test1 Flashcards
3 components of security education
Policy - what to do
Training - skills for doing it
Awareness - changes behavior
BPA, MOU/A, ISA
Business Partership Agreement: good for addressing ownership, profit & loss, clearly lays out who makes what decision, who owns what part of company
Memorandum of Understanding/Agreement: when two organizations connect their networks together, who owns what info, who is responsible for what actions, who has liabilities for particular exposures
Interconnection Security Agreement: typically part of MOU, involves who is allowed to keep info if partners separate. dictates technical security requirements associated with two organizations connecting networks
CIA Triad vs DAD
CIA: Confidentiality (preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary data), Integrity (guarding against improper data modification, includes ensuring information non-repudiation and authenticity), Availability (ensuring timely and reliable access to and use of information)
DAD (logical opposite of CIA): Disclosure, Alteration, Destruction
Controls are implemented across what three levels? Give examples for each
Administrative (aka directive): background checks, policies/procedures
Technical: encryption, smart cards
Physical: locks, securing laptops/magnetic media, protection of cable
Criminal vs Civil
Criminal: possible to get jail time, burden of proof is beyond a reasonable doubt (99.9%)
Civil: tip of scale (50.1%)
CVSS
Common Vulnerability Scoring System
Draw chart of 5 types of documentation
refer to “Types of Documentation - Drawing 1B”
Draw the qualitative RA matrix
Qualitative Risk Analysis Matrix helps identify most significant risks to organization
Likelihood on left vertical, Impact top horizontal (high med low)
Refer to “Qualitative RA Matrix - Domain 1 pg 67”
Due Care vs Due Diligence
Due Care: minimal customary practice aka the “Prudent Man Rule”; are you doing what a reasonable organization would do when implementing security
If you trip and fall on property with steak knives sticking up from the ground you could sue for due care since Eric didn’t do what a normal person would do
Due Diligence: maintaining proper environment
If someone else did it and Eric was aware but didn’t change or alter it, then someone could sue Eric for Due Diligence
Excessive risk
means above acceptable level of risk for executive / data owner; excessive does NOT mean a lot of risk
Fork bomb
attack that says while 1=1 (which is always the case) keep forking out (starting new process) until all memory is used and system crashes
Formula for Risk
risk = threat x vulnerability
threat drives calculation, vulnerability reduces the risk
threat: potential for harm, can be internal/external/competitor/govt (hurricanes, snowstorms, viruses, worms)
vulnerability: weakness (unpatched system, default install)
Fraggle
variation of smurf involving spoofed UDP datagrams sent to UDP port 7
IAAA
Identification: means by which users claim their identities to a system
Authentication: establishes, tests or reconciles a user’s identity
Authorization: rights/permissions granted to an individual (or process) that enable access to a computer
Accountability: system’s ability to determine actions of single individual within a system, shows that a particular individual performed a particular action e.g. audit trails and logs
LAND attack
creates recursive loop which crashes system e.g. from 192.168.1.1 to 192.168.1.1 on 8080
List all quantitative formulas
SLE (Single Loss Expectancy) = EF (exposure factor) x AV (asset value)
ARO (Annualized Rate of Occurrence)
ALE (Annualized Loss Expectancy) = SLE x ARO
TCO (Total Cost of Ownership)
ROI (Return on Investment)
Cost/Benefit Analysis
List all types of controls and examples of each
Preventative: locks on doors, firewalls
Detective: goes off during attack (alarm systems, IDS), means preventative failed
Corrective: short-term fix to prevent future attacks (police guards, evacuation)
Compensating: alternative control (one-way firewall in hospital if MRI system could never be connected to network but doctors need info from it)
Recovery: long-term fix
Suppressive: where you detect and respond to deal with a problem
Name a directive control that is a strategic user-focused document?
Policy
Name and define the 5 types of documentation
- Policy - high level statement of what to do, should be specific, measurable, achievable e.g. All servers must be properly hardened by patching and turning off services
- Procedure - details of how to do it e.g. the security configuration must be applied when a system is built
- Standard - specifies a certain way something should be done or a certain brand/type of equipment to be used e.g. Admins must use Windows Server 2012 R2 as the base operating system
- Baseline - more specific implementation of a standard, specific technical details of how a system’s hardware/software should be configured; usually a baseline starts off as a guideline until it has been properly modified to meet the needs of org; e.g. The specific settings for Win Server 2012 R2 should match those in the CIS Security Benchmark
- Guideline (optional) - recommended way of doing something; best practice might start off as a guideline and if analysis shows there is great benefit, it may become a standard (mandatory) e.g. to ease the config, local GPOs can be used to roll out the changes
Name different types of DoS attacks
DoS attacks:
- Crafted Packets
- Ping of Death
- LAND attack
- Tear drop
- Flooding
- Syn flood
- Smurf
- Fraggle
DDoS - compromising multiple machines to attack the victim
-Fork bomb
OCTAVE
Operationally Critical Threat, Asset and Vulnerability Evaluation
password guessing vs password cracking
Guessing (online, where you try to guess at website login prompt but subject to account lockout)
Cracking (offline, no account lockout but need raw encrypted passwords)
PCI DSS
Payment Card Industry Data Security Standard - aka dirty dozen (12 requirements), know in general the 12 goals (don’t need to know order):
Install/maintain firewalls, no vendor default passwords/parameters, protect stored data, encrypt transmission of data across public network, use/update antivirus, develop/maintain secure systems and applications, restrict access to cardholder data by business need to know, authenticate access to system components, restrict physical access to cardholder data, track and monitor all access to network resources to cardholder data, regularly test security systems/processes, maintain a policy that addresses information security for all personnel
Ping of Death
buffer overflow attack, if you send ping packet larger than the largest size you can