Uploaded by PSSg Cristina Joy Vicente Cruz

Quick notes IN CYBERsecurity

advertisement
What are the three generally accepted service models of cloud computing?
A. Infrastructure as a Service (IaaS), Disaster Recovery as a Service (DRaaS), and Platform
as a Service (PaaS)
B. Platform as a Service (PaaS), Security as a Service (SECaaS), and Infrastructure as a
Service (IaaS)
C. Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service
(IaaS)
D. Desktop as a Service (DaaS), Platform as a Service (PaaS), and Infrastructure as a Service
(IaaS)
Platform as a Service (PaaS)
A way for customers to rent hardware, operating systems, storage, and network capacity over the
Internet from a cloud service provider.
The cloud computing concept of providing a computing platform and software solution stack a
virtual or cloud-based service. Essentially, it is the concept of paying for a service that provides
all the aspects of a platform (i. e. , operating system and complete solution package).
Cloud OS
A phrase frequently used in place of Platform as a Service (PaaS) to denote an association to
cloud computing.
Infrastructure as a service (IaaS)
Computer infrastructure, typically computer, storage and networking services, being delivered as
a service. IaaS is popular in the data center where software and servers are purchased as a fully
outsourced service and usually billed on usage and how much of the resource is used.
Infrastructure A cloud computing concept that can provide not just on-demand operating
as a Service solutions but complete outsourcing of IT infrastructure.
(IaaS)
Apache CloudStack
An open-source cloud computing and infrastructure as a service (IaaS) platform developed to
help make creating, deploying, and managing cloud services easier by providing a complete
"stack" of features and components for cloud environments.
Eucalyptus
An open source cloud computing and Infrastructure as a Service (IaaS) platform for enabling
private clouds.
Software as a Service (SaaS)
A distributed model where software applications are hosted by a vendor or cloud service
provider and made available to customers over network resources.
Software as a service (SaaS)
A software delivery method that provides access to software and its functions remotely as a webbased service. SaaS allows organizations to access business functionality at a cost typically less
than paying for licensed applications since SaaS pricing is based on a monthly fee.
Software as a A cloud computing concept that provides on-demand online access to specific
Service
software applications or suites without the need for local installation.
(SaaS)
Cloud computing accounting software
Accounting software that is hosted on remote servers. It provides accounting capabilities to
businesses in a fashion similar to the software as a service (SaaS) business model. Data is sent
into the cloud, where it is processed and returned to the user.
Identity as a A third-party service that provides identity and access management. IDaaS
Service or
effectively provides SSO for the cloud and is especially useful when internal
Identity and clients access cloud-based Software as a Service (SaaS) applications.
Access as a
Service
(IDaaS)
Here are my quick notes on CISSP Chapter 1 Security and Risk Management. :
1. CIA Triad — C: Confidentiality I: Integrity A: Availability
2. The first priority of Information security: To support the mission of the organization
3. Judgment based on risk tolerance, cost, and benefit
4. Role of a security professional is that of a risk advisor and not a decision-maker
5. Planning horizon: Strategic>Tactical>Operational goals
6. Confidentiality: Prevent unauthorized disclosure
7. Threats against confidentiality: Social Engineering, Media Reuse, Eavesdropping
8. Integrity: Detect modification of information
9. Availability: Provide timely access to resources
10. Best practices to protect the CIA triad: Separation of Duties (SoD), Mandatory vacation, Job
rotation, Least privilege, Need to know, Dual control
11. Defense in depth: aka layered defense
12. Three main types of controls: Technical (logical), Administrative and Physical
13. Risk — Find cost-effective solution, reduce risk to an acceptable level (rarely can we
eliminate risk)
14. Safeguards are proactive, countermeasures are reactive.
15. Assets: Anything of value to the company; Vulnerability: A weakness — absence of a
safeguard; Threat: Something that could pose loss to all or part of an asset; Threat agent: The one
who carries out the attack; Risk: The probability of the threat materializing; Controls: Technical
(logical), administrative or physical protections — safeguards or countermeasures
16. Hardening of a system: To reduce vulnerabilities in a system
17. Risk Management is a process of identifying, analyzing, assessing, mitigating or transferring
risk. The main goal is to reduce the impact of a risk
18. Risk Assessment (Identify and evaluate assets; identify vulnerabilities and threats); Risk
Analysis (qualitative and quantitative); Risk Mitigation (Reduce, transfer or accept/reject risk);
Risk Monitoring
19. Risk assessment: Identification and valuation of assets is the first step in risk assessment
20. Risk analysis: Determining a value for a risk; Risk value = Probability * Impact (in $)
21. Qualitative analysis is subjective and judgment based (probability and impact matrix);
Quantitative analysis is objective and numbers-driven
22. Business decisions are usually made based on quantitative analysis
23. Quantitative analysis: AV (Asset Value), EF (Exposure Factor), ARO (Annual Rate of
Occurrence)
24. Single Loss Expectancy (SLE) = AV * EF
25. Annual Loss Expectancy (ALE) = ARO * SLE
26. Cost of control should be the same or less than the potential of loss
27. Security governance is the set of responsibilities and practices exercised by the board and
executive management with the goal of providing strategic direction, ensuring that objectives are
achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s
resources are used responsibly.
28. Security blueprints(e.g. COBIT, COSO, ITIL, etc.) are used for reaching security governance
29. COBIT: Control Objectives for Information and related Technology; COSO: Committee Of
Sponsoring Organizations
30. ITIL: Information Technology Infrastructure Library — De facto standard for best practices
for IT Service Management
31. OCTAVE: Operationally Critical Threat, Asset and Vulnerability Evaluation
32. Plan (Establish ISMS) > Do (Implement and operate the ISMS) > Check (Monitor and
review ISMS) > Act (Maintain and improve ISMS)
33. Senior Management (CEO, CIO, CISO) is ultimately responsible for security within an
organization
34. Due Diligence: Continuously monitoring an organization’s practices to ensure they are
meeting/exceeding the security requirements
35. Due Care: Ensuring that best practices are implemented and followed. Following up due
diligence with action
36. Prudent man rule: Acting responsibly and cautiously like a prudent man
37. Best Practices: Organizations are aligned with the favored practices within an organization
38. An organizational security policy is mandatory — its a high level statement from the
management
39. Issue specific policy (functional policy) — Stance on employee issues, AUP (Acceptable Use
Policy), Email, Privacy etc.
40. System specific policy — Approved software lists, use of firewalls, IDS, scanners etc.
41. Drivers — Laws, regulations and best practices
42. Management’s Security Statement — Contains program or Organizational policy
43. Management’s security directives — Functional (Issue and System specific) policies
44. Standards — Are mandatory, created to support policy, while providing more specifics. It
reinforces policy and provides direction, can be internal or external
45. Procedures — Are mandatory, they give step by step directives on how to accomplish an end
result. Procedures details the how-to of meeting the policy, standards and guidelines
46. Guidelines — are not mandatory and are suggestive in nature. They are recommended
actions and guides to users. “Best practices”
47. Baselines — are mandatory. Baselines are minimum acceptable security configurations for a
system or a process
48. Steering committee: Defines risks, objectives and approaches
49. Data owners: classify data; Data Custodian: Day to day maintenance of data
50. ISO’s responsibilities include:

Providing C-I-A for all information assets

Communication of risk to senior management

Recommend best practices to influence policies, standards, procedures and
guidelines
51. Due care: setting a policy; due diligence: enforcing that policy
52. Legal liability is a legally recognized obligation — A standard exists that outlines the
conduct expected of a company to protect others from unreasonable risks
53. Proximate causation: fault can actually be proven to be a direct result of one’s action or
inaction
54. Types of laws: Criminal, Civil, Regulatory and Intellectual Property
55. Felonies: More serious; Misdemeanours: Less serious of the two
56. Liability, Due Care, Due Diligence, Prudent Person Rule are all pertinent to Civil law as well
as Administrative law
57. Administrative law: Defines standards of performance and regulates conducts for specific
industry like banking, energy and health care
58. Intellectual Property law: to protect products of the mind
59. What is a trade secret? Must provide competitive value, must be protected from unauthorized
use or disclosure, should be proprietary to a company and important for survival
60. Copyright: Copyright protection lasts for the lifetime of the author plus 70 years or 75 years
for corporations; work does not need to be published or registered to be protected. Protects the
expression of the resource instead of the resource itself
61. Trademark — protects from stealing another company’s look and feel which includes word,
name, symbol, sound, shape, color or combination
62. Patents — valid for 17–20 years, provides protection to those who have legal ownership of
an invention. Patent is the strongest form of protection of an invention
63. Forms of attack on intellectual property:

Piracy

Copyright infringement

Counterfeiting: Imitating fraudulently

Cybersquatting: The practice of registering names, specially well known companies
as internet domains, in the hope of selling them at a profit

Typosquatting: target users who incorrectly type an address (like Gooogle.com vs
Google.com)
64. In many countries, the import of cryptographic tools with strong encryption requires a copy
of the private keys to be handed over to law enforcement
65. REP: Reasonable Expectation of Privacy — Get an employee waiver by signature on policies
etc.
66. HIPAA: Health Insurance Portability and Accountability Act — It applies to health insurers
and health providers, health care clearinghouses (claim processing agencies)
67. HIPAA covered entities must disclose security breaches regarding personal information
68. GLBA — Gramm Leach Bliley Financial Services Modernization Act — This act requires
financial agencies to better protect customer’s PII
69. PCI DSS — Payment Card Industry Data Security Standard — PCI DSS is not a legal
mandate. Payment card industry self regulates its own security standards. It applies to any
business worldwide that transmits, processes or stores payment card transactions to conduct
business with customers. PCI DSS compliance is enforced by the payment card vendor (Visa,
Mastercard etc.)
70. Six core principles of PCI DSS:

Build and maintain a secure network

Protect cardholder data

Maintain a vulnerability management program.

Implement strong access control measures

Regularly monitor and test the networks

Maintain an information security policy
71. Many states have passed disclosure laws that legally require organizations to publicly
disclose security breaches that might compromise personal data. It allows individuals to take
corrective actions. It also serves as an additional motivation for organizations to protect customer
data.
72. Auditing is the objective evaluation of controls and policies to ensure that they are being
implemented and are effective.
73. Internal auditors should not report to the head of the business unit, but rather to legal or
human resources, someone who doesn’t have a direct stake in results
74. People are often the weakest link is securing information. The goal of knowledge transfer is
to modify employee behavior
75. Business Continuity Planning (BCP): Focuses on sustaining operations and protecting the
viability of the business following a disaster, until normal business conditions can be restored.
BCP includes DRP. BCP is long term focused.
76. Disaster Recovery Planning: The goal is to minimize the effects of a disaster and to take the
necessary steps to ensure that the resources, personnel, and business processes are able to resume
operations in a timely manner. DRP deals with the immediate aftermath of the disaster. DRP is
IT and short term focused.
77. A contingency plan is focused on residual risks.
78. Potential risks > Risk assessment > Identified risks > Security controls > Residual risks >
Contingency plan
79. Order of priorities for a company:

Life safety is the number 1 priority.

Reputation is the second most important asset of an organization.
80. Categories of disruptions include non-disaster, emergency/crisis, disaster, catastrophe
81. Anyone can declare an emergency but only the BCP coordinator can declare a disaster.
82. BCP sub-plan includes: Protect, Recover and Sustain.
83. BCP addresses all business processes, not just mission-critical.
84. Protect: Crisis communications plan and Occupant Emergency Plan
85. Recover: Business Recovery Plan (BRP), Disaster Recovery Plan (DRP), IT Contingency
Plan and Cyber Incident Response Plan
86. Sustain: Continuity of Response Plan (COOP)
87. Senior Executive Management provides consistent support and final approval of plans,
setting the business continuity policies, prioritizing business-critical functions, allocation of
sufficient resources and personnel, providing oversight and approving the BCP, directing and
reviewing test results and ensuring the maintenance of the current plan
88. Senior functional management: Develop and document maintenance and strategy, identify
business-critical systems, monitor the progress of plan development and execution, ensure
periodic tests and create the various teams necessary to execute the plans
89. BCP Steering Committee: Conducts BIA (Business Impact Assessment), it coordinates with
department reps and develops analysis group
90. There are 3 main BCP teams: Rescue, Recovery, and Salvage.
91. 7 Phases of a Business Continuity Plan:

Project initiation

Business Impact Analysis

Recovery Strategy

Plan design and develop

Implementation

Testing

Maintenance
92. Business Impact Analysis: Identifies and prioritizes all business processes based on
criticality.
93. BIA focuses on criticality (downtime) vs importance (relevance). Eg. Auditing department is
important but not critical.
94. Recovery Point Objective (RPO) vs Recovery Time Objective (RTO)
95. Results from Business Impact Analysis (BIA) contains all business processes and assets and
not just those considered critical.
96. BIA results are used to create recovery plans.
97. When preventive controls don’t work, recovery strategies are necessary.
98. There are 4 types of recoveries: Facility, Hardware and Software, Personnel and Data
recovery.
99. Technology recovery is dependent on good configuration management documentation.
100. Personnel recovery: Identify essential personnel, entire staff is not always necessary to
move into recovery operations.
101. Eliminate single points of failure in staffing and ensure backups are properly trained.
102. Database backups:

Disk shadowing: Mirroring technology — updating one or more copies of data at the
same time. Data saved to two media types for redundancy.

Electronic vaulting: a copy of the modified file is sent to a remote location where an
original backup is stored.

Remote Journaling: Moves the journal or transaction log to a remote location, not
the actual files.
103. The copies of the Business Continuity Plan should be kept in multiple locations. Both
electronic and paper copies should be kept.
104. BCP should be distributed to only those who need to know. Most employees will only see a
small portion of the plan.
105. Implementation: 3 phases following a disruption:

Notification/Activation: Notifying the recovery personnel and performing a damage
assessment

Recovery phase/failover: actions taken by the recovery teams to restore IT
operations at an alternate site or using contingency capabilities

Reconstitution/failback: Actions taken to return the system to normal operating
conditions — performed by salvage team.
106. BCP testing should happen once a year or as a result of a major change — the purpose of
testing is to improve the response and never to find a fault. Testing happens before the
implementation of a plan to ensure the effectiveness and accuracy of the plan.
107. Types of tests:

Checklist test: Copies of plan distributed to different departments which is reviewed
by functional managers

Structured walkthrough/tabletop test: representatives from each department go over
the plan

Simulation test: Going through a disaster scenario, continues up to the actual
relocation to an offsite facility

Parallel test: Systems moved to an alternate site, and processing takes place there

Full-Interruption test: Original site shut down, all of the processing moved to the
offsite facility
108. IAAA: Identification, Authentication, Authorization, and Accountability
Download