Domain 1 Flashcards
(92 cards)
CIA - Confidentiality (definition-attacks-defense)
- High level of assurance that info is kept from unauthorized parties
- Attacks: Shoulder surfing, social engineering, decryption, brute-force
- Defense: Encryption, access controls
CIA - Confidentiality - Related concepts (SDCSPSI)
- Sensitivity: What could happen if this info was disclosed
- Discretion: When you choose to control the information disclosure to limit damage
- Concealment: Act of hiding or preventing disclosure
- Secrecy: Keeping something secret
- Privacy: Keeping sensible info confidential
- Seclusion: Storing something in an out-of-the-way manner
- Isolation: Keeping something separated from others
CIA - Integrity (def - approaches)
When info remains unaltered by unauthorized parties
Approaches:
Preventing intentional unauthorized modification
Preventing accidental modifications
Ensure internal and external consistency of the information
CIA - Availability (def - examples)
Usable access to a resource is always provided in a timely and uninterrupted manner
- Examples:Load Balancing
Clustering
Backups
Redundancy
AAA (IAAAA)
- Identification: A subject claims a specific identity
- Authentication: A subject proves he is who he claims to be
- Authorization: Deciding what the subject can access and how can it be used
- Auditing: Recording activities of the subject in a log
- Accountability: Reviewing the log to check for compliance
From Vulnerability to Exposure - Vulnerability (def -example)
A weakness in a system that allows a threat to compromise security
Examples:
AP without security enabled
Too many ports allowed on a firewall
Unneeded service running on a server
From Vulnerability to Exposure - Exploit
Occurs when a vulnerability is taken advantage of by an attacker
From Vulnerability to Exposure - Threat
Danger that a vulnerability will be exploited
From Vulnerability to Exposure - Threat Agent
Entity that exploits a vulnerability
From Vulnerability to Exposure - Risk
The likelihood that a threat agent will exploit a vulnerability combined with the damage that could result
From Vulnerability to Exposure - Exposure
Single real-world instance of a vulnerability being exploited by a threat agent
From Vulnerability to Exposure - Control
Countermeasure put into place to mitigate the risk
Controls - Categories (ATP)
- Administrative Controls: Controls put in place by management
Examples
Training
Security Policy - Technical Controls: Software elements such as hashing, encryption or authentication enforcement
- Physical Controls: Controls that are physical
Examples
Lighting
Fences
Keycards
Security Guards
Controls - Functions (PCDDRC)
- Preventative: Avoid an incident
- Corrective: Fix a component or system
- Deterrent: Discourage an attacker
- Detective: Identify an intruder
- Recovery: Bring environment back to normal operation
- Compensating: Alternative control if the first choice is unavailable
Security Frameworks - ISO 27000 Series - BS7799 (year-who-what-parts)
- Created in 1995
- Published by British Standards Institute
- Outlines how an ISMS should be created and maintained
- Part 1
Describes controls - Part 2
Shows how an ISMS can be setup
Security Frameworks - ISO 27000 Series (1-8, 11, 14-15,31-35,37,799)
ISO 27000 Overview and vocabulary for the rest of the 27000 series ISO 27001 Standard for creation, implementation, control and improvement of ISMS ISO 27002 General guidelines for implementing an ISMS ISO 27003 ISMS implementation ISO 27004 ISMS measurement ISO 27005 Risk management ISO 27006 Certification body requirements ISO 27007 ISMS auditing ISO 27008 Guidance for auditors ISO 27011 Telecommunications organizations ISO 27014 Information security governance ISO 27015 Financial sector ISO 27031 Business continuity ISO 27032 Cybersecurity ISO 27033 Network security ISO 27034 Application security ISO 27035 Incident management ISO 27037 Digital evidence collection and preservation ISO 27799 Health organizations
Security Frameworks - Enterprise Architecture Development - Introduction (structure-guidance-terms)
- Addresses the structure and behavior of an organization
- It’s a guidance on how to build an architecture
- Allows each group of people within an organization to view the business in terms they can understand
Security Frameworks - Enterprise Architecture Development - Zachman (who-orientation-matrix)
- Created by John Zachman in the 80s
- This framework is not security oriented, but it is a good template to work with because it offers direction on how to understand an actual enterprise in a modular fashion
* 2-dimensional matrix X-axis 5 different audiences Y-axis 6 different views
Security Frameworks - Enterprise Architecture Development - Zachman (audiencies - views)
Audiences Executives Business Managers System Architects Engineers Technicians Entire enterprise Views What How Where Who When Why
Security Frameworks - Enterprise Architecture Development - TOGAF (who-arch types-adm)
- Created by US DoD
* Architecture types Business Data Application Technology
- Architecture Development Method (ADM)
Used to create each type
The last step feeds back into the first step
After each iteration, the process has been improved to reflect changing requirements
Each iteration addresses each of the four views
Security Frameworks - Enterprise Architecture Development - Military Oriented (DoDAF-Brits)
- Department of Defense Architecture Framework:
- Involves things as command, control, surveillance and reconnaissance
- One of its primary objectives is to ensure a common communication protocol and standard payloads
- Ministry of Defence Architecture Framework
- British version of DoDAF
Security Frameworks - Enterprise Architecture Development - Sherwood Applied Business Security Architecture (SABSA) (ESA-views-yaxis-differences)
- It’s an Enterprise Security Architecture: Ensures an organization has an effective ISMS in place
- Similar to Zachman
- Views:
- Assets (What)
- Motivation (Why)
- Process (How)
- People (Who)
- Location (Where)
Time (When)
- Y-Axis from wide to narrow
- Contextual
- Conceptual
- Logical
- Physical
- Component
- Operational
- Difference between SABSA and the others
- It is also a methodology
- Provides an actual process to follow
- It is geared toward security
Security Frameworks - Architecture Framework Terms (strat-business-process enh-sec effec)
- Strategic Alignment: An architecture is strategically aligned when it meets the needs of the business and all legal or regulatory requirements
- Business Enablement: A good security architecture must enable the business to thrive by not getting in the way, but still providing proper security
- Process Enhancement: Security forces us to take a closer look at existing processes. This could lead us to improve them
- Security Effectiveness: Most quantifiable of the attributes. Examples: ROI, SLA achievements
Security Frameworks - Frameworks for Implementation (C C N)
- COSO Internal Control
- COBIT
- NIST SP 800-53