Availability terms:
MTD
RPO
RTO
Maximum Tolerable Downtime
Recovery Point Objective
Recovery Time Objective
Disaster vs Catastrophe?
todo check handerhan video
IAAAA
Identification: User should be uniquely Identified
Authentication: Validation of an entity’s identity claim
Authorization: Confirms that an authenticated entity has the privileges and permissions
necessary.
Auditing: Any activity in the application/system should be audited (Identify technical issues/
Breaches)
Accountability: Tracing an action to a subject
Strategic vs Tactical?
Strategic - Longer (5 years)
Tactical - Mid/Short (6 months to 1 year)
Operational - Shortest (Days to weeks)
US Government data classifications
Top Secret (Classified - grave damage to national security if disclosed)
Secret (Classified - critical/serious damage to national security if disclosed)
Confidential (Classified - serious/actual damage to national security if disclosed)
Sensitive But Unclassified
For Official Use Only
Unclassified
Note: for CISSP, sensitive typically means “neither public nor unclassified”
Security Roles
STRIDE
S - Spoofing (authentication)
T - Tampering (integrity)
R - Repudiation (digital signatures)
I - Information Disclosure (encryption/confidentiality)
D - Denial of Service (availability, fault tolerance/redundancy)
E - Escalation of privilege (authorisation)
DREAD
D - Damage potential (How severe the damage likely to be if the threat is realized)
R - Reproducibility (How complicated it is for the attacker to reproduce the exploit)
E - Exploitability (How hard it is to perform the attack)
A - Affected users (How many users are likely to be affected)
D - Discoverability (How hard it is for an attacker to discover the weakness)
Asset, Threat, Vulnerability, Exploit, Control
Asset Valuation - Value of an asset
Risk: Likelihood that a threat will exploit a vulnerability in an asset.
Threat: Has the potential to harm an asset.
Vulnerability: A weakness; a lack of safeguard
Exploit: Instance of compromise
Controls: Protective mechanisms to secure vulnerabilities
• Safeguards: Proactive
• Countermeasure: Reactive mechanism
AV, EF, SLE, ARO, ALE?
AV = asset value EF = exposure factor = proportion of asset value lost in single event
SLE = AV * EF = single loss expectancy (expected loss from single event)
ARO = annualised rate of occurrence
ALE = SLE * ARO = annualised loss expectancy (expected loss each year)
Risk treatments
M - Mitigate (Reduce likelihood and/or impact) A - Accept A - Avoid T - Transfer/Assign D -Deter
R - Reject (not a real option)
Categories of law
Goals of cryptography
P - Privacy (Confidentiality)
A - Authentication
I - Integrity
N - Non-Repudiation - depends on Authentication and Integrity
Integrity depends on Authentication and vv? check Handerhan video
Zero Knowledge proof (eg for authentication)
Proof that knowledge without sharing that knowledge eg challenge response
Stream vs Block ciphers
Stream: RC-4 on exam; also Salsa/ChaCha (DJB)
Block: generally more secure than stream but typically slower?
AES, RC-2, RC-5/6, DES/3DES, Blowfish, IDEA (PGP) are all block based
Hybrid cryptography
Encrypt message with symmetric alto (faster) and then encrypt symmetric key using asymmetric crypto (public key).
used in eg SSL/TLS and PGP
Security by Design
• Privacy by design: It’s equally important to consider privacy at the design phase. Considering the system will be subject to processing PII data, it’s important to design the controls to protect it.
• Asset classification: It’s important to know what to protect. Without classification, controls cannot be implemented.
Security model composition theories
Composition Theories:
Security models
Bell-LaPadula (prevent leak to lower level)
BIBA (prevent corruption from lower level)
Clark Wilson (untrusted accesses trusted through constrained interfaces)
Brewer Nash (chinese wall?)
Bell-LaPadula and Biba rules
Simple = read related Star/* = write related
Bell-LaPadula:
Simple: no read up
Star/*: no write down
Biba:
Simple: no read down
Star/*: no write up
Strong star/*: ???
Security Evaluation Models
TCSEC “Orange book” - Trusted Computer System Evaluation Criteria
(Rainbow series, US Federal)
A / B1/2/3 / C1/2 / D
ITSEC - Information Technology Security Evaluation Criteria
(European alternative to TCSEC)
levels todo!!
Common Criteria ISO-15408
assurance levels EAL1..7
EAL4 is most common target - tested and reviewed but no formal methods
Security Evaluation - certification vs accreditation
Certification: Technical Evaluation. Internal verification trusted by your (ie the supplier’s) internal organization.
Accreditation: Formal Acceptance by the management. Performed by third party and accepted by everyone.
*Exam tip: When
Cloud computing key elements
Virtualisation
Elasticity
Resource pooling
Service provided by third party
SCADA
Supervisory Control And Data Acquisition
Control system for Industrial Control System (ICS).
Stuxnet was a root kit for SCADA systems