Domain 1 -- Security and Risk Management Flashcards
(89 cards)
What are the ways to achieve Availability?
- RAID disks
- Clustering
- Load Balancing
- Redundant Data and Power lines
- Software and data backups
- Disk shadowing
- Co-location and off-site facilities
- Rollback functions
- Failover configurations
What are the ways to achieve Integrity?
- Hashing (data integrity)
- Configuration management (system integrity)
- Change Control (process integrity)
- Access Control (Physical and technical)
- Software digital signing
- Transmission Cyclic Redundancy Check (CRC Functions)
What are ways to achieve Confidentiality?
- Encryption for data at rest (whole disk or DB encryption)
- Encryption for data in transit (IPSec, TLS, PPTP, SSH)
- Access Control (physical and technical)
Definition of Vulnerability
A vulnerability is a weakness in a system that allows a threat source to compromise its security
What is a threat?
A threat is any potential danger that is associated with the exploitation of a vulnerability.
The entity that takes advantage of a vulnerability is a threat agent
What is a risk?
A risk is a likelihood of a thread source exploiting a vulnerabilty.
What is an exposure?
An exposure is an instance of being exposed to losses.
A vulnerability exposes an organization to possible losses
What is a control?
A control is a countermeasure put in place to mitigate (reduce) the potential risk
Note: Control, Countermeasure and safeguard are interchangeable terms
What is the relationship between Vulnerabilities, threats, risks, exposures and controls?
See Image
What are the three types of Controls?
- Administrative
- Technical
- Physical
Give Examples of Physical Controls
- Fence
- Locked external doors
- CCTV
- Security Guard
- Locked internal doors
- Locked server room
- Physically secured computers (cable locks)
What are examples of Technical Controls?
- Firewalls
- Intrusion Detection Systems
- Intrusion Prevention systems
- Antimalware
- Access control
- Encryption
What are examples of administrative controls?
- Security Documentation
- Risk Management
- Personnel security
- Training
What are the six different control functionalities?
- Preventive
- Detective
- Corrective
- Deterrent
- Recovery
- Compensating
Give examples of Administrative Preventive Contols
- Policies and procedures
- Effective hiring practices
- Pre-employment background checks
- Controlled termination processes
- Data Classification and labeling
- Security awareness
Give examples of Physical Preventive Controls
- Badges and swipe cards
- Guards, dogs
- Fences, locks, mantraps
Give examples of Techical Preventive Controls
- Passwords, biometrics, smart cards
- Encryption, secure protocols, call-back systems, database views, constrained user interfaces
- Antimalware software, access control lists firewalls, intrusion prevention systems
Is Security through Obscurity a good idea or a bad idea?
Bad idea
What is a framework for developing a Security Program?
ISO/IEC 27000 Series
Examples:
- ISO / IEC 27014 Information Security Governance
- ISO / IEC 27031 Business Continuity
- ISO / IEC 27035 Incident Management
- ETC.
What are Standards for Enterprise Architecture Development?
- Zachman Framework
- TOGAF - The Open Group Arch Framework
- DoDAF - Dept of Defense Arch Framework
- MODAF - Arch frameword developed by British Ministry of Defence
- SABSA Model - Model and methodology for the Dev of Security enterprise architectures
What are the Security Controls Development Frameworks?
- COBIT 5 - Developed by the Information Systems Audit and Control Association (ISACA)
- NIST SP 800-53 – Set of controls developed by NIST to protect Federal Systems
- COSO Internal Control - Integrated Framework. Developed by the Committee of Sponsoring Organizations (COSO) of the Treadway Commision
What are the three key Process Management Development Frameworks?
- ITIL - IT Service Management (started in UK)
- Six Sigma
- CMMI - Capability Maturity Model Integration (developed by Carnegie Mellon)
What are the key things to remember about the Zachman Framework?
- Interogatives / Perspectives
- What / How / Where / Who / When / Why
- Top to bottom Executives to Technicians
What are the key things to remember about TOGAF
Used to develop
- Business Architecture
- Data Architecture
- Application architecture
- Technology architecture
- Architecture Development Model