blueprints
 - Execute audits
 - Execute tasks defined by the blueprints
 - Ensure SLAs are met

66

Security Frameworks - The Process Life Cycle - Steps - 4: Evaluate (4)

- Review logs, audit results, metrics and SLAs
- Determine if the blueprint goals have been met
- Hold quarterly meetings with the steering committee
- Identify actions to improve as an input into the first step

67

Computer Crime Law - Cyberlaw

Any law that deals with computer-based crime

68

Computer Crime Law - Computer Crime Categories

* Computer-assisted: Computer is a tool
 - Example: Stealing money from a bank across the Internet
* Computer-targeted: Computer is the victim
 - Example: DoS attack
* Computer is incidental: Computer is involved but didn't play a significant role in the crime
 - Example: If a computer is used to temporarily store stolen or illegal goods

69

Computer Crime Law - Computer Crime

* Script Kiddies: Unsophisticated individuals who know just enough about pre-built hacking tools
*Types of serious hackers
 1- The ones who randomly sniff around
 2- APT (Advanced Persistent Threats)
 - Most dangerous
 - They target specific persons or organizations

70

Computer Crime Law - Computer Crime - OECD

```

* OECD has issued guidelines on how to deal with data that is transfered between countries
* Core principles:
 Collection Limitation
 Data Quality
 Purpose Specification
 Use Limitation
 Security Safeguards
 Openness
 Individual Participation
 Accountability

```
71

Computer Crime Law - Computer Crime - Safe Harbor Privacy Principles

```

* They deal with US and EU data transfer requirements
* Rules:
 - Notice
 - Choice
 - Onward Transfer
 - Security
 - Data Integrity
 - Access
 - Enforcement

```
72

Computer Crime Law - Computer Crime - Import and Export Law

* Each country has its own laws regarding import and export of goods
* Wassenaar Agreement
 - Followed by 41 countries including the US
 - Goal: To prevent the buildup of further military capabilities
 - The Information Security part deals with the exchange of cryptography

73

Computer Crime Law - Types of Legal Systems (CCCRM)

* Civil (Code) Law System: Lower courts are not compelled to follow the decisions made by upper courts
* Common Law System: Based on precedence
* Customary Law System: deals with personal conduct and behavior,
* Religious Law System: Based on religious beliefs of that region
* Mixed Law System: Two or more of the previously mentioned systems used together

74

Computer Crime Law - Types of Legal Systems - Common Law System types

* Criminal
 - To be convicted, guilt beyond reasonable doubt must be established
 - Cases are usually brought about by government prosecutors with a guilty or not guilty verdict
* Civil/Tort
 - Offshoot of Criminal Law
 - Deals with wrongs commited against an individual or company that has resulted in injury or damages
 - If found liable, monetary reparations are usually made by the defendant, but loss of freedom is never a result
* Administrative
 It addresses issues such as international trade, manufacturing, environment and immigration

75

Computer Crime Law - Intellectual Property

```

* Law that allows individuals or companies to protect what is rightly theirs from illegal duplication or use
* IP types:
 - Trade Secret
 - Copyright
 - Trademark
 - Patent

```
76

Computer Crime Law - Intellectual Property - Trade Secret (def-expiry-nda-example)

* Something a company creates or owns that is crucial to its survival and profitability
* Doesn't expire until it's not a trade secret
* Most companies with trade secrets make their employees sign an NDA
* Example: Coca-Cola formula

77

Computer Crime Law - Intellectual Property - Copyright

* Gives the author of a work the rights to control the display, adaptation, reproduction or distribution of that original work
* Protects the expression of the idea rather than the idea itself
* Expires after a limited amount of time
* Specific to the computer industry
 - Protects source code and object code
 - Protects user interfaces

78

Computer Crime Law - Intellectual Property - Trade Mark

* Protects a name, symbol, word, sound, shape, color or any combination thereof
* Represents a company's brand identity to its potential consumers
* WIPO (World Intellectual Property Organization) oversees International Trademark Law

79

Computer Crime Law - Intellectual Property - Patent

* Given to individuals or companies to protect an invention
* Strongest form of IP protection
* The invention must be novel, useful and non-obvious
* Has an expiration date (20 years)
* Specific to computer industry
 - Algorithms are commonly patented
 - Patent infringement prosecution is a matter of everyday life
 - Patent trolls buy patents only to sue infringing companies

80

Computer Crime Law - Intellectual Property - Protection of Intellectual Property

* A company must properly classify the data and implement sufficient protection (Due care)
* If Due Care is not taken, litigation will fail
* Software Piracy: Occurs whem protected works or data is duplicated or used without permission or compensation to the author
* Software Licensing: Freeware, Shareware, Commercial, Academic
* EULA: Used for communicating the licensing requirements
* FAST/BSA: Promote enforcement of software rights in order to combat piracy
* DMCA:
 - Prohibits attempts to circumvent copyright protection mechanisms
 - In Europe, a similar law is the Copyright Directive

81

Computer Crime Law - Privacy - Personally Identified Information (PII)

```

* Any data that can be used to identify, contact or locate an individual
* It's sensitive data because it can be used for identity theft
* Typical PII components
 Full Name
 ID Number
 Biometrics
 Digital Identities
 Birthdate

```
82

Computer Crime Law - Privacy - Laws and Regulations

* Federal Privacy Act of 1974
* Federal Information Security Management Act of 2002 (FISMA)
* Department of Veterans Affairs Information Security Protection Act
* Health Insurance Portability and Accountability Act (HIPAA)
* Health Information Technology for Economic and Clinical Health Act (HITECH)
* USA Patriot Act
* Gramm-Leach-Bliley Act (GLBA)
* Personal Information Protection and Electronic Documents Act (PIPEDA)
* Payment Card Industry Data Security Standard (PCI DSS)
* Economic Espionage Act of 1996

83

Computer Crime Law - Privacy - Laws and Regulations - Federal Privacy Act of 1974

Federal agencies could collect and store info about an individual's academic, medical, financial, criminal and employment history only if the agency had a necessary and relevant need to

84

Computer Crime Law - Privacy - Federal Information Security Management Act of 2002 (FISMA)

```

* Requires high-level officials of each agency to hold annual reviews of the information security programs and report the results to the Office of Management and Budget (OMB), which in turn reports to congress on the level of compliance achieved
* Requirements
 - Inventory of Information Systems
 - Categorization of the information and information systems according to risk
 - Security controls
 - Risk Assessment
 - System security plan
 - Certification and accreditation
 - Continuous monitoring

```
85

Computer Crime Law - Privacy - Department of Veterans Affairs Information Security Protection Act

* FISMA + Additional requirements on that agency alone
* Due to an incident in 2006

86

Computer Crime Law - Privacy - Health Insurance Portability and Accountability Act (HIPAA)

* PHI (Patient Health Information): PII+specific health details
* Defines rules for any facility that creates, accesses, shares or destroys patient data
* Works with fines
* Does not require notification of data breaches

87

Computer Crime Law - Privacy - Health Information Technology for Economic and Clinical Health Act (HITECH)

* Created in 2009
* Subtitle D
 - Electronic transmission of health information
 - Helps enforce HIPAA rules
* It directs the US Secretary of Health and Services (HHS) to provide guidance on effective controls to protect data
* Companies that comply with this guidance do not have to report data breaches. Otherwise, they have 60 days to report to HHS and the affected individuals

88

Computer Crime Law - Privacy - Patriot Act

* Reduces restrictions on law enforcement when searching electronic records
* Allows greater foreign intelligence gathering within the US
* Gives the Secretary of Treasury greater power to regulate financial transactions
* Broadens the ability to detain or deport immigrants suspected of terrorism
* Expands the definition on terrorism to include domestic terrorism
* Now the government can monitor individual's electronic communications at will

89

Computer Crime Law - Privacy - Gramm-Leach-Bliley Act (GLBA)

* aka Financial Services Modernization Act
* Requires financial institutions to create privacy notices and give their customers the ability to opt out of sharing their information with third parties
* In the event of a data breach the institution must report it to the federal regulators, law enforcement and affected customers

90

Computer Crime Law - Privacy - Personal Information Protection and Electronic Documents Act (PIPEDA)

Canadian protection of privacy law regarding e-commerce

91

Computer Crime Law - Privacy - Payment Card Industry Data Security Standard (PCI DSS)

* It's a standard for data security created by the major credit companies
* Credit companies will not work with a company that it's not PCI compliant

92

Computer Crime Law - Privacy - Economic Espionage Act of 1996

* Passed in 1996
* Defines who can investigate data breaches
* Protects IP

93

Computer Crime Law - Privacy - International Data Breaches

USA: Has a number of laws on the book
| EU data protection regulation: Standardized data breach notification

94

Policies-Standards - Baselines - Guidelines and Procedures - Policies - Security Policy

High-level statement that describes how security works within the organization.

95

Policies-Standards - Baselines - Guidelines and Procedures - Policies - Security Policy Types (OIS)

* Organizational Security Policy:
- Dictates how a security program will be constructed and describes how enforcement will be implemented.
- Sets the various goals.Addresses laws and regulations. Provides direction on the amount of risk management it's willing to accept.
- Should be periodically reviewed and updated.
- Documentation should be version-controlled and applicable for several years into the future.
* Issue-specific policy: Provides more detail on an area that needs further explanation. Must not be technology-specific. Examples: E-mail policy
* System-specific policies: Contain details that are specific to a system. Sufficiently generic to allow for other technologies and solutions

96

Policies-Standards - Baselines - Guidelines and Procedures - Policies - Another Policy Classification (IRA)

* Informative:Informs employees on a broad range of topics in an unenforceable manner
* Regulatory: Addresses regulatory requirements for a specific industry such as GLBA, PCI or HIPAA
* Advisory: Advises employees on enforceable rules governing actions and behaviors

97

Policies-Standards - Baselines - Guidelines and Procedures - Standards

* Provide instruction on how to meet the policy
| * Standards must always be enforced

98

Policies-Standards - Baselines - Guidelines and Procedures - Baselines

* Point in time that is used as a comparison for future changes
* A baseline results in a consistent reference point

99

Policies-Standards - Baselines - Guidelines and Procedures - Guidelines

Reflect recommendations and guides for employees when a specific standard does not really apply

100

Policies-Standards - Baselines - Guidelines and Procedures - Procedures

Where policies tell us where we want to go and standards provide the tools, procedures give us the step-by-step instructions on how to do it

101

Risk Management - NIST SP 800-53 three tiers to risk management (OBI)

* Organizational
* Business Process
* Information Systems (Our focus)

102

Risk Management - Information Systems Risk Management

ISRM policy should address the following elements
- The objectives of the ISRM team
- What is considered an acceptable level of risk
- How risks will be identified
- How the ISRM policy fits within the organization's strategic planning
- Roles and responsibilities for the ISRM
- Mapping of risk to controls, performance targets and budgets
- How staff behavior and resource allocation will be modified
- How the effectiveness of controls will be monitored

103

Risk Management - The Risk Management Team

* It can be a single person or more
| * Usually not 100% of their time in ISRM

104

Risk Management - The Risk Management Process - Four components: (FARM)

* Frame: Define the assumptions, constraints, priorities and the amount of risk the organization can tolerate
* Assess: Determine threats, vulnerabilities and attack vectors
* Respond: Match the available resources against a prioritized list of risks
* Monitor: Continuously watch the controls to assess their effectiveness against the risk each was designed to protect the organization from

105

Modeling Threats - Vulnerabilities

* Information: Data at rest / Data in motion / Data in use
* Processes: Blocks of code executing in-memory
* People: Usual attack vector / Social engineering / Social networks / Passwords

106

Modeling Threats - Threats

* Potential cause of an unwanted incident, which may result in harm to a system or organization
* Sources:
 - Deliberate outsiders
 - Deliberate insiders (The most dangerous group)
 - Accidental insiders

107

Modeling Threats - Attacks

* There are two ends to an attack
 - Attacker
 - Target
 - Means to an attack
* Attack Tree: Steps and substeps in an attack
* Attack Chain: One path that can be contained in an attack tree

108

Modeling Threats - Reduction Analysis

* Reduces the number of attacks to consider by identifying commonalities
* Reduces the threat posed by attackers: the closer to the root a mitigation is implemented, the more risks it is likely to control
Assessing and Analyzing Risk - Risk Assessment,* Method of identifying vulnerabilities and threats and assessing the possible impacts to determine where to implement security controls
* Outputs a list of vulnerabilities and threats

109

Assessing and Analyzing Risk - Risk Analysis

* Prioritizes the list obtained through the Risk Assessment
* Assesses the amount of resources to properly mitigate the top threats
* Goals
- Identify and valuate assets
- Identify vulnerabilities and associated threats
- Quantify the likelihood of the threats
- Calculate an economic balance between each threat and the cost of a countermeasure
* Outputs a cost/benefit comparison

110

Assessing and Analyzing Risk - Risk Analysis Team

* Individuals from all departments * Good questions for this team to ask are  1. What could happen?  2. What would the impact be?  3. How often could it happen?  4. Do we really believe the first three answers?
111

Assessing and Analyzing Risk - Calculating Value

* Calculating currency-based value for each asset
* Issues to be examined
 - Cost to acquire or develop the asset
 - Cost to maintain and protect the asset
 - Value of the asset to owners and users
 - Value of the asset to adversaries
 - Price others are willing to pay for the asset
 - Cost to replace the asset if lost
 - Operational and production activities affected if the asset is unavailable
 - Liability issues if the asset is compromised
 - Usefulness and role of the asset in the organization
* Two questions should be asked:
 - What is the cost to protect an asset?
 - What is the cost if we did not protect an asset?
* Allows us to do the following
 - Perform an effective cost/benefit analysis
 - Select proper controls
 - Determine the amount of insurance to purchase
 - Define exactly what is at risk
 - Comply with legal and regulatory requirements

112

Assessing and Analyzing Risk - Identifying Vulnerabilities and Threats

* Threats can arise from seemingly innocuous sources such as our own applications and users
Examples:
- An application could have a logic flaw, known as illogical processing, which destroys or compromises data or resources. This can then lead to cascading errors wherein a small flaw is passed to another process, which can amplify the flaw
- A user can enter invalid data or even accidently delete important data
* Loss Potential:Each risk has it
* Delayed Loss: It happens after the vulnerability has been exploited. Example: Your company's reputation takes a hit

113

Assessing and Analyzing Risk - Methodologies for Risk Assessment

* NIST SP 800-30
* Facilitated Risk Analysis Process (FRAP)
* Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE)
* AS/NZS 4360
* ISO 27005
* Failure Mode and Effect Analysis (FMEA)
* Central Computing and Telecommunications Agency
Risk Analysis and Management Method (CRAMM)

114

Assessing and Analyzing Risk - Methodologies for Risk Assessment - NIST SP 800-30

```

1- Prepare for the assessment
2- Conduct the assessment
 a. Identify threats
 b. Identify vulnerabilities
 c. Determine likelihood
 d. Determine magnitude
 e. Calculate risk
3- Communicate the results
4- Maintain the assessment

```
115

Assessing and Analyzing Risk - Methodologies for Risk Assessment - Facilitated Risk Analysis Process (FRAP)

Stresses a qualitative measurement of risk instead of trying to actually calculate a risk value

116

Assessing and Analyzing Risk - Methodologies for Risk Assessment - Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE)

* The premise of this methodology is that the people involved with a system or process should be the only ones making the decisions on security, as opposed to higher-level or external influences
* Meant for entire organization

117

Assessing and Analyzing Risk - Methodologies for Risk Assessment - AS/NZS 4360

Focuses on the organization's overall health, but could be used in Security

118

Assessing and Analyzing Risk - Methodologies for Risk Assessment - ISO 27005

Describes how RM should be carried out for ISMS

119

Assessing and Analyzing Risk - Methodologies for Risk Assessment - Failure Mode and Effect Analysis (FMEA)

* Focuses on identifying functions, their failures and the causes of those failures
* Excels when examining a single system, but tends to break down when considering multiple systems
* Steps
1) Create a block diagram
2) Consider what happens when each block fails
3) Create a table of each failure and the corresponding impact
4) Correct the design and repeat #3 until the system no longer has unacceptable weaknesses
5) Have engineers review the design and table

120

Assessing and Analyzing Risk - Methodologies for Risk Assessment - Central Computing and Telecommunications Agency Risk Analysis and Management Method (CRAMM)

* UK originated
* Siemens has an automated tool for it
* Stages
1) Define objectives
2) Assess risk
3) Identify countermeasures

121

Assessing and Analyzing Risk - Risk Analysis Approaches - Quantitative Risk Analysis

* Asset Value (AV): Given by the Risk Assessment phase
* Exposure Factor (EF): The percentage of loss that a realized threat could have on that asset
Single Loss Expectancy (SLE): SLE=AVEF
* Annual Rate of Occurence (ARO): Number of times per year that we can expect the threat to take place
* Annualized Loss Expectancy (ALE):
- ALE=SLE*ARO
- We shouldn't expend more than the ALE in protecting that asset

122

Asset Value (AV)

Given by the Risk Assessment phase

123

Exposure Factor (EF)

The percentage of loss that a realized threat could have on that asset

124

Single Loss Expectancy (SLE) - Formula

SLE=AV*EF

125

Annual Rate of Occurence (ARO)

Number of times per year that we can expect the threat to take place

126

Annualized Loss Expectancy (ALE) - Formula

ALE=SLE*ARO

127

Assessing and Analyzing Risk - Risk Analysis Approaches - Qualitative Risk Analysis

* Various scenarios are discussed and threats and possible controls are ranked based on opinions
* Each threat is ranked
* A matrix is usually used to facilitate this discussion
- Y-Axis: Likelihood of occurrence
- X-Axis:The impact
* Delphi technique
- Each group member provides a written opinion on each threat and gives the answer to the risk assessment team
- The team then compiles the results and distributes it to the group who write down comments anonymously
- The results are then compiled and redistributed until a consensus is reached

128

Delphi technique

- Each group member provides a written opinion on each threat and gives the answer to the risk assessment team
- The team then compiles the results and distributes it to the group who write down comments anonymously
- The results are then compiled and redistributed until a consensus is reached

129

Assessing and Analyzing Risk - Protection Mechanisms - Value of a control

VC = ALE_before - ALE_after

130

Assessing and Analyzing Risk - Protection Mechanisms - Hidden costs

* The actual product
* Design and planning
* Implementation
* Environment modifications
* Compatibility with other controls
* Maintenance
* Testing
* Repair, replacement or upgrades
* Operating and support
* Negative impacts on productivity
* Subscription
* Time for monitoring and responding to alerts

131

Assessing and Analyzing Risk - Protection Mechanisms - List of desirable attributes for a control

* Can be installed without affecting other mechanisms
* Provides uniform protection
* Administrator can override
* Defaults to least privilege
* Ability to enable/disable as desired
* Does not distress users
* Differentiation between user and administrator roles
* Minimum human interaction
* Assets are still protected during a reset
* Easily updated
* Provide sufficient audit trail
* Not have heavy dependence on other components
* Does not introduce heavy barriers for users
* Produce human-readable output
* Easy reset to baseline configuration
* Testable
* Does not introduce compromises
* Does not impact system performance
* Does not require many exceptions across the environment
* Proper alerting
* Does not impact existing assets
* Is not highly-visible

132

Assessing and Analyzing Risk - Total Risk vs. Residual Risk

* Total Risk: TR = threats x vulnerability x asset value
* Residual Risk: RR = total risk x controls gap
* You can't plug in numbers into these formulas, as they are conceptual
* How to deal with the risk
- Transfer the risk
- Risk avoidance
- Risk reduction
- Accept the risk

133

Total Risk

TR = threats x vulnerability x asset value

134

Residual Risk

RR = total risk x controls gap

135

How to deal with the risk

* Transfer the risk
* Risk avoidance
* Risk reduction
* Accept the risk

136

Assessing and Analyzing Risk - Outsourcing

* Not a viable option unless you can verify how the partner handles risk
* An organization can still be found liable if an outsourcing partner failed to mitigate a risk

137

Managing Risk - Risk Management Frameworks (What they do)

Allow an organization to:
1) Identify and assess risk
2) Reduce it to an acceptable level
3) Ensure the risk remains at an acceptable level

138

Managing Risk - Commonly Used RMF's

* NIST RMF (SP 800-37)
- Operates around a systems life-cycle
- Focuses on certification and accreditation
* ISO 31000:2009
- Acknowledges that there are things which we cannot control
- Focuses instead on managing the fallout
- It can be broadly applied to an entire organization
* ISACA Risk IT: Attempts to integrate NIST, ISO 31000 and COBIT
* COSO Enterprise Risk Management-Integrated Framework
- Generic framework
- Takes a top-down approach

139

Managing Risk - Categorize Information System

* Identification of systems, subsystems and boundaries that the organization has
* This will give you the info you need to select the controls

140

Managing Risk - Select Security Controls

* Assumptions
- Risk Assessment has been done
- Common controls across the organization have been identified
* When considering a new system
- Are there new risks specific to it or into your architecture by introducing this new system?
- Perform new Risk Asessment on the new system and its effect on the larger ecosystem
- Compare results to determine if we need to modify controls or new controls are needed

141

Managing Risk - Implement Security Controls

* Implementing is simple
* Documenting is important
- So everyone will understand the what, where and why of each control
- Allows the controls to be integrated into an overall assessment and monitoring plan

142

Managing Risk - Assess Security Controls

* The control must be assessed to see how effective it has been
* Should be done by individuals who did not implement the control
* Results should be added to the documentation to be referred during the next round of assessments

143

Managing Risk - Authorize Information System

Forwarding all documentation and assessment results to the person or the group who can authorize integration of the system into the general architecture

144

Managing Risk - Monitor Security Controls

* Once the system is in general operation, it must be monitored to ensure it remains effective
* If any changes in operation or threats are detected, the system must be updated

145

Business Continuity and Disaster Recovery - Disaster recovery (DR)

Is how an organization will minimize the effects of a disaster or disruption to business and return to some level of acceptable productivity

146

Business Continuity and Disaster Recovery - Disaster Recovery Plan (DRP)

Goes into effect during the emergency

147

Business Continuity and Disaster Recovery - Continuity planning

Addresses how the organization will return to full capacity, including backup data centers, spinning up new locations for people to work, or altering processes during the interim

148

Business Continuity and Disaster Recovery - Business continuity management (BCM)

* Encompasses both DR and CP
* Must address all CIA
* Much more than buildings and hardware: People run the systems and must know them
* Example: During a disaster, you can't just leave a sensitive server sitting in an abandoned building (Confidentiality), you can't assume storage media will remain safe and secure (integrity) and you have to make sure those resources are back up and running as soon as possible (availability)

149

Business Continuity and Disaster Recovery - Business Continuity Planning (BCP)

* It's the way to implement BCM
* Contains strategy documents providing detailed procedures: To ensure critical functions are maintained that will minimize loss
* The procedures cover
- Emergency responses
- Extended backup operations
- Post-disaster recovery
* Can quickly become outdated due to turnover and undocumented changes

150

Business Continuity and Disaster Recovery - Standards and Best Practices - NIST SP 800-34

1) Write the continuity planning policy statement: Write a policy and assign authority to carry out the policy tasks
2) Conduct the business impact analysis (BIA):
- Identify critical functions and systems
- Prioritize the list
3) Identify preventative controls: Select and implement controls to address the BIA
4) Create contingency strategies: Make sure systems can be brought online quickly
5) Develop an information system contingency plan: Write procedures and guidelines on how the organization will remain functional in a crippled state
6) Ensure plan testing, training and exercises
7) Ensure plan maintenance: Put in place steps to ensure the BCP is updated regularly

151

Business Continuity and Disaster Recovery - Standards and Best Practices - Other standards

* ISO 27031: Describes the concepts of information communication technology (ICT) readiness for business continuity
* ISO 22301: The ISO standard for BCM
* Business Continuity Institute's Good Practice Guidelines (GPG)
* DRI International Institute's Professional Practices for Business Continuity Planners

152

Business Continuity and Disaster Recovery - Making BCM Part of the Enterprise Security Program

* BCM must be built upon a solid understanding of
- How the organization operates
- The organizational components that are critical to continuing its reason for being
* BCP
- Living entity that is continually revisited and updated as-needed
- Should define and prioritize the organization's critical mission and business functions, and provide a sequence for recovery
- Must have management's full support

153

Business Continuity and Disaster Recovery - BCP Project Components - Business Continuity Coordinator

* Leader for the BCP team
| * Will oversee the development, implementation, and testing of the business continuity and disaster recovery plans

154

Business Continuity and Disaster Recovery - BCP Project Components - BCP Committee

* Specific, qualified people
* People who are familiar with the different departments within the company
* People from at least the following departments
- Business units
- Senior management
- IT department
- Security department
- Communications department
- Legal department

155

Business Continuity and Disaster Recovery - Scope of the Project

Should it cover one or all facilities? Should it encompass large threats or smaller ones as well?
This kind of decision is for Senior Executives

156

Business Continuity and Disaster Recovery - BCP Project Components - BCP Policy - Components

* Scope
* Mission
* Principles
* Guidelines
* Standards

157

Business Continuity and Disaster Recovery - BCP Project Components - BCP Policy - Process of drawing up the policy

1. Identify and document the components of the policy
2. Identify and define policies of the organization that the BCP might affect
3. Identify pertinent legislation, laws, regulations, and standards
4. Identify "good industry practice" guidelines by consulting with industry experts
5. Perform a gap analysis. Find out where the organization currently is in terms of continuity planning, and spell out where it wants to be at the end of the BCP process
6. Compose a draft of the new policy
7. Have different departments within the organization review the draft
8. Incorporate the feedback from the departments into a revised draft
9. Get the approval of top management on the new policy
10. Publish a final draft, and distribute and publicize it throughout the organization

158

Business Continuity and Disaster Recovery - BCP Project Components - Project Management (PM)

* To ensure BCP doesn't run out of funds * SWOT analysis - Strengths: Characteristics of the project team that give it an advantage over others Weaknesses: Characteristics that place the team at a disadvantage relative to others Opportunities: Elements that could contribute to the project's success Threats: Elements that could contribute to the project's failure

159

Business Continuity and Disaster Recovery - BCP Project Components - Business Continuity Planning Requirements

* Due Dilligence
- Doing everything within one's power to prevent a disaster from happening
- Applicable to leaders
* Due Care
- Taking precautions that a reasonable and competent person would have done
- Applicable to everyone

160

Business Continuity and Disaster Recovery - BCP Project Components - Business Impact Analysis (BIA)

* Activity at the beginning of BCP where interviews are executed and data collected to identify and classify business and individual functions
* Steps
1) Select individuals for interviewing
2) Create data-gathering techniques
3) Identify critical functions
4) Identify resources
5) Calculate how long functions can survive without resources
6) Identify vulnerabilities and threats
7) Calculate risk (risk = threat x impact x probability)
8) Document findings and report to management

161

Maximum Tolerable Downtime (MTD)

Each critical system must be examined to see how long the organization can survive without it

162

Business Continuity and Disaster Recovery - BCP Project Components - Responsibilities for BCP management

* Committing fully to the BCP
* Setting policy and goals
* Ensuring the required funds and resources are available
* Taking responsibility of the outcome of the BCP
* Appointing a team

163

Business Continuity and Disaster Recovery - BCP Project Components - BCP team's responsibilities

* Identifying legal and regulatory requirements
* Identifying vulnerabilities and threats
* Estimating threat likelihood and potential loss
* Perform a BIA
* Indicate which functions and processes must be running before others
* Identifying interdependencies
* Developing procedures and steps to resume business after a disaster
* Identify individuals who will interact with external players

164

Executive Succession Plan

Dictates who will step in until an absent executive returns or a permanent replacement can be found

165

Personnel Security - Separation of Duties

* Process that ensures a single person cannot complete a critical task by himself
* Example: Before launching a nuclear missile, two people have to insert a key. This is an example of dual control
* In businesses, usually put into place to prevent fraud in the form of split knowledge
* Example: One person can create a named user in a system (authentication), but cannot assign rights to that user (authorization). Another user must assign authorization. To create a rogue account, two employees must collude with each other, thereby reducing the likelihood of this happening

166

Personnel Security - Rotation of duties

* Administrative detection control to uncover fraudulent activities
* Goal: Move employees around so that each does not have control over the same business function for too long

167

Personnel Security - Mandatory Vacation

For employees operating in sensitive areas, it should be implemented in order to detect fraud

168

Personnel Security - Hiring practices

* Before hiring new employees: HR should always look into the individual's background for character traits
* NDA's must be signed by new employees
* Background checks
- Social security number trace
- County/state criminal history
- Federal criminal history
- Sexual offender registry check
- Employment verification
- Education verification
- Reference verification
- Immigration check
- License or certification validations
- Credit report
- Drug screening

169

Personnel Security - Termination process

* Surrender of ID badges or keys
* Escort from the premises
* Immediate disabling of user accounts or other access
* Severance package dependent upon completion of an exit interview and surrender of company property. This encourages terminated employees to comply

170

Personnel Security - Security-Awareness Training

* During the hiring process
* Attributes
- Repeats the most important messages in different formats
- Up-to-date
- Entertaining and positive
- Simple to understand
- Supported by senior management
* Audiences for this training
- Management: Short orientation that focuses on how security pertains to corporate assets and financial goals and losses
- Staff: Policies, procedures, standards and guidelines
- Technical employees: In-depth training on daily activities

171

Security Governance - Definition

Framework providing Oversight, Accountability and Compliance

172

Security Governance - Metrics

* ISO 27004: How to measure Security Program effectiveness
* NIST SP 800-55: Government's version of ISO 27004

173

Ethics - ISC2 Code of Ethics

* Protect society, the common good, necessary public trust and confidence, and the infrastructure
* Act honorably, justly, responsibly and legally
* Provide diligent and competent service to principals
* Advance and protect the profession

174

Ethics - Computer Ethics Institute

1) Thou shalt not use a computer to harm other people
2) Thou shalt not interfere with other people's computer work
3) Thou shalt not snoop around in other people's computer files
4) Thou shalt not use a computer to steal
5) Thou shalt not use a computer to bear false witness
6) Thou shalt not copy or use proprietary software for which you have not paid
7) Thou shalt not use other people's computer resources without authorization or proper compensation
8) Thou shalt not appropriate other people's intellectual output
9) Thou shalt think about the social consequences of the program you are writing or the system you are designing
10) Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans

175
Ethics - Internet Architecture Board (IAB) unethical acts
* Seeks to gain unauthorized access to the resources of the Internet * Disrupts the intended use of the Internet * Wastes resources (people, capacity, computer) through such actions * Destroys the integrity of computer-based information< * Compromises the privacy of users