Domain 1 - Security and Risk Management Flashcards

(59 cards)

1
Q

Confidentiality

A

Access controls help ensure that only authorized subjects can access objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Ensures that data or system configurations are not modified without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Authorized requests for objects must be granted to subjects within a reasonable amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Code of Ethics

A

PAPA
Protect society, the commonwealth, and the infrastructure.

Act honorably, honestly, justly, responsibly, and legally.

Provide diligent and competent service to principals.

Advance and protect the profession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Policy development

A

Acceptable Use Policy
Assigns roles and responsibilities

Security Baselines
Define “minimum levels”

Security Guidelines
Offer recommendations

Security Procedures
Detailed step-by-step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Categories

A

Group of potential causes of risk.

Damage - Results in the physical loss of an assess or the inability to access the asset.

Disclosure - Disclose critical information regardless of how or where it was disclosed.

Losses - Might be permanent or temporary including altered data or inaccessible data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Factors

A

Something that increase risk or susceptibility.

Physical damage - Natural disaster, power loss, or vandalism.

Malfunctions - Failure of systems, networks, or peripherals.

Attacks - Purposeful acts whether from the inside or outside, such as unauthorized disclosure.

Human errors - Usually considered accidental incidents, whereas attacks are purposeful incidents.

Application errors - Failures of the application including the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Planning

A

Strategic - long term ~5 year

Tactical - midterm plan ~1 year

Operations - shorter (highly detailed) month to month or quarterly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Response to risk

A

Risk acceptance - Do nothing, accept the risk and potential loss if threat occurs.

Risk mitigation - You do this by implementing a countermeasure and accepting the residual risk.

Risk Assignment - Transfer risk to 3rd party.

Risk Avoidance - When costs of mitigating or accepting are higher than benefits of service

Risk Deterrence - Implementing deterrents to would-be violators of security behavior.

Risk rejection - UNACCETABLE possible response to risk is to reject of ignore risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk management Frameworks

A

Primary risk management framework

NIST 800-37 rev 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

7 Steps of NIST 800-37 rev 2

A

PCSIAAM
People Can See I am Always Monitoring

  1. Prepare - to execute the RMF
  2. Categorize - information systems
  3. Select - security controls
  4. Implement - security controls
  5. Assess - the security controls
  6. Authorize - the system (ATO)
  7. Monitor - security controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When legal issues are involved.

A

contact an attorney

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Risks

A

Residual - risk that remain after all safeguards - After

Inherent - risk that exists without controls (newly identified) - Before

Total - amount of risk an organization would face if no safeguards were implemented - Without

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Total Risk Formula

A

threats * vulnerabilities * asset value = total risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk formula

A

threat * vulnerability = risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk analysis - Quantitative

A

Quantitative - dollar value to evaluate effectiveness of countermeasures. OBJECTIVE

  • Assign asset value (AV)
  • Calculate exposure factor (EF)
  • Calculate single loss expectancy (SLE)
  • Assess the annualized rate of occurrence (ARO)
  • Derive the annualized loss expectancy (ALE)
  • Perform cost/benefit analysis of countermeasures
  1. Inventory assets and assign a value (AV)
  2. Identify threats. Research each asset and produce a list of all possible threats to each assets. (EF and SLE)
  3. Perform a threat analysis to calculate the likelihood of each threat being realized within a single year. (ARO)
  4. Estimate the potential loss by calculating the annualized loss expectancy (ALE).
  5. Research countermeasures for each threat, and then calculate the changes to ARO and ALE based on an applied countermeasure.
  6. Perform a cost/benefit analysis of each countermeasure for each threat for each asset.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk analysis - Qualititative

A

Uses a scoring system to rank threats and effectiveness of countermeasures. SUBJECTIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Delphi Technique

A

An anonymous feed-back and response process used to arrive at a consensus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Loss potential

A

What would be lost if the threat agent is successful in exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Delayed loss

A

This is the amount of loss that can occur over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Threat agent

A

are what causes the threat by exploiting vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Formula terms

A
exposure factor (EF)
% of loss that an organization would experience if a specific asses were violated by a realized risk.

single loss expectancy (SLE)
Represents the cost associated with a single realized risk against a specific assets

annualized rate of occurrence (ARO) - The expected frequency with which a specific threat or risk will occur with a single year.

annualized loss expectancy (ALE)

Safeguard evaluation -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SLE Formula

A

AV * EF = SLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ALE

A

SLE * ARO = ALE

25
Safeguard Evaluation formula
ALE before safeguard - ALE after safeguard - annual cost of safeguard = value of safeguard ALE1 - ALE2 - ACS = value of safeguard
26
Controls gap
the amount of risk reduced by impending safeguards total risk - controls gap = residual risk
27
Threat Modeling
Security process where potential threats are identified, categorized, and analyzed.
28
Threat Model | STRIDE
``` STRIDE (Microsoft) Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege ```
29
Threat Model | PASTA
Risk centric approach Stage I: Definition of Objectives Stage II: Definition of Technical Scope Stage III: App Decomposition and Analysis Stage IV: Threat Analysis Stage V: Weakness and Vulnerability Analysis Stage VI: Attack Modeling & Simulation Stage VII: Risk Analysis & Management
30
Threat Model | VAST
Based on Agile project management Visual Agile Simple Threat
31
Threat Model | Trike
Risk-based approach
32
Threat Model | DREAD
Damage potential Reproducibility Exploitability Affected users Discoverability
33
Reduction Analysis - Threat Modeling
Trust boundary - any location where the level of trust or security changes Data flow paths Input points - locations where external inputs are received Privileged operations - any activity that requires greater privileges than of a standard user account Details about security stance and approach
34
Security controls
measures for countering and minimizing loss of unavailability
35
Control categories
Technical (logical) - hardware/software mechanisms used to manage access Administrative - policies and procedures defined by org's security policy, and other regulations and requirements. Physical - items which you can touch - guards, gates, laptop locks
36
Control types
Deterrent Controls - deployed to discourage violation of security policies Preventative Controls - deployed to thwart or stop unwanted or unauthorized activity from occurring - (fences, locks, access control points, alarm systems, separation of duties, job rotation, antimalware software, firewalls, IPs) Detective Controls - deployed to discover or detect unwanted or unauthorized activity - (CCTV, honeynets/honeypots, IDSs, security cameras, guards, audit trails, incident investigators) .. discover activity only AFTER it has occured Compensating Controls - provides other options to other existing controls to aid in enforcement of security policies. Corrective Controls - modifies the environment to return system to normal after an unwanted or unauthorized activity has occurred Recovery Controls- an extension of corrective controls but have more advanced or complex abilities. Attempts to repair or restore resources, functions, and capabilities after a security policy violation. Directive Controls - direct, confine, or control the actions of subjects to force or encourage compliance with security policies
37
Laws
Computer Fraud and Abuse Act (CFAA) - The first major piece of US cybercrime-specific legislation Federal Sentencing Guidelines. provided punishment guidelines to help federal judges interpret computer crime laws. Federal Information Security Management Act (FISMA). Required a formal infosec operations for federal gov’t Copyright and the Digital Millennium Copyright Act. Covers literary, musical, and dramatic works.
38
IP Licensing
Trademarks. covers words, slogans, and logos used to identify a company and its products or services. Patents. Patents protect the intellectual property rights of inventors. Trade Secrets. intellectual property that is absolutely critical to their business and must not be disclosed. Licensing. 4 types you should know are contractual, shrink-wrap, click-through, and cloud services.
39
Encryption and Privacy
Computer Export Controls. US companies can’t export to Cuba, Iran, North Korea, Sudan, and Syria. Encryption Export Controls. regulations on the export of encryption products outside the US. Privacy (US). The basis for privacy rights is in the Fourth Amendment to the U.S. Privacy (EU). General Data Protection Regulation (GDPR) is the most likely to be mentioned
40
U.S. Privacy Laws
HIPAA (Health Insurance Portability and Accountability Act) HITECH (Health Information Technology for Economic and Clinical Health) Gramm-Leach-Bliley Act (financial institutions) Children’s Online Privacy Protection Act (COPPA) Electronic Communications Privacy Act (ECPA) Communications Assistance for Law Enforcement Act (CALEA)
41
Domain 1
Chapter 1 - 4
42
Integrity is dependent on
Confidentiality and access control
43
Availability is dependent on
integrity and confidentiality
44
Protection Mechanisms
Defense in depth Abstraction - used for efficiency. Similar elements are put into groups, classes or roles that are assigned security controls, restrictions, or permissions as a collective. Data Hiding Encryption
45
NIST Risk Management Framework (RMF)
Six phases: CSIAAM Categorize select implement assess authorize monitor Categorize Select Implement Assess Authorize Monitor
46
Elements of AAA
Identification Authentication Authorization Auditing Accountability
47
COBIT
Control Objectives for Information and Related Technology (COBIT) - security concept infrastructure used to organize the complex security solutions of companies.
48
UBA and UEBA
User behavior analytics User and entity behavior analytics -Concept of analyzing the behavior or users, subjects, visitors, customers, etc for a specific goal or purpose.
49
RMM
Risk maturity model | is a means to assess the key indicators and activities of a mature, sustainable, and repeatable risk management process.
50
BCP
Business Continuity Plan - 4 steps Project scope and planning Business impact analysis Continuity Planning Approval and implementation
51
BIA
Business Impact Analysis Identifies the business processes and tasks that are critical to an organization's ongoing viability and the threats posed to those resources.
52
MTO | MTD
Maximum tolerable outage | Maximum tolerable downtime | The maximum length of time a business function can tolerate a disruption before suffering irreparable harm.
53
RTO
Recovery time objective (RTO) for each business function is the amount of time in which you think you can feasibly recover the function in the event of a disruption.
54
RPO
Recovery point objective data loss equivalent to the time-focused
55
Business impact analysis process
``` Five stages Identification priorities Risk identification Likelihood assessment Impact analysis Resource prioritization ```
56
ITAR
International Traffic in Arms Regulations -controls the export of items that are specifically designated as military and defense items, including the technical information related to those items.
57
EAR
Export Administration Regulations Cover a broader set of items that are designed for commercial use by may have military applications.
58
Canadian privacy law
PIPEDA Personal Information Protection and Electronic Documents Act
59
Credit card payment PCI DSS
12 main requirements