Uploaded by Jeremy Galvan

cc

advertisement
CC Chapter 1
Lecture notes
Welcome to the First Chapter.
➢ Domain 1: What we will be covering.

This chapter is VERY important because:
▪ Every other knowledge domain build on top of this chapter.
▪ This is the foundation.

We will cover:
▪ The differences between Information security, IT Security, and Cybersecurity.
▪ The CIA triad and IAAA.
▪ Privacy.
▪ Risk and incident management.
▪ Access control.
▪ Governance, management, laws, and regulations.
▪ The ISC2 ethics.
 Information Security, IT Security, and Cybersecurity:



Information Security is all our information:
▪ Paper documents, voice information, data, the knowledge people have, …
IT Security is all our hard/software, and data:
▪ Computers, servers, networks, hardware, software, firmware, and data being
processed, stored, and communicated.
Cybersecurity is everything from IT Security that is accessible from the internet.
 The CIA Triad: Confidentiality, Integrity and Availability:

This is the foundation of IT/IS security.
▪ Confidentiality

This is what most people think IT Security is.

We keep our data and secrets secret.

We ensure no one unauthorized can access
the data.
▪ Integrity

How we protect against modifications of the
data and the systems.

We ensure the data has not been altered.
▪ Availability

We ensure authorized people can access the data they need when they
need to.

Confidentiality, Integrity, and Availability.
▪ We use:

Encryption for data at rest (for instance AES256), full disk encryption.

Secure transport encryption protocols for data in motion. (SSL, TLS or
IPSEC).
1|Page
https://thorteaches.com/
CC Chapter 1
Lecture notes

▪
Best practices for data in use - clean desk, no shoulder surfing, screen
view angle protector, PC locking (automatic and when leaving).

Strong passwords, multi-factor authentication, masking, access control,
need-to-know, least privilege.
Threats:

Attacks on your encryption (cryptanalysis).

Social engineering.

Key loggers (software/hardware), cameras, steganography.

IOT (Internet of Things) – The growing number of connected devices we
have pose a new threat, they can be a backdoor to other systems.

Confidentiality, Integrity, and Availability.
▪ We use:

Cryptography (again).

Check sums (This could be CRC).

Message Digests also known as a hash (This could be MD5, SHA1 or
SHA2).

Digital Signatures – non-repudiation.

Access control.
▪ Threats:

Alterations of our data.

Code injections.

Attacks on your encryption (cryptanalysis).

Confidentiality, Integrity, and Availability.
▪ We use:

IPS/IDS.

Patch Management.

Redundancy on hardware power (Multiple power
supplies/UPS’s/generators), Disks (RAID), Traffic paths (Network
design), HVAC, staff, HA (high availability) and much
more.

SLA’s – How much uptime do we want (99.9%?) –
(ROI)
▪

Threats:

Malicious attacks (DDOS, physical, system
compromise, staff).

Application failures (errors in the code).

Component failure (Hardware).
Disclosure, Alteration, and Destruction
▪ The opposite of the CIA Triad is DAD.

Disclosure – Someone not authorized
getting access to your information.

Alteration – Your data has been changed.
2|Page
https://thorteaches.com/
CC Chapter 1


Lecture notes
Destruction – Your data or systems have been destroyed or rendered
inaccessible.
IAAA (Identification and Authentication, Authorization and Accountability):


Identification
▪ Your name, username, ID number, employee number, SSN etc.
▪ “I am Thor”.
Authentication
▪ “Prove you are Thor”. – Should always be done with multi-factor
authentication!

Something you know - Type 1 Authentication (passwords, pass phrase,
PIN, etc.).

Something you have - Type 2 Authentication (ID, passport, smart card,
token, cookie on PC, etc.).

Something you are - Type 3 Authentication (and Biometrics)
(Fingerprint, iris scan, facial geometry, etc.).
▪
Something you know - Type 1 Authentication:
⬧ Passwords, pass phrase, PIN etc., also called Knowledge factors.
⬧ The subject uses these to authenticate their identity, if they know the
secret, they must be who they say they are.
⬧ This is the most commonly used form of authentication, and a password
is the most common knowledge factor.
⬧ The user is required to prove knowledge of a secret in order to
authenticate.
⬧ Variations include both longer ones formed from multiple words (a
passphrase) and the shorter purely numeric PINs (personal
identification number) commonly used for cash machines (ATM’s).
⬧ It is the weakest form of authentication and can easily be compromised.
⬧ Secret questions like "Where were you born?" are poor examples of a
knowledge factor, it is known by a lot of people and can often be
researched easily.
▫ Sarah Palin had her email account hacked during the 2008 US
Presidential campaign using her secret questions. Since she
used basic ones (high school and birthday, …) the hackers could
easily find that information online, he reset her password with
the information and gained full control of her email account.
⬧
Passwords:
▫ It is always easier to guess or steal passwords than it is to break
the encryption.
▫ We have password policies to ensure they are as secure as
possible.
3|Page
https://thorteaches.com/
CC Chapter 1
▫
▫
▫
▫
▫
▫
⬧
Lecture notes
→ They should contain minimum length, upper/lower case
letters, numbers, and symbols, they should not contain
full words or other easy to guess phrases.
→ They have an expiration date, password reuse policy
and minimum use before users can change it again.
→ Common and less secure passwords often contain:
• The name of a pet, child, family member,
significant other, anniversary dates, birthdays,
birthplace, favorite holiday, something related
to a favorite sports team, or the word
"password".
• Winter2023 is not a good password, even if it
does fulfil the password requirements.
Key Stretching – Adding 1-2 seconds to password verification.
If an attacker is brute forcing a password and needs millions of
tries it will become an unfeasible attack.
Brute Force Attacks (Limit number of wrong logins):
Uses the entire key space (every possible key), with enough
time any ciphertext can be decrypted.
Effective against all key based ciphers except the one-time pad,
it would eventually decrypt it, but it would also generate so
many false positives the data would be useless.
Clipping Levels: Clipping levels are in place to prevent
administrative overhead.
→ It allows authorized users who forget or mistype their
password to still have a couple of extra tries.
→ It prevents password guessing by locking the user
account for a certain timeframe (an hour), or until
unlocked by an administrator.
Password Management:
▫ We covered some password requirements, here are the official
recommendations by the U.S. Department of Defense and
Microsoft.
→ Password history = set to remember 24 passwords.
→ Maximum password age = 90 days.
→ Minimum password age = 2 days (to prevent users from
cycling through 24 passwords to return to their favorite
password again).
→ Minimum password length = 14 characters.
→ Passwords must meet complexity requirements = true.
→ Store password using reversible encryption = false.
4|Page
https://thorteaches.com/
CC Chapter 1
▪
Lecture notes
Something you have - Type 2 Authentication:
⬧ ID, passport, smart card, token, cookie on PC, these are called
Possession factors.
▫ The subject uses these to authenticate their identity, if they
have the item, they must be who they say they are.
▫ Simple forms can be credit cards, you have the card, and you
know the pin, that is multifactor authentication.
▫ Most also assume a shared trust, you have your passport, it
looks like you on the picture, we trust the issuer, so we assume
the passport is real.
⬧ Single-Use Passwords:
▫ Having passwords which are only valid once makes many
potential attacks ineffective, just like one-time pads.
▫ While they are passwords, it is something you have in your
possession, not something you know.
▫ Some are one-time-pads with a challenge-response or just a pin
or phase sent to your phone or email you need to enter to
confirm the transaction or the login.
▫ Most users find single use passwords extremely inconvenient.
⬧ They are widely implemented in online banking, where they are known
as TANs (Transaction Authentication Numbers).
▫ Most private users only do a few transactions each week, the
single-use passwords has not led to customers refusing to use
it.
→ It is their money; they actually care about keeping those
safe.
⬧ Smart Cards and Tokens (contact or contactless):
▫ They contain a computer circuit using an ICC (Integrated Circuit
Chip).
▫ Contact Cards - Inserted into a machine to be read.
→ This can be credit cards you insert into the chip reader
or the DOD CAC (Common Access Card).
▫ Contactless Cards - can be read by proximity.
→ Key fobs or credit cards where you just hold it close to a
reader.
→ They use a RFID (Radio Frequency Identification) tag
(transponder) which is then read by a RFID Transceiver.
5|Page
https://thorteaches.com/
CC Chapter 1
▫
⬧
▪
▪
Lecture notes
Magnetic Stripe Cards:
→ Swiped through a reader, no circuit.
→ Very easy to duplicate.
Tokens:
▫ HOTP and TOTP can be either hardware or software based.
▫ Cellphone software applications are more common now.
→ HOTP (HMAC-based One-Time Password):
• Shared secret and incremental counter,
generate code when asked, valid till used.
→ TOTP (Time-based One-Time Password):
• Time based with shared secret, often generated
every 30 or 60 seconds, synchronized clocks are
critical.
Something you are - Type 3 Authentication (Biometrics):
⬧ Fingerprint, iris scan, facial geometry etc., these are also called realistic
authentication.
▫ The subject uses these to authenticate
their identity, if they are that, they must
be who they say they are.
▫ Something that is unique to you, this one
comes with more issues than the two
other common authentication factors.
▫ We can allow unauthorized people into
our facilities or systems if we accept
someone by mistake. (False Accept)
▫ We can prevent our authorized people
from entering our facilities if we refuse
them by mistake. (False Reject).
Errors for Biometric Authentication:
⬧ FRR (False rejection rate)
Type 1 error:
▫ Authorized users are
rejected.
▫ This can be too high
settings - 99%
accuracy on
biometrics.
6|Page
https://thorteaches.com/
CC Chapter 1
⬧
⬧
Lecture notes
FAR (False accept rate) Type 2 error:
▫ Unauthorized user is granted access.
▫ This is a very serious error.
We want a good mix of FRR and FAR where they meet on the graph is
the CER (Crossover Error Rate), this is where we want to be.
▪
Biometric identifiers are often categorized as physiological and behavioral
characteristics.
⬧ Physiological Characteristics uses the shape of the body, these do not
change unless a drastic event occurs.
▫ Fingerprint, palm veins, facial recognition, DNA, palm print,
hand geometry, iris recognition, retina, and odor.
⬧ Behavioral Characteristics uses the pattern of behavior of a person,
these can change, but most often revert back to the baseline.
▫ Typing rhythm, how you walk, signature and voice.
▪
Issues with Biometric Authentication:
⬧ We also need to respect and protect our employee’s privacy:
▫ Some fingerprint patterns are related to chromosomal diseases.
▫ Iris patterns could reveal genetic sex, retina scans can show if a
person is pregnant or diabetic.
⬧ Hand vein patterns could reveal vascular diseases.
⬧ Most behavioral biometrics could reveal neurological diseases, etc.
⬧ While passwords and smart cards should be safe because you keep
them a secret and secure, biometrics is inherently not and something
others can easily find out.
⬧ Attackers can take pictures of your face, your fingerprints, your hands,
your ears and print good enough copies to get past a biometric scan.
⬧ It is possible to copy fingerprints from your high-resolution social media
posts if you do a peace sign like the one on the right here.
⬧ How you type, sign your name and your voice pattern can be recorded,
also not too difficult to cheat biometrics if it is worth the effort.
⬧ Some types are still inherently more secure, but they are often also
more invasive.
⬧ Lost passwords and ID cards can be replaced with new different ones,
biometrics can’t.
⬧ Which should make us question even more the mass collection of
biometric data.
▫ When Home Depot loses 10 million credit card numbers it is
bad, but they can be reissued.
▫ The US Office of Personnel Management got hacked and lost 5.6
million federal employees’ fingerprints.
7|Page
https://thorteaches.com/
CC Chapter 1
▫
▫

Lecture notes
The FBI has a database with 52 million facial images and
Homeland Security and U.S. Customs and Border Patrol is
working on adding the iris scans and 170 million foreigner
fingerprints to the FBI’s database.
The compromises of the future will have much more widereaching ramifications than the ones we have seen until now.
Authorization
▪ What are you allowed to access?
▪ We use Access Control models. What and
how we implement depends on the
organization and what our security goals
are.
▪ More on this in later when we cover DAC,
MAC, RBAC, ABAC, and RUBAC.
▪
Least Privilege and Need to Know.

Least Privilege – (Minimum necessary access) Give users/systems
exactly the access they need, no more, no less.

Need to Know – Even if you have access, if you do not need to know,
then you should not access the data.
▪
DAC (Discretionary Access Control) - Often used when Availability is most
important:
⬧ Access to an object is assigned at the discretion of the object owner.
⬧ The owner can add, remove rights, commonly used by most OS's’.
⬧ Uses DACL’s (Discretionary ACL), based on user identity.
▪
MAC (Mandatory Access Control) - Often used when Confidentiality is most
important:
⬧ Access to an object is determined by labels and clearance, this is often
used in the military or in organizations where confidentiality is very
important.
⬧ Labels: Objects have Labels assigned to them; the subject's clearance
must dominate the object's label.
▫ The label is used to allow Subjects with the right clearance
access them.
▫ Labels are often more granular than just “Top Secret”, they can
be “Top Secret – Nuclear”.
8|Page
https://thorteaches.com/
CC Chapter 1
⬧
▪
Clearance: Subjects have Clearance assigned to them.
▫ Based on a formal decision on a subject's current and future
trustworthiness.
▫ The higher the clearance the more in depth the background
checks should be.
RBAC (Role-Based Access Control) - Often used when Integrity is most
important:
⬧ Policy neutral access control mechanism defined around roles and
privileges.
⬧
⬧
⬧
⬧
▪
Lecture notes
A role is assigned permissions, and subjects in that role are added to the
group, if they move to another position they are moved to the
permissions group for that position.
It makes administration of 1,000's of users and 10,000's of permissions
much easier to manage.
The most commonly used form of access control.
If implemented right, it can also enforce separation of duties and
prevent authorization/privilege creep.
▫ We move employees
transferring within the
organization from one role to
another and we do not just
add the new role to the old
one.
ABAC (Attribute-Based Access Control):
⬧ Access to objects is granted based on
subjects, objects, AND environmental
conditions.
⬧ Attributes could be:
9|Page
https://thorteaches.com/
CC Chapter 1
⬧
⬧
▪
▪
•
Lecture notes
▫ Subject (user) – Name, role, ID, clearance, etc.
▫ Object (resource) – Name, owner, and date of creation.
▫ Environment – Location and/or time of access, and threat levels.
Expected to be used by 70% of large enterprises within the next 5 years,
versus around 25% today.
Can also be referred to as policy-based access control (PBAC) or claimsbased access control (CBAC).
Context-Based Access Control:
⬧ Access to an object is controlled based on certain contextual
parameters, such as location, time, sequence of responses, access
history.
⬧ Providing the username and password combination followed by a
challenge and response mechanism such as CAPTCHA, filtering the
access based on MAC addresses on wireless, or a firewall filtering the
data based on packet analysis are all examples of context-dependent
access control mechanisms.
Content-Based Access Control:
⬧ Access is provided based on the attributes or content of an object, then
it is known as a content-dependent access control.
⬧ In this type of control, the value and attributes of the content that is
being accessed determine the control requirements.
⬧ Hiding or showing menus in an application, views in databases, and
access to confidential information are all content-dependent.
Accountability (often referred to as Auditing):
▪ Traces an Action to a Subject's Identity:
⬧ Proves who performed given action, it
provides non-repudiation.
⬧ Group or shared accounts are never OK,
they have zero accountability.
⬧ Uses audit trails and logs, to associate a
subject with its actions.
▪
▪
Non-repudiation.

A user cannot deny having performed a
certain action. This uses both
Authentication and Integrity.
Subject and Object.

Subject – (Active) Most often users but
can also be programs – Subject
manipulates Object.
10 | P a g e
https://thorteaches.com/
CC Chapter 1


Lecture notes
Object – (Passive) Any passive data (both physical paper and data) –
Object is manipulated by Subject.
Some can be both at different times, an active program is a subject;
when closed, the data in program can be object.
 Privacy:
•
Privacy is a human right.
▪ A definition of Privacy:
1. The state or condition of being free from being observed or disturbed by
other people.
2.
Freedom from unauthorized intrusion.
•
You as a citizen and consumer have the right that your Personally Identifiable
Information (PII) is being kept securely.
US privacy regulation is a patchwork of laws, some overlapping and some areas with no
real protection.
EU Law – Strict protection on what is gathered, how it is used and stored.
•
•

Risk Management:

•
•
•
•

Risk Management - Identification:
Risk = Threat * Vulnerability (or likelihood).
We can also use Risk = Threat * Vulnerability *
Impact.
Total Risk = Threat * Vulnerability * Asset Value.
Residual Risk = Total Risk – Countermeasures.
Threat – A potentially harmful incident.
Vulnerability – A weakness that can allow the Threat to do
harm.
Due Diligence: Doing the research before implementation.
DD – Do Detect
Due Care: It is the implementation. DC - Do Correct
The Risk Management lifecycle is iterative.
Identify our Risk Management team.
▪ What is in and what is out of scope?
▪ Which methods are we using?
▪ Which tools are we using?
▪ What are the acceptable risk levels, which type of risk appetite do we have in
our enterprise?
▪ Identify our assets.

Tangible: Physical hardware, buildings, anything you can touch.

Intangible: Data, trade secrets, reputation, etc.
11 | P a g e
https://thorteaches.com/
CC Chapter 1
Lecture notes

Risk Assessment.
▪ Quantitative and Qualitative Risk
Analysis.
▪ Uncertainty analysis.
▪ Everything is done using cost-benefit
analysis.
▪ Risk Mitigation/Risk Transference/Risk
Acceptance/Risk Avoidance.
▪ Risk Rejection is NEVER acceptable.
▪ We assess the current countermeasures.

Are they good enough?

Do we need to improve on them?

Do we need to implement
entirely new countermeasures?

Qualitative vs. Quantitative Risk Analysis.
▪ For any Risk analysis we need to identify our assets. What are we protecting?
▪ Qualitative Risk Analysis – How likely is it to happen and how bad is it if it
happens?
▪ Quantitative Risk Analysis – What will it actually cost us in $? This is fact-based
analysis, Total $ value of asset, math is involved.

Qualitative Risk Analysis with the Risk
Analysis Matrix.
Let’s pick an asset, a laptop.
▪ How likely is one to get stolen or
left somewhere?
I would think possible or likely.
▪ How bad is it if it happens?
That really depends on a couple of things:

Is it encrypted?
Where the L, M, H, E is for your organization can be different from this.

Does it contain classified or
L = Low, M = Medium, H = High, E = Extreme Risk
PII/PHI content?
▪
Let’s say it is likely and a minor issue, that puts the loss the high-risk category.
▪ It is normal to move high and extreme on the quantitative risk analysis. If
mitigation is implemented, we can maybe move the risk level to “Low” or
“Medium”.

▪
▪
▪
A risk category to group similar risks.
The risk breakdown structure identification number.
A brief description or name of the risk to make the risk easy to discuss.
12 | P a g e
https://thorteaches.com/
CC Chapter 1
▪
▪
▪
▪

Lecture notes
The impact (or consequence) if event actually
occurs rated on an integer scale.
The probability or likelihood of
its occurrence rated
on an integer scale.
The Risk Score (or Risk Rating)
is the multiplication
of Probability and Impact, and
is often used to rank
the risks.
Common mitigation steps (e.g.
within IT projects)

Identify

Analyze

Plan Response

Monitor

Control
Quantitative Risk Analysis
▪ This is where we put a number on our assets and risks.
▪ We find the asset’s value: How much of it is compromised, how much one
incident will cost, how often the incident occurs and how much that is per year.

Asset Value (AV) – How much is the asset worth?

Exposure factor (EF) – Percentage of Asset lost?

Single Loss Expectancy (SLE) = (AV x EF) – What does it cost if it happens
once?

Annual Rate of Occurrence (ARO) – How often will this happen each
year?

Annualized Loss Expectancy (ALE) – This is what it costs per year if we
do nothing.

Total Cost of Ownership (TCO) – The mitigation cost: upfront + ongoing
cost (Normally Operational
Let’s look at a few examples.
• Asset Value (AV) = The Laptop ($1,000) + PII ($10,000) per loss.
• Exposure factor (EF) = It is a 100% loss, it is gone.
• Single Loss Expectancy (SLE) = (AV x EF) = Loss per laptop is $11,000 x 100%.
• Annual Rate of Occurrence (ARO) = The organization loses 25 Laptops Per Year.
• Annualized Loss Expectancy (ALE) = The annualized loss is $275,000
• Total Cost of Ownership (TCO) = $100,000

Types of risk responses:
▪ Accept the Risk – We know the risk is there, but the mitigation is more costly
than the cost of the risk (Low risks).
13 | P a g e
https://thorteaches.com/
CC Chapter 1
▪
▪
▪
▪
▪




Lecture notes
Mitigate the Risk (Reduction) – The laptop encryption/wipe is an example –
acceptable level (Leftover risk = Residual).
Transfer the Risk – The insurance risk approach.
Risk Avoidance – We don’t issue employees laptops (if possible) or we build the
data center in an area that doesn’t flood.
Risk Rejection – You know the risk is there, but you are ignoring it. This is never
acceptable. (You are liable).
Secondary Risk – Mitigating one risk may open up another risk.
KGI (Key Goal Indicator):
▪ Define measures that tell management, after the fact—whether an IT process
has achieved its business requirements.
KPI (Key Performance Indicators):
▪ Define measures that determine how well the IT process is performing in
enabling the goal to be reached.
KRI (Key Risk Indicators):
▪ Metrics that demonstrate the risks that an organization is facing or how risky an
activity is.
▪ They are the mainstay of measuring adherence to and establishing enterprise
risk appetite.
▪ Key risk indicators are metrics used by
organizations to provide an early signal of
increasing risk exposures in various areas of the
enterprise.
▪ KRI give an early warning to identify potential
event that may harm continuity of the
activity/project.
Risk Response and Mitigation
▪ Risk mitigation, transference, acceptance, or
avoidance.
▪ We act on senior management choices, which
they made based on our recommendations
from the assessment phase.
▪ Do we stop issuing laptops, or do we add full-disk encryption and remote wipe
capabilities?
▪ Update the risk register, with the mitigations, and the risk responses.
14 | P a g e
https://thorteaches.com/
CC Chapter 1

Lecture notes
Risk and Control Monitoring and Reporting
▪ The process is ongoing, we have to keep
monitoring both the risk and the controls we
implemented.
▪ This is where we could use the KRIs (Key Risk
Indicators)
▪ We would also use KPIs (Key Performance
Indicators)
▪ It is normal to do the Risk Management
lifecycle on an annual basis and do out-ofcycle Risk Management on critical items.
 Access Control Categories and Types:
•
Access Control Categories:
▪ Administrative (Directive) Controls:
⬧ Organizational policies and procedures.
⬧ Regulation.
⬧ Training and awareness.
▪ Technical (Logical) Controls:
⬧ Hardware/software/firmware – Firewalls, routers, encryption.
▪ Physical Controls:
⬧ Locks, fences, guards, dogs, gates, bollards.
•
Access Control Types:
▪ Access Control Types (Many can be multiple types – On the exam look at
question content to see which type it is).
⬧ Preventative:
▫ Prevents action from happening – Least privilege, drug tests,
IPS, firewalls, encryption.
⬧ Detective:
▫ Controls that Detect during or after an attack – IDS, CCTV,
alarms, anti-virus.
⬧ Corrective:
▫ Controls that Correct an attack – Anti-virus, patches, IPS.
⬧ Recovery:
▫ Controls that help us Recover after an attack – DR Environment,
backups, HA Environments.
⬧ Deterrent:
▫ Controls that Deter an attack – Fences, security guards, dogs,
lights, Beware of the dog signs.
⬧ Compensating:
▫ Controls that Compensate – When other controls are impossible
or too costly to implement.
15 | P a g e
https://thorteaches.com/
CC Chapter 1

Lecture notes
The Ethics of your organization and (ISC)2:

ISC² Code of Ethics
▪ You agree to this before the exam, and the code of ethics is very testable.
▪ Understand the preamble and the 4 ethics canons, but they should not be a
substitute for the ethical judgment of the professional.
▪ Code of Ethics Preamble:

The safety and welfare of society and the common good, duty to our
principles, and to each other, requires that we adhere, and be seen to
adhere, to the highest ethical standards of behavior.

Therefore, strict adherence to this code is a condition of certification.
▪ Code of Ethics Canons:

Protect society, the common good, necessary public trust and
confidence, and the infrastructure.

Act honorably, honestly, justly, responsibly, and legally.

Provide diligent and competent service to principles.

Advance and protect the profession.
▪ Computer Ethics Institute:

Thou shalt not use a computer to harm other people.

Thou shalt not interfere with other people’s computer work.

Thou shalt not snoop around in other people’s computer files.

Thou shalt not use a computer to steal.

Thou shalt not use a computer to bear false witness.

Thou shalt not copy or use proprietary software for which you have not
paid.

Thou shalt not use other people's’ computer resources without
authorization or proper compensation.

Thou shalt not appropriate other people's’ intellectual output.

Thou shalt think about the social consequences of the program you are
writing or the system you are designing.

Thou shalt always use a computer in ways that ensure consideration
and respect for your fellow humans.

Your Organization’s Ethics:
▪ You need to know the Internal Code of Ethics of your organization
▪ If you don’t, how can you adhere to it?
16 | P a g e
https://thorteaches.com/
CC Chapter 1
Lecture notes
 Governance vs. Management:
▪

Governance – This is C-level Executives.

Stakeholder’s needs, conditions and options are evaluated to define:
 Balanced agreed-upon enterprise objectives to be achieved.
 Setting direction through
prioritization and
decision making.
 Monitoring
performance and
compliance against
agreed-upon
direction and
objectives.
 Risk appetite –
Aggressive, neutral,
adverse.
▪ Management – How do we get to the destination.

Plans, builds, runs, and monitors activities in alignment with the
direction set by the governance to achieve the objectives.

Risk tolerance – How are we going to practically work with our risk
appetite and our environment.
C-Level Executives (Senior
Leadership) – Ultimately Liable.
▪ CEO: Chief Executive
Officer.
▪ CIO: Chief Information
Officer.
▪ CTO: Chief Technology
Officer.
▪ CSO: Chief Security
Officer.
▪ CISO: Chief Information
Security Officer.
▪ CFO: Chief Financial
Officer.
▪ Normal organizations
obviously have more CLevel executives, the
ones listed here you need to know.
17 | P a g e
https://thorteaches.com/
CC Chapter 1

Lecture notes
Laws and Regulations:

There are a handful types of laws covered on the exam and important to your job as an
IT Security Professional.
▪ Criminal Law:

“Society” is the victim and proof must be “Beyond a reasonable doubt”.

Incarceration, death, and financial fines to “Punish and deter”.
▪ Civil Law (Tort Law):

Individuals, groups or organizations are the victims and proof must be
”The majority of proof”.

Financial fines to “Compensate the victim(s)”.
▪ Administrative Law (Regulatory Law):

Laws enacted by government agencies (FDA Laws, HIPAA, FAA Laws,
etc.)
▪ Private Regulations:

Compliance is required by contract (For instance PCI-DSS).
▪ Customary Law:

Mostly handles personal conduct and patterns of behavior and it is
founded in traditions and customs of the area or region.
▪ Religious Law:

Based on the religious beliefs in that area or country, they often include
a code of ethics and moralities which are required to be upheld.

Rules, Regulations and Laws:
▪ HIPAA: Health Insurance Portability and Accountability Act.

Strict privacy and security rules on handling of PHI (Protected Health
Information).
▪ Security Breach Notification Laws.

NOT Federal, all 50 states have individual laws, know your state.
▪ Electronic Communications Privacy Act (ECPA):

Protection of electronic communications against warrantless
wiretapping.

The Act was weakened by the Patriot Act.
▪ PATRIOT Act of 2001:

Expands law enforcement electronic monitoring capabilities.

Allows search and seizure without immediate disclosure.
▪ Computer Fraud and Abuse Act (CFAA) – Title 18 Section 1030:

Most commonly used law to prosecute computer crimes.
▪ Payment Card Industry Data Security Standard (PCI-DSS)

Technically not a law, created by the payment card industry.

The standard applies to cardholder data for both credit and debit cards.

Requires merchants and others to meet a minimum set of security
requirements.

Mandates security policy, devices, control techniques, and monitoring.

NOT Federal, all 50 states have individual laws, know your state.
18 | P a g e
https://thorteaches.com/
CC Chapter 1

GDPR
▪
▪
▪
▪
▪
▪
▪
▪
▪
▪
▪

Lecture notes
GDPR is a regulation in EU law on data protection and privacy for all individuals
within the European Union (EU) and the European Economic Area (EEA).
It does not matter where we are based, if we have customers in EU/EEA we
have to adhere to the GDPR.
Violators of the GDPR may be fined up to €20 million or up to 4% of the annual
worldwide turnover of the preceding financial year in case of an enterprise,
whichever is greater.
Restrictions: Lawful Interception, national security, military, police, justice
system
Right to access: Data controllers must be able to provide a free copy of an
individual’s data if requested.
Personal data: Covers a variety of data types including: Names, Email
Addresses, Addresses, Unsubscribe confirmation URLs that contain email and/or
names, IP Addresses.
Right to erasure: All users have a “right to be forgotten”.
Data portability: All users will be able to request access to their data “in an
electronic format”.
Data breach notification: Users and data controllers must be notified of data
breaches within 72 hours.
Privacy by design: When designing data processes, care must be taken to
ensure personal data is secure. Companies must ensure that only data is
“absolutely necessary for the completion of duties”.
Data protection officers: Companies whose activities involve data processing
and monitoring must appoint a data protection officer.
Information Security Governance: Values, vision, mission, and
plans:

Security governance principles.
▪ Values:

What are our values? Ethics, Principles,
Beliefs.
▪ Vision:

What do we aspire to be? Hope and
Ambition.
▪ Mission:

Who do we do it for? Motivation
and Purpose.
▪ Strategic Objectives:

How are we going to progress?
Plans, goals,
and sequencing.
19 | P a g e
https://thorteaches.com/
CC Chapter 1
Lecture notes
▪
Action & KPIs:

What do we need to do and how do we know when we achieved it?
Actions, Recourses, Outcomes, Owners, and Timeframes.
▪
Policies – Mandatory.

High level, non-specific.

They can contain “Patches, updates, strong
encryption”

They will not be specific to “OS, encryption
type, vendor Technology”
Standards – Mandatory.

Describes a specific use of technology (All
laptops are W10, 64bit, 8gig memory,
etc.)
Guidelines – non-Mandatory.

Recommendations, discretionary –
Suggestions on how you would do it.
Procedures – Mandatory.

Low level step-by-step guides,
specific.

They will contain “OS,
encryption type, vendor
Technology”
▪
▪
▪
20 | P a g e
https://thorteaches.com/
CC Chapter 1
Lecture notes
➢ Domain 1: What we covered.

This chapter is VERY important because:
▪ Every other knowledge domain build on top of this chapter
▪ This is the foundation.

We talked about:
▪ The differences between Information Security, IT Security, and Cybersecurity.
▪ The CIA triad and IAAA.
▪ Privacy.
▪ Risk and incident management.
▪ Access control.
▪ The (ISC)² ethics.
▪ Governance, management, laws, and regulations.
21 | P a g e
https://thorteaches.com/
CC Chapter 2
Lecture notes
Welcome to the Second Chapter.
➢ Domain 2: What we will be covering.




BCP (Business Continuity Plan):
▪ The overarching plan, with many subplans.
▪ This is the process of creating the long-term strategic business plans, policies,
and procedures for continued operation after a disruptive event.
DRP (Disaster Recovery Plan):
▪ Focused on our IT systems.
▪ How do we recover fast enough in a disaster scenario.
▪ DRP has a lifecycle of Mitigation, Preparation, Response and Recovery.
Incident Management:
▪ How we monitor and detect security events on our systems, and how we react
in those events.
BCP - Business Continuity Plan:

Business Continuity Plan (BCP)
▪ This is the process of creating the long-term strategic business plans, policies,
and procedures for continued operation after a disruptive event.
▪ It is for the entire organization, everything that could be impacted, not just IT.
▪ Lists a range of disaster scenarios and the steps the organization must take in
any particular scenario to return to regular operations.
▪ BCPs often contain COOP (Continuity of
Operations Plan), Crisis Communications Plan,
Critical Infrastructure Protection Plan, Cyber
Incident Response Plan, DRP (Disaster Recovery
Plan), ISCP (Information System Contingency
Plan), Occupant Emergency Plan.
▪ We look at what we would do if a critical supplier
closed, the facility was hit by an earthquake,
what if we were snowed in and staff couldn't get
to work, ...
▪ They are written ahead of time, and continually
improved upon, it is an iterative process.
▪ We write the BCP with input from key staff and at
times outside BCP consultants.
1|Page
https://thorteaches.com/
CC Chapter 2
Lecture notes


Senior management needs to be involved and committed to the BCP/DRP process.
They need to be part of at least the initiation and the final approval of the plans.
▪ They are responsible for the plan, they own the plan and since they are
ultimately liable, they must show due-care and due-diligence.
▪ We need top-down IT security in our organization (the exam assumed we have
that).
▪ In serious disasters, it will be Senior Management or someone from our legal
department who should talk to the press.
▪ Most business areas often feel they are the most important area and because of
that their systems and facilities should receive the priority, senior management
being ultimately liable and the leaders of our organization, obviously have the
final say in priorities, implementations, and the plans themselves.
•
Related Plans:
▪ Our BCP being the overarching plan also contains our other plans, including but
not limited to:
▪ COOP (Continuity of Operations Plan):
⬧ How we keep operating in a disaster, how do we get staff to alternate
sites, what are all the operational things we need to ensure we function
even if at reduced capacity for up to 30 days.
▪ Crisis Communications Plan:
⬧ A subplan of the CMP.
⬧ How we communicate internally and externally during a disaster.
⬧ Who is permitted to talk to the press? Who is allowed to communicate
what to whom internally?
▪ Cyber Incident Response Plan:
⬧ How we respond in cyber events, can be part of the DRP or not. This
could be DDOS, worms, viruses,...
▪ OEP (Occupant Emergency Plan):
⬧ How do we protect our facilities, our staff and the environment in a
disaster event.
⬧ This could be fires, hurricanes, floods, criminal attacks, terrorism,...
⬧ Focuses on safety and evacuation, details how we evacuate, how often
we do the drills and the training staff should get.
▪ BRP (Business Recovery Plan):
⬧ Lists the steps we need to take to restore normal business operations
after recovering from a disruptive event.
⬧ This could be switching operations from an alternate site back to a
(repaired) primary site.
▪ Continuity of Support Plan:
⬧ Focuses narrowly on support of specific IT systems and applications.
⬧ Also called the IT Contingency Plan, emphasizing IT over general
business support.
2|Page
https://thorteaches.com/
CC Chapter 2
▪
•
•
•
•
•
•
•
•
•
Lecture notes
CMP (The Crisis Management Plan):
⬧ Gives us effective
coordination among
the management of
the organization in
the event of an
emergency or
disruptive event.
⬧ Details what steps
management must
take to ensure that
life and safety of
personnel and
property are
immediately
protected in case of
a disaster.
Older versions of NIST 800-34 had these steps as a framework for building our BCP/DRP.
Project Initiation: We start the project, identify stakeholders, get C-level approval and
formalize the project structure.
Scope the Project: We identify exactly what we are trying to do and what we are not.
Business Impact Analysis: We identify and prioritize critical systems and components.
Identify Preventive Controls: We identify the current and possible preventative controls
we can deploy.
Recovery Strategy: How do we recover efficiently? What are our options? DR site,
system restore, cloud,...
Plan Design and Development: We build a specific plan for recovery from a disaster,
procedures, guidelines and tools.
Implementation, Training, and Testing: We test the plan to find gaps and we train staff
to be able to act on the plan.
BCP/DRP Maintenance: It is an iterative process. Our organization develops, adds
systems, facilities or technologies and the threat landscape constantly changes, we have
to keep improving and tweaking our BCP and DRP.
3|Page
https://thorteaches.com/
CC Chapter 2

Lecture notes
•
We categorize disasters in 3 categories: Natural, Human, or Environmental.
▪ Natural:
⬧ Anything caused by nature, this could be earthquakes, floods, snow,
tornados, ...
⬧ They can be very devastating but are less common than the other types
of threats.
⬧ The natural disaster threats are different in different areas, we do the
risk analysis on our area.
⬧ For one site we could build our buildings and data center earthquake
resilient and another flood resilient.
▪ Human:
⬧ Anything caused by humans, they can be intentional or unintentional
disasters.
⬧ Unintentional could be an employee uses a personal USB stick on a PC
at work and spreads malware, just as bad as if an attacker had done it,
but the employee was just ignorant, lazy or didn't think it would matter.
⬧ Intentional could be malware, terrorism, DOS attacks, hacktivism,
phishing, ...
▪ Environmental (Not to be confused with natural disasters):
⬧ Anything in our environment, could be power outage/spikes, hardware
failures, provider issues, ...
•
The plans need to be continually updated; it is an iterative process.
▪ Plans should be reviewed and updated at least every 12 months.
▪ We changed major components of our systems (new backup solution, new IP
scheme,…).
▪ We had a disaster, and we had a lot of gaps in our plans.
▪ A significant part of senior leadership has changed.
DRP – Disaster Recovery Plan:
•
Our DRP (Disaster Recovery Plan) should answer at least three basic questions:
▪ What is the objective and purpose?
▪ Who will be the people or teams who will be responsible in case any disruptions
happen?
▪ What will these people do (our procedures) when the disaster hits?
•
DRP has a lifecycle of Mitigation, Preparation, Response and Recovery.
▪ Mitigation: Reduce the impact, and likeliness of a disaster.
▪ Preparation: Build programs, procedures and tools for our response.
4|Page
https://thorteaches.com/
CC Chapter 2
•
•
•
In our recovery process we have to consider the many factors that can impact us, we
need look at our options if our suppliers, contractors or the infrastructure are impacted
as well.
We may be able to get our data center up and running in 12 hours, but if we have no
outside connectivity that may not matter.
Simulated Tests:
▪ DRP Review:
⬧ Team members who are part of the DRP team review the plan quickly
looking for glaring omissions, gaps or missing sections in the plan.
▪ Read-Through (Checklist):
⬧ Managers and functional areas go through the plan and check a list of
components needed for in the recovery process.
▪ Walk/Talk-through (Tabletop or Structured Walkthrough):
⬧ A group of managers and critical personnel sit down and talk through
the recovery process.
⬧ Can often expose gaps, omissions or just technical inaccuracies that
would prevent the recovery.
▪
•
Lecture notes
Simulation Test (Walkthrough Drill):
⬧ Similar to the walkthrough (but different, do not confuse them).
⬧ The team simulates a disaster and the teams respond with their pieces
from the DRP.
Physical Tests:
▪ Partial Interruption:
⬧ We interrupt a single application and fail it over to our secondary
facilities, often done off hours.
5|Page
https://thorteaches.com/
CC Chapter 2
Lecture notes
•
We have looked at the first 2 before, for now we will focus on Response and Recovery.
▪ Response: How we react in a disaster, following the procedures.
⬧ How we respond and how quickly we respond is essential in Disaster
Recovery.
⬧ We assess if the incident we were alerted to or discovered is serious and
could be a disaster, the assessment is an iterative process.
⬧ The more we learn and as the team gets involved we can assess the
disaster better.
⬧ We notify appropriate staff to help with the incident (often a call tree or
automated calls), inform the senior management identified in our plans
and if indicated by the plan communicate with any other appropriate
staff.
▪ Recovery: Reestablish basic functionality and get back to full production.
⬧ We act on our assessment using the plan.
⬧ At this point all key stakeholders should be involved, we have a clearer
picture of the disaster and take the appropriate steps to recover. This
could be DR site, system rebuilds, traffic redirects,…
•
BIA (Business Impact Analysis):
▪ Identifies critical and non-critical organization systems, functions, and activities.
▪ Critical is where disruption is considered unacceptable, the acceptability is also
based on the cost of recovery.
▪ A function may also be considered critical if dictated by law.
▪ For each critical (in scope) system, function, or activity, two values are then
assigned:
▪ RPO (Recovery Point Objective): The acceptable amount of data that can not
be recovered.
⬧ The recovery point objective must ensure that the maximum tolerable
data loss for each system, function or activity is not exceeded.
⬧ If we only back up once a week, we accept up to a week of data loss.
▪ MTD (Maximum Tolerable Downtime) MTD ≥ RTO + WRT:
⬧ The time to rebuild the system and configure it for reinsertion into
production must be less than or equal to our MTD.
⬧ The total time a system can be inoperable before our organization is
severely impacted.
⬧ Remember companies that had a major loss of data, 43% never reopen
and 29% close within two years.
⬧ Other frameworks may use other terms for MTD, but for the exam know
and use MTD.
⬧ MAD (Maximum Allowable Downtime), MTO (Maximum Tolerable
Outage), MAO (Maximum Acceptable Outage), MTPoD (Maximum
Tolerable Period of Disruption).
▪ RTO (Recovery Time Objective): The amount of time to restore the system
(hardware).
6|Page
https://thorteaches.com/
CC Chapter 2
Lecture notes
⬧
▪
▪
▪
▪
•
The recovery time objective must ensure that the MTD for each system,
function or activity is not exceeded.
WRT (Work Recovery Time) (software):
⬧ How much time is required to configure a recovered system.
MTBF (Mean Time Between Failures):
⬧ How long a new or repaired system or component will function on
average before failing, this can help us plan for spares and give us an
idea of how often we can expect hardware to fail.
MTTR (Mean Time to Repair):
⬧ How long it will take to recover a failed system.
MOR (Minimum Operating Requirements):
⬧ The minimum environmental and connectivity requirements for our
critical systems to function, can also at times have minimum system
requirements for DR sites.
⬧ We may not need a fully spec'd system to resume the business
functionality.
Recovery Strategies:
▪ From our MTD we can determine our approach to how we handle disasters and
the safeguards we put in place to mitigate or recover from them.
▪ Redundant Site:
⬧ Complete identical site to our production, receives a real time copy of
our data.
⬧ Power, HVAC, Raised floors, generators,…
⬧ If our main site is down the redundant site will automatically have all
traffic fail over to the redundant site.
⬧ The redundant site should be geographically distant, and have staff at it.
⬧ By far the most expensive recovery option, end users will never notice
the fail over.
▪ Hot Site:
⬧ Similar to the redundant site, but only houses critical applications and
systems, often on lower spec’d systems.
⬧ Still often a smaller but a full data center, with redundant UPS’s,
HVAC’s, ISP’s, generators,…
⬧ We may have to manually fail traffic over, but a full switch can take an
hour or less.
⬧ Near or real-time copies of data.
▪ Warm Site:
⬧ Similar to the hot site, but not with real or near-real time data, often
restored with backups.
⬧ A smaller but full data center, with redundant UPS’s, HVAC’s, ISP’s,
generators,…
⬧ We manually fail traffic over, a full switch and restore can take 4-24+
hrs.
7|Page
https://thorteaches.com/
CC Chapter 2
▪
▪
▪
Lecture notes
Cold Site:
⬧ A smaller but full data center, with redundant UPSs’, HVAC’s, ISP’s,
generators,…
⬧ No hardware or backups are at the cold site, they require systems to be
acquired, configured and applications loaded and configured.
⬧ This is by far the cheapest, but also longest recovery option, can be
weeks+.
Reciprocal Agreement Site:
⬧ Your organization has a contract with another organization that they
will give you space in their data center in a disaster event and vice
versa.
⬧ This can be promised space or some racks with hardware completely
segmented off the network there.
Subscription/Cloud Site:
⬧ We pay someone else to have a minimal or full replica of our production
environment up and running within a certain number of hours (SLA).
⬧ They have fully built systems with our applications and receive backups
of our data, if we are completely down we contact them and they spin
the systems up and apply the latest backups.
⬧ How fast and how much is determined by our plans and how much we
want to pay for this type of insurance.
▪
•
•
Mobile Site:
⬧ Basically a data center on wheels, often a container or trailer that can
be moved wherever by a truck.
⬧ Has HVAC, fire suppression, physical security, (generator),… everything
you need in a full data center.
⬧ Some are independent with generator and satellite internet, others
need power and internet hookups.
Once we have had and recovered from a disruption or we have done our failover test
we do a lessons learned.
Lessons Learned:
▪ This phase is often overlooked, we removed the problem, we have
implemented new controls and safeguards.
▪ We can learn a lot from lessons learned, not just about the specific incidence,
but how well we handle them, what worked, what didn't.
8|Page
https://thorteaches.com/
CC Chapter 2
Lecture notes
▪
•
•
•
•
•
What happened and didn’t happen is less important than how we improve for
next time.
▪ We do not place blame, the purpose is improving.
▪ How can we as an organization grow and become better next time we have
another incidence? While we may have fixed this one vulnerability there are
potentially 100's of new ones we know nothing about yet.
The outcome and changes of the Lessons Learned will then feed into our preparation
and improvement of our BCP and DRP.
We only use our BCP/DRP's when our other countermeasures have failed.
This makes the plans even more important. (Remember 72% of business with major
data loss closed).
When we make and maintain the plans there are some common pitfalls we want to
avoid:
▪ Lack of senior leadership support
▪ Too narrow scope
▪ Not keeping the BCP/DRP plans up to date, or no proper versioning controls
The plans needs to be continually updated, it is an iterative process.
▪ Plans should be reviewed and updated at least every 12 months.
▪ When we update the plans older copies are retrieved and destroyed, and
current versions are distributed.
 Incident Management:
•
Incident Management:
▪ Involves the monitoring and detection of security events on our systems, and
how we react in those events.
▪ It is an administrative function of managing and protecting computer assets,
networks, and information systems.
▪ The primary purpose is to have a well understood and predictable response to
events and computer intrusions.
▪ We have very clear processes and responses, and our teams are trained in them
and know what to when an event occurs.
▪ Incidents are very stressful situations, it is important staff knows exactly what to
do, that they have received ongoing training and understand the procedures.
•
We categorize disasters in 3 categories: Natural, Human, or Environmental.
▪ Natural:
⬧ Anything caused by nature, this could be earthquakes, floods, snow,
tornados, ...
⬧ They can be very devastating, but are less common than the other types
of threats.
⬧ The natural disaster threats are different in different areas, we do the
risk analysis on our area.
9|Page
https://thorteaches.com/
CC Chapter 2
Lecture notes
⬧
▪
▪
•
For one site we could build our buildings and data center earthquake
resilient and another flood resilient.
Human:
⬧ Anything caused by humans, they can be intentional or unintentional
disasters.
⬧ Unintentional could be an employee uses a personal USB stick on a PC
at work and spreads malware, just as bad as if an attacker had done it,
but the employee were just ignorant, lazy or didn't think it would
matter.
⬧ Intentional could be malware, terrorism, DOS attacks, hacktivism,
phishing, ...
Environmental (Not to be confused with natural disasters):
⬧ Anything in our environment, could be power outage/spikes, hardware
failures, provider issues, ...
Incident Management:
▪ Event:
⬧ An observable change in state, this is neither negative nor positive, it is
just something has changed.
⬧ A system powered on, traffic from one segment to another, an
application started.
▪ Alert:
⬧ Triggers warnings if certain event happens.
⬧ This can be traffic utilization above 75% or memory usage at 90% or
more for more than 2 minutes.
▪ Incident:
⬧ Multiple adverse events happening on our systems or network, often
caused by people.
▪ Problem:
⬧ Incidence with an unknown cause, we would follow similar steps to
incidence response.
⬧ More time would be spent on root cause analysis, we need to know
what happened so we can prevent it from happening again, this could
be a total internet outage or server crash.
▪ Inconvenience (Non-disasters):
⬧ Non-disruptive failures, hard disk failure, 1 server in a cluster is down,…
▪ Emergency (Crisis):
⬧ Urgent, event with the potential for loss of life or property.
▪ Disaster:
⬧ Our entire facility is unusable for 24 hours or longer.
⬧ If we are geographically diverse and redundant we can mitigate this a
lot.
⬧ Yes, a snowstorm can be a disaster.
▪ Catastrophe:
⬧ Our facility is destroyed
10 | P a g e
https://thorteaches.com/
CC Chapter 2
•
•
•
Lecture notes
NIST 800-61 - IR lifecycle (ALL NIST publications are free)
▪ https://thorteaches.com/study/ -> Scroll down to free stuff.
CIRT (Cyber Incident Response Team):
▪ Senior management
▪ Incident manager
▪ Technical leads and teams.
▪ IT Security.
▪ PR, HR, and legal.
▪ Auditors IT/financial.
Incident Management:
▪ We most common use a 8-step
lifecycle.
1. Preparation.
2. Detection
3. Response
4. Mitigation
5. Reporting.
6. Recovery.
7. Remediation.
8. Lessons Learned
▪
Preparation:
⬧ This is all the steps we take
to prepare for incidences.
⬧ We write the policies,
procedures, we train our
staff, we procure the detection soft/hardware, we give our incidence
response team the tools they need to respond to an incident.
⬧ The more we train our team, the better they will handle the response,
the faster we recover, the better we preserve the crime scene (if there
is one), the less impactful an incident will be.
▪
Detection:
⬧ Events are analyzed to determine if they might be a security incident.
⬧ If we do not have strong detective capabilities in and around our
systems, we will most likely not realize we have a problem until long
after it has happened.
⬧ The earlier we detect the events, the earlier we can respond, IDS's can
help us detect, where IPS's can help us detect and prevent further
compromise.
⬧ The IDS's and IPS's can help us detect and prevent on a single network
segment, we also need something that can correlate all the information
from the entire network.
11 | P a g e
https://thorteaches.com/
CC Chapter 2
▪
▪
▪
Lecture notes
Response:
⬧ The response phase is when the incident response team begins
interacting with affected systems and attempts to keep further damage
from occurring as a result of the incident.
⬧ This can be taking a system off the network, isolating traffic, powering
off the system, or however our plan dictates to isolate the system to
minimize both the scope and severity of the incident.
⬧ Knowing how to respond, when to follow the policies and procedures to
the letter and when not to, is why we have senior staff handle the
responses.
⬧ We make bit level copies of the systems, as close as possible to the time
of incidence to ensure they are a true representation of the incident.
⬧ IT Security is there to help the business, it may not be the choice of
senior management to disrupt business to contain or analyze, it is
ultimately a decision that is made by them.
⬧ We stop it from spreading, but that is it, we contain the event.
Mitigation:
⬧ We understand the cause of the incident so that the system can be
reliably cleaned and restored to operational status later in the recovery
phase.
⬧ Organizations often remove the most obvious sign of intrusion on a
system or systems, but miss backdoors and other malware installed in
the attack.
⬧ The obvious sign is often left to be found, where the actual payload is
hidden. if that is detected or assumed, we often just rebuild the system
from scratch and restore application files from a known good backup,
but not system files.
⬧ To ensure the backup is good, we need to do root cause analysis, we
need a timeline for the intrusion, when did it start?
⬧ If it is from a known vulnerability we patch. If it's a newly discovered
vulnerability we mitigate it before exposing the newly built system to
the outside again.
⬧ If anything else can be learned about the attack, we can add that to our
posture.
⬧ Once eradication is complete, we start the recovery phase.
Reporting:
⬧ We report throughout the process beginning with the detection, and we
start reporting immediately when we detect malicious activity.
⬧ The reporting has 2 focus areas: technical and non-technical.
⬧ The incident handling teams report the technical details of the incident
as they start the incident handling process, but they also notify
management of serious incidents.
⬧ The procedures and policies will outline when which level of
management needs to be informed and involved, it is commonly
forgotten until later and can be a RPE (Resume Producing Event).
12 | P a g e
https://thorteaches.com/
CC Chapter 2
Lecture notes
⬧
▪
▪
▪
▪
Management will also involve other departments if needed, this could
be legal, PR or whomever has been identified in the policies or
procedures.
Recovery:
⬧ We carefully restore the system or systems to operational status.
⬧ When the system is ready for reinsertion is determined by the business
unit responsible for the system.
⬧ We closely monitor the rebuilt or cleaned system carefully, it is possible
the attackers left backdoors or we did not remove all the infected
sectors.
⬧ Often the system(s) are reinserted off peak hours to minimize the effect
of the system(s) still being infected, or they can be introduced in a
controlled sandbox environment to see if the infection persists.
Remediation:
⬧ The remediation happens during the mitigation phase, where
vulnerabilities on the impacted system or systems are mitigated.
⬧ Remediation continues after mitigation and becomes broader, this can
be patching all systems with the same vulnerability or change how the
organization authenticates.
Lessons Learned:
⬧ This phase is often overlooked, we removed the problem, we have
implemented new controls and safeguards.
⬧ We can learn a lot from lessons learned, not just about the specific
incidence, but how well we handle them, what worked, what didn't.
⬧ How can we as an organization grow and become better next time we
have another incidence? While we may have fixed this one vulnerability
there are potentially 100's of new ones we know nothing about yet.
⬧ At the end of lessons learned we produce a report to senior
management, with our findings, we can only make suggestions, they are
ultimately in charge (and liable).
⬧ Often after major incidents organizations shift to a top-down approach
and will listen more to IT Security.
⬧ The outcome and changes of the Lessons Learned will then feed into
our preparation.
Root-Cause Analysis:
⬧ We attempt to determine the underlying weakness or vulnerability that
allowed the incident to happen.
⬧ If we do not do the root-cause analysis we will most likely face the same
problem again.
⬧ We need to fix the vulnerability on the system(s) that were effected, but
also on any system in the organization that has that particular
vulnerability or set of vulnerabilities.
⬧ We could have a weak password policy and weak encryption, that could
be the root cause of a system compromise, we then would implement
countermeasures to remove the vulnerability.
13 | P a g e
https://thorteaches.com/
CC Chapter 2
⬧
Lecture notes
If we do nothing and just fix the problem, the root of the issue still
persists, that is what we need to fix.
•
BCP (Business Continuity Plan):
▪ This is the process of creating the long-term
strategic business plans, policies and procedures for
continued operation after a disruptive event.
▪ It is for the entire organization, everything that
could be impacted, not just IT.
▪ Lists a range of disaster scenarios and the steps the
organization must take in any particular scenario to
return to regular operations.
▪ BCP’s often contain COOP (Continuity of Operations
Plan), Crisis Communications Plan, Critical
Infrastructure Protection Plan, Cyber Incident
Response Plan, DRP (Disaster Recovery Plan), ISCP
(Information System Contingency Plan), Occupant
Emergency Plan.
▪ What would we do if a critical supplier closed, the
facility was hit by an earthquake, what if we were snowed in and staff couldn't
get to work,...
▪ They are written ahead of time, and continually improved upon, it is an iterative
process.
▪ We write the BCP with input from key staff and at times outside BCP
consultants.
•
DRP (Disaster Recovery Plan):
▪ This is the process of creating the short-term plans, policies, procedures and
tools to enable the recovery or continuation of vital IT systems in a disaster.
▪ It focuses on the IT systems supporting critical business functions, and how we
get those back up after a disaster.
▪ DRP is a subset of our BCP.
▪ We look at what we would do if we get hit with a DDOS attack (can be in the
DRP or in our Cyber Incident Response Plan), a server gets compromised, we
experience a power outage, ...
▪ Often the how and system specific, where the BCP is more what and non-system
specific.
•
We categorize disasters in 3 categories: Natural, Human, or Environmental.
▪ Natural:
⬧ Anything caused by nature, this could be earthquakes, floods, snow,
tornados, ...
⬧ They can be very devastating, but are less common than the other types
of threats.
14 | P a g e
https://thorteaches.com/
CC Chapter 2
Lecture notes
⬧
▪
▪
•
•
•
•
The natural disaster threats are different in different areas, we do the
risk analysis on our area.
⬧ For one site we could build our buildings and data center earthquake
resilient and another flood resilient.
Human:
⬧ Anything caused by humans, they can be intentional or unintentional
disasters.
⬧ Unintentional could be an employee uses a personal USB stick on a PC
at work and spreads malware, just as bad as if an attacker had done it,
but the employee were just ignorant, lazy or didn't think it would
matter.
⬧ Intentional could be malware, terrorism, DOS attacks, hacktivism,
phishing, ...
Environmental (Not to be confused with natural disasters):
⬧ Anything in our environment, could be power outage/spikes, hardware
failures, provider issues, ...
Errors and Omissions (Human):
▪ The most common reason for disruptive events are internal employees, often
called errors and omissions.
▪ They are not intending to harm our organization, but they can inadvertently do
so by making mistakes or not following proper security protocols.
▪ This could be a mistype, leaving a door unlocked to go outside to smoke or
leaving a box of backup tapes somewhere not secure.
▪ They often have a minor impact, but if we have issues where they are deemed
very common or potentially damaging we can build in controls to mitigate them.
▪ We could put a double check in place for the mistype, an alarm on the unlocked
door that sounds after being open for 10 seconds, or very clear procedures and
controls for the transport of backup tapes.
Electrical or Power Problems (Environmental):
▪ Are power outages common in our area?
▪ Do we have proper battery and generator backup to sustain our sites for an
extended period of time?
▪ We want the redundancy of UPS's and generators, they both supply constant
and clean power.
▪ These should always be in place in data centers, but what about our other
buildings?
▪ Power fluctuations can damage hardware.
Heat (Environmental):
▪ Many data centers are kept too cold, the last decades research has shown it is
not needed.
▪ Common temperature levels range from 68–77 °F (20–25 °C) - with an allowable
range 59–90 °F (15–32 °C).
▪ Keeping a Data Center too cold wastes money and raises humidity.
Pressure (Environmental): Keeping positive pressure keeps outside contaminants out.
15 | P a g e
https://thorteaches.com/
CC Chapter 2
•
•
Lecture notes
Humidity (Environmental): Humidity should be kept between 40 and 60% rH (Relative
Humidity).
▪ Low humidity will cause static electricity and high humidity will corrode metals
(electronics).
Warfare, Terrorism and Sabotage (Human):
▪ We still see plenty of conventional conflicts and wars, but there is much more
happening behind the veil of the internet, hacking for causes, countries, religion
and many more reasons.
▪ It makes sense to cripple a country's or region's infrastructure if you want to
invade or just destabilize that area.
▪ This could be for war, trade, influence or many other reasons, everything is so
interconnected we can shut down water, electricity or power from across the
world.
▪ The targets are not always the obvious targets, hospitals, air travel, shipping,
production,... are potential targets.
▪ State, Cause or Religious Hacking (Human):
⬧ Common, we often see the attacks happening 9-5 in that time zone, this
is a day job.
⬧ Approximate 120 countries have been developing ways to use the
internet as a weapon to target financial markets, government computer
systems and utilities.
⬧ Famous attacks: US elections (Russia), Sony websites (N. Korea), Stuxnet
(US/Israel), US Office of Personnel Management (China),…
•
Financially Motivated Attackers (Human):
▪ We are seeing more and more financially motivated attacks, they can be both
highly skilled or not.
▪ The lower skilled ones could be normal phishing attacks, social engineering or
vishing, these are often a numbers game, but only a very small percentage
needs to pay to make it worth the attack.
▪ The ones requiring more skills could be stealing cardholder data, identity theft,
fake anti-malware tools, or corporate espionage,...
▪ Ransomware is a subtype of financially motivated attacks, it will encrypt a
system until a ransom is paid, if not paid the system is unusable, if paid the
attacker may send instructions on how to recover the system.
▪ Attackers just want the payday, they don’t really care from whom.
•
Personnel Shortages (Human/Nature/Environmental):
▪ In our BCP, we also have to ensure that we have redundancy for our personnel
and how we handle cases where we have staff shortages.
▪ If we have 10% of our staff, how impacted is our organization?
▪ This can be caused by natural events (snow, hurricane) but is more commonly
caused by the flu or other viruses.
▪ Pandemics:
16 | P a g e
https://thorteaches.com/
CC Chapter 2
⬧
▪
▪
Lecture notes
Organizations should identify critical staff by position not by name, and
have it on hand for potential epidemics. <Insert your own COVID-19
work experiences here.>
Strikes:
⬧ A work stoppage caused by the mass refusal of employees to work.
⬧ Usually takes place in response to employee grievances.
⬧ How diminished of a workforce can we have to continue to function?
Travel:
⬧ When our employees travel, we need to ensure both they and our data
is safe.
⬧ That may mean avoiding certain locations, limiting what they bring of
hardware and what they can access from the remote location.
⬧ If they need laptops/smartphones, we use encryption, device
monitoring, VPNs, and all other appropriate measures.
➢ Domain 2: What we covered.
•
•
•
BCP (Business Continuity Plan):
▪ The overarching plan, with many subplans.
▪ This is the process of creating the long-term strategic business plans, policies,
and procedures for continued operation after a disruptive event.
DRP (Disaster Recovery Plan):
▪ Focused on our IT systems.
▪ How do we recover fast enough in a disaster scenario.
▪ DRP has a lifecycle of Mitigation, Preparation, Response and Recovery.
Incident Management:
▪ How we monitor and detect security events on our systems, and how we react
in those events.
17 | P a g e
https://thorteaches.com/
CC Chapter 3
Lecture notes
Welcome to the Third Chapter.
➢
Domain 3: What we will be covering.



Physical Controls:
▪ Locks, fences, guards, dogs, gates, bollards, ...
Technical Controls:
▪ Hardware/software/firmware – Firewalls, routers, encryption, ...
Access Control Categories and Types:

Access Control Categories:
▪ Administrative (Directive) Controls:

Organizational policies and procedures.

Regulation.

Training and awareness.
▪ Technical Controls:

Hardware/software/firmware – Firewalls, routers, encryption.
▪ Physical Controls:

Locks, fences, guards, dogs, gates, bollards.

Access Control Types (Many can be multiple types – On the exam look at question
content to see which type it is).
▪ Preventative:

Prevents action from happening – Least privilege, drug tests, IPS,
firewalls, encryption.
▪ Detective:

Controls that Detect during or after an attack – IDS, CCTV, alarms, antivirus.
▪ Corrective:

Controls that Correct an attack – Anti-virus, patches, IPS.
▪ Recovery:

Controls that help us Recover after an attack – DR Environment,
backups, HA Environments.
▪ Deterrent:

Controls that Deter an attack – Fences, security guards, dogs, lights,
Beware of the dog signs.
▪ Compensating:
Controls that Compensate – other controls that are impossible or too
costly to implement.
1|Page
https://thorteaches.com/
CC Chapter 3

Lecture notes
Physical Security Controls:
•
Perimeter defense:
▪ Fences (Deterrence, Preventative):
⬥ Smaller fences such as 3ft. (1m) can be a deterrence, while taller ones,
such as 8ft. (2.4m) can be a prevention mechanism.
⬥ The idea of the fences is to ensure entrance/exits from the facility
happen through only a few entry points (doors, gates, turnstiles).
▪ Gates (Deterrence, Preventative):
⬥ Placed at control points at the
perimeter.
⬥ Used with the fences to ensure access
only happens through a few entry
points.
⬥ ASTM Standard:
🢭 Class I Residential (your house)
🢭 Class II Commercial/General
Access (parking garage).
🢭 Class III Industrial/Limited Access (loading dock for 18-wheeler
trucks).
🢭 Class IV Restricted Access (airport or prison).
▪ Bollards (Preventative):
⬥ Used to prevent cars or trucks from entering an area while allowing foot
traffic to pass.
⬥ Often shops use planters or similar; it looks prettier but achieves the
same goal.
⬥ Most are static heavy-duty objects, but some cylindrical versions can
also be electronically raised or lowered to allow authorized traffic past a
"no traffic" point. Some are permanent fixtures and can be removed
with a key or other unlock functions.
▪ Lights (Detective and Deterrence):
⬥ Lights should be used to fully illuminate the entire area.
⬥ Lights can be static, motion activated (static) or automatic/manual
Fresnel lights (search lights).
⬥ Measured in lumen - 1 lumen per square foot or lux - 1 lumen per
square meter more commonly used.
▪ CCTV (Closed Circuit Television) (Detective, Deterrence) - used to monitor the
facility’s perimeter and inside it.
⬥ Older cameras are analog and use video tapes for storage (often VHS);
quality is often bad, unclear.
⬥ Modern cameras are digital and use CCD (Charged Couple Discharge);
also use a DVR (Digital Video Recorder).
⬥ Organizations may have retention requirements either from policies or
legislation that require a certain retention of their video (this could be
bank ATM, data center or entry point footage).
⬥ Cameras can be either static or non-static (automatic or manual).
2|Page
https://thorteaches.com/
CC Chapter 3
Lecture notes
🢭 We have all seen the spy or heist movies where they avoid them
by knowing the patterns and timers.
🢭 This risk can be mitigated with a randomizer or pseudo
randomizer, we want to ensure full coverage.
▪
Locks (Preventative):
⬥ Key locks:
🢭 Requires a physical key to unlock;
keys can be shared/copied.
🢭 Key Bitting Code (How far the key is
bitten down for that section.) – Can
be copied and replicated without the
key from either the numbers or a
photo of it.
🢭 Pin Tumbler Lock (or Yale lock) – A
lock mechanism that uses pins of
varying lengths to prevent
the lock from opening without the correct key.
🢭 Lock Picking - with a lock pick set or bumping, opening a lock
without the key.
🢭 Any key lock can be picked or bumped, how long it
takes depends on the quality of the lock.
🢭 Lock pick sets lift the pins in the tumbler, opening the
lock.
🢭 Lock Bumping - Using a shaved-down key that matches the lock,
the attacker “bumps“ the key handle with a hammer or
screwdriver which makes the pins jump, then the attacker
quickly turns the key.
🢭 Master Keys open any lock in a given area or security zone.
🢭 Both who has them and where they are kept should be
very closely guarded at all times.
🢭 Core Key is used to remove a lock core in
"interchangeable core locks."
🢭 An interchangeable core, or IC, is a
compact keying mechanism in a
specific figure-eight shape.
🢭 Relies upon a specialized "control" key
for insertion and extraction of the core.
🢭 Should be kept secure and access
should be very restricted.
⬥ Combination Locks:
🢭 Not very secure and have limited accountability even
with unique codes.
🢭 Should be used for low security areas.
🢭 Can be Dial type (think safe), Button or Keypad.
3|Page
https://thorteaches.com/
CC Chapter 3
Lecture notes
🢭 Very susceptible to brute force, shoulder surfing and are often
configured with weak security (I know of a good deal of places
where the code is the street number).
🢭 Over time, the buttons used for the code will have more wear
and tear.
🢭 For 4-number PIN where 4 keys are used, the possible
combinations are no longer 10,000, but 256: if 3 keys, then 81
options.
▪
▪
▪
▪
▪
Smart Cards (contact or contactless):
⬥ They contain a computer circuit, using ICC (Integrated Circuit Card).
⬥ Contact Cards - Inserted into a machine to be read.
🢭 This can be credit cards you insert into the chip reader or the
DOD CAC (Common Access Card).
⬥ Contactless Cards - can be read by proximity.
🢭 Key fobs or credit cards where you just hold it close to a reader.
🢭 They use an RFID (Radio Frequency Identification) tag
(transponder) which is then read by an RFID Transceiver.
Magnetic Stripe Cards:
⬥ Swiped through a reader, no circuit.
⬥ Very easy to duplicate.
Tailgating/Piggybacking:
⬥ Following someone authorized into an area you are not authorized to
be in.
⬥ Often combined with Social Engineering.
⬥ It is easy to do if your reason for being there seems plausible.
⬥ Bring a lot of food, a cake, and some balloons, have on clothes, ID badge
and tools that a repairman would, the options are endless.
Mantrap:
⬥ A Mantrap is a room with 2 doors; Door 1 must close completely before
Door 2 can be opened.
⬥ Each door has a different authentication method (something you know,
something you have, something you are).
⬥ They can at times use weight sensors - Bob weighs 220lbs (100kg), the
weight measured by the pressure plate is 390lbs (177kg), someone is
probably in the room with Bob. Door 2 won’t open until Bob is
confirmed alone in the Mantrap with a cart of old servers, normally
done by the cameras in the trap.
Turnstiles (Preventative, Deterrence):
⬥ Also prevents tailgating, by allowing only 1 person to enter
per Authentication (think like in US subway systems or amusement park
entries, but for secure areas they are often floor to ceiling
turnstiles with interlocking blades).
4|Page
https://thorteaches.com/
CC Chapter 3
Lecture notes
Both Mantraps and Turnstiles should be designed to allow safe evacuation in
case of an emergency. (Remember that people are more important to protect
than stuff.)
▪
▪
▪
Contraband Checks (Preventative, Detective, Deterrent):
⬥ Often seen in airports, courthouses, intelligence offices or other higher
security facilities.
⬥ Checking what you are bringing in or out of the building to ensure
nothing dangerous gets in or anything confidential gets out.
⬥ With technology becoming much smaller, these are less effective when
it comes to data theft; it is easy to hide a microSD memory card, which
can contain up to 1TB+ of data per card.
Motion Detectors (Detective, Deterrence):
⬥ Used to alert staff by triggering an alarm (silent or not).
⬥ Someone is here, did an authorized person pass the checkpoint?
🢭 IF yes, then log the event and do nothing else
IF no, then alert/alarm.
⬥ Basic ones are light-based - They require light, making them not very
reliable.
⬥ Ultrasound, Microwave, Infrared or Laser (pew-pew!!)
🢭 Active sensors, they send energy (sound, wave or light).
🢭 If the sound takes less time to return or the pattern it receives
back is altered, it means someone is somewhere they should
not be.
🢭 Photoelectric motion sensors send a beam of light to a sensor, if
broken the alarm sounds. These are the pew-pew lasers and
sorry, no, they are not green or red and they are rarely visible.
Perimeter Alarms:
⬥ Door/window sensors – these are the thin strips around the edges of
either or contact sensors.
🢭 If opened, an alarm sounds; if broken, same effect.
🢭 Can be circumvented, but they are part of a layered defense.
⬥ Walls, windows, doors, and any other openings should be considered
equally strong.
⬥ Walls are inherently stronger; the rest need compensating measures
implemented (locks, alarms, sensors).
⬥ Glass is normally easy to break, but can be bullet and/or explosion
proof, or have a wire mesh in the middle.
⬥ Plexiglass can also be used, as it is stronger and does not shatter, but
can be melted.
⬥ Door hinges should always be on the inside (or hidden in the door).
⬥ Just like the turnstiles and mantraps, doors (and in some cases
windows) should be designed to allow safe exit from the building in case
of an emergency. Often there is a "Panic Bar" that opens the door, but
5|Page
https://thorteaches.com/
CC Chapter 3
Lecture notes
they are also connected to alarms that sound when opened (clearly
labeled Emergency Only - Alarm WILL Sound).
▪
Walls, Floors, and Ceilings:
⬥ In line with our layered defense strategy, the strong security
encountered in getting to a data center does nothing if there is a crawl
space that an attacker can use.
⬥ We need to secure all possible ways into our Data Center or other
secure location.
⬥ Walls should be "slab to slab" (from the REAL floor to the REAL ceiling);
if sub-flooring or sub-ceilings are used, then they should be contained
within the slab-to-slab walls.
⬥ Walls, floors, and ceilings should be made of materials (where it makes
sense) that are secure enough for that location, e.g., don't have
sheetrock around your Data Center because I can cut that with a knife.
⬥ Walls, floors, and ceilings should have an appropriate fire rating.
🢭 So should your doors, but walls, floors and ceilings are more
often overlooked.
🢭 This is to protect the Data Center from outside fire and just as
well the rest of the building from a Data Center fire.
▪
Guards – (Deterrent, Detective, Preventative, Compensating)
⬥ Guards can serve many diverse purposes for an organization.
⬥ They can check credentials/ID Cards, monitor CCTV cameras,
monitor environmental controls (HVAC), react to incidents, act as a
deterrent, and so much more.
⬥ Professional Guards - Professional training and/or schooling; armed.
⬥ Amateur Guards - No professional training or schooling; armed.
⬥ Pseudo Guard - Unarmed guard.
⬥ Guards should have a very clear set of rules and regulations.
⬥ Social engineering attacks are common and should be prevented
with training to raise awareness.
▪
Dogs (Deterrent, Detective, Compensating):
⬥ Most often used in controlled, enclosed areas.
⬥ Liability can be an issue.
⬥ Dogs are trained to corner suspects and
attack someone who’s fleeing. People often
panic when they encounter a dog and run.
⬥ Even if they’re in a secure area, the
organization may still be liable for injuries.
⬥ Can also be internal authorized employees
walking out the wrong door or trying to take a
shortcut.
⬥ They panic and the dog attacks.
6|Page
https://thorteaches.com/
CC Chapter 3
▪

Lecture notes
Restricted Work Areas and Escorts.
⬥ To track and funnel authorized visitors, we can use visitor badges, visitor
logs, and escorts.
⬥ Non-electronic visitor badges are easy to make copies of and easy to
fake.
⬥ Electronic can be just a cheap re-programmable magnetic strip (like for
hotel rooms, easy to copy). Make sure they have a short window of use,
or more secure individually printed ones for each visit, and only used
once.
⬥ The return of all badges and physical sign-out should be enforced when
the visitor leaves.
⬥ When a vendor is coming to repair, install or remove something in your
facility, they need to be checked in and escorted from the entry point to
where they are going to work by an employee, and the employee
should stay with the vendor until the work is completed.
⬥ The vendor’s employees should already have passed a security check
when they were hired; the vendor is liable.
⬥ This sounds and is boring, but it is more likely to prevent the vendor
from compromising your security than if they were free to roam the
facility and the data center unsupervised.
Technical or Logical Security Controls:
•
•
Access Control Categories:
▪ Administrative (Directive) Controls:
⬥ Organizational policies and procedures.
⬥ Regulation.
⬥ Training and awareness.
▪
Logica/Technical Controls:
▪
⬥ Hardware/software/firmware – Firewalls, routers, encryption.
Physical Controls:
⬥ Locks, fences, guards, dogs, gates, bollards.
Access Control Types (Many can be multiple types – On the exam look at question
content to see which type it is).
▪ Preventative:
⬥ Prevents action from happening – Least privilege, drug tests, IPS,
firewalls, encryption.
▪ Detective:
⬥ Controls that Detect during or after an attack – IDS, CCTV, alarms, antivirus.
▪ Corrective:
⬥ Controls that Correct an attack – Anti-virus, patches, IPS.
7|Page
https://thorteaches.com/
CC Chapter 3
▪
▪
▪
Lecture notes
Recovery:
⬥ Controls that help us Recover after an attack – DR Environment,
backups, HA Environments.
Deterrent:
⬥ Controls that Deter an attack – Fences, security guards, dogs, lights,
Beware of the dog signs.
Compensating:
Controls that Compensate – other controls that are impossible or too
costly to implement.

Identity and Access Provisioning:
▪ We can have multiple identities per
entity and each identity can have
multiple attributes.

I can be staff, alumni, and
enrolled student at a college.

As staff I could have access to
different areas and data than I
would as alumni and student.

Companies can have the same,
they can be the parent
company, then smaller
companies under the parent
umbrella, all with different
attributes.

Identity and Access Provisioning Lifecycle:
▪ This is a suggested lifecycle example from “Identity Management Design Guide
with IBM Tivoli Identity Manager”.
▪ You obviously don’t have to implement it verbatim but find a clear policy that
works for your organization.

Life cycle rules provide administrators with the ability to define life cycle
operations to be executed as the result of an event. Life cycle rules are
especially useful in automating recurring administrative tasks.
 Password policy compliance checking.
 Notifying users to change their passwords before they expire.
 Identifying life cycle changes such as accounts that are inactive
for more than 30 consecutive days.
 Identifying new accounts that have not been used for more
than 10 days following their creation.
 Identifying accounts that are candidates for deletion because
they have been suspended for more than 30 days.
8|Page
https://thorteaches.com/
CC Chapter 3

Lecture notes
When a contract expires, identifying all accounts belonging to a
business partner or contractor’s employees and revoking their
access rights.

Federated Identity:
▪ How we link a person's electronic identity and attributes across multiple distinct
identity management systems.
▪ FIDM (Federated Identity Management):

Having a common set of policies, practices, and protocols in place to
manage the identity and trust into IT users and devices across
organizations.

SSO: A subset of federated identity management. Users use a single
sign-on for multiple systems.

Access Control Systems:
▪ We can use centralized and/or decentralized
(distributed) access control systems, depending on
which type makes the most sense. Both options
provide different benefits.
▪ Access control decisions are made by comparing the
credential to an access control list.
▪ This look-up can be done by a host or server, by an
access control panel, or by a reader.
▪ Most common is hub and spoke with a control
panel as the hub, and the readers as the spokes.
▪ Today most private organizations use Role Based
Access Control (RBAC).

You are in Payroll you get the payroll staff
access and permissions, if you move to HR,
you lose your payroll access and get HR
access assigned.
▪ Normal systems are much larger, but you get the
idea from this drawing how they would connect.
▪ In a perfect world, access control systems should be physically and logically
segmented from the rest of our IP Network, in reality it is most often segmented
logically with VLANs, but in many cases not even that.
▪
Centralized Pro’s (Decentralized Con’s):

All systems and locations have the same security posture.

Easier to manage: All records, configurations and policies are centralized
and only configured once per policy.
9|Page
https://thorteaches.com/
CC Chapter 3
Lecture notes

▪
▪




Attackers look for the weakest link in our chain, if a small
satellite office is not following our security posture, they can be
an easy way onto our network.

It is more secure, only a few people have access and can make changes
to the system.

It can also provide separation of duties, the local admin can’t
edit/delete logs from their facility.

SSO can be used for user access to multiple systems with one login.
Centralized Con’s (Decentralized Pro’s):

Traffic overhead and response time, how long does it take for a door
lock to authenticate the user against the database at the head office?

Is connectivity to the head office stable, is important equipment on
redundant power and internet?
Hybrid:

Centrally controlled; access lists for that location are pushed to a local
server on a daily/hourly basis; local administrators have no access.

We must still ensure that the local site follows the organization's
security posture in all other areas.
Authorization:
▪ We use Access Control models to determine what a subject is allowed to access.
▪ What and how we implement depends on the organization and what
our security goals are, type can often be chosen dependent on which
leg of the CIA Triad is the most important one to us.
▪ If it is Confidentiality, we would most likely go with Mandatory
Access Control.
▪ If it is Availability, we would most likely go with Discretionary
Access Control.
▪ If it is Integrity, we would most likely go with Role Based Access Control
or Attribute Based Access Control.
There technically is also RUBAC (Rule Based Access Control), it is mostly used on
firewalls with IF/THEN statements but can be used in conjunction with the other models
to provide defense in depth.
DAC (Discretionary Access Control) - Often used when Availability is most important:
▪ Access to an object is assigned at the discretion of the object owner.
▪ The owner can add, remove rights, commonly used by most OS's’.
▪ Uses DACL’s (Discretionary ACL), based on user identity.
MAC (Mandatory Access Control) - Often used when Confidentiality is most important:
▪ Access to an object is determined by labels and clearance, this is often used in
the military or in organizations where confidentiality is very important.
10 | P a g e
https://thorteaches.com/
CC Chapter 3
Lecture notes
▪



Labels: Objects have Labels assigned to them; the subject's clearance must
dominate the object's label.

The label is used to allow Subjects with the right clearance access them.

Labels are often more granular than just “Top Secret”, they can be “Top
Secret – Nuclear”.
▪ Clearance: Subjects have Clearance assigned to them.

Based on a formal decision on a subject's current and future
trustworthiness.

The higher the clearance the more in depth the background checks
should be.
RBAC (Role-Based Access Control) - Often used when Integrity is most important:
▪ Policy neutral access control mechanism
defined around roles and privileges.
▪ A role is assigned permissions, and subjects
in that role are added to the group, if they
move to another position they are moved to
the permissions group for that position.
▪ It makes administration of 1,000's of users
and 10,000's of permissions much easier to
manage.
▪ The most commonly used form of access
control.
▪ If implemented right it can also enforce
separation of duties and prevent
authorization/privilege creep .
▪ We move employees transferring within the organization from one role to
another and we do not just add the new role to the old one.
ABAC (Attribute-Based Access Control):
▪ Access to objects is granted based on subjects,
objects, AND environmental conditions.
▪ Attributes could be:

Subject (user) – Name, role, ID, clearance, etc.

Object (resource) – Name, owner, and date of
creation.

Environment – Location and/or time of
access, and threat levels.
Context-Based Access Control:
▪ Access to an object is controlled based on certain
contextual parameters, such as location, time, sequence of
responses, access history.
▪ Providing the username and password combination followed
by a challenge and response mechanism such as CAPTCHA,
11 | P a g e
https://thorteaches.com/
CC Chapter 3
Lecture notes
filtering the access based on MAC addresses on wireless, or a firewall filtering
the data based on packet analysis are all examples of context-dependent access
control mechanisms.

Content-Based Access Control:
▪ Access is provided based on the attributes or content of an object, then it is
known as a content-dependent access control.
▪ In this type of control, the value and attributes of the content that is being
accessed determine the control requirements.
▪ Hiding or showing menus in an application, views in databases, and access to
confidential information are all content-dependent.

Least Privilege and Need to Know.
▪ Least Privilege - (Minimum necessary access) We give our users/systems exactly
the access they need, no more, no less.
▪ Need to Know - Even if you have access, if you do not need to know, then you
should not access the data.
▪ Separation of Duties - More than one individual in one single task is an internal
control intended to prevent fraud and error.

Administrative Security:
▪ Job Rotation:

For the exam think of it to detect errors and frauds. It is easier to detect
fraud and there is less chance of collusion between individuals if they
rotate jobs.

It also helps with employee’s burnout and it helps employees
understand the entire business.

This can be to cost prohibitive for the exam/real life, make sure on the
exam the cost justifies the benefit.
▪ Mandatory Vacations:

Done to ensure one person is not always performing the same task,
someone else has to cover and it can keep fraud from happening or help
us detect it.

Their accounts are locked, and an audit is performed on the accounts.

If the employee has been conducting fraud and covering it up, the audit
will discover it.

The best way to do this is to not give too much advance notice of
vacations.
12 | P a g e
https://thorteaches.com/
CC Chapter 3




Lecture notes
NDA (Non-Disclosure Agreement):
▪ We covered NDAs between our and other organizations, it is also normal to
have them for internal employees.
▪ Some employment agreements will include a clause restricting employees' use
and dissemination of company-owned confidential information.
Background Checks:
▪ References, Degrees, Employment, Criminal, Credit history (less common, more
costly).
▪ For sensitive positions the background check is an ongoing process.
Privilege Monitoring:
▪ The more access and privilege an employee has the more we keep an eye on
their activity.
▪ They are already screened more in depth and consistently, but they also have
access to many business-critical systems, we need to audit their use of that
access.
▪ With more access comes more responsibility and scrutiny.
Data Classification Policies:
13 | P a g e
https://thorteaches.com/
CC Chapter 3
Lecture notes
➢ Domain 3: What we covered.

Physical Controls:
▪ Locks, fences, guards, dogs,
gates, bollards, ...

Technical Controls:
▪ Hardware/software/firmware –
Firewalls, routers, encryption, ...
14 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
Welcome to the Fourth Chapter.
➢ Domain 4: What we will be covering.

This is a GIANT domain.








Network Basics and Definitions.
The OSI and TCP/IP model.
IP Addresses, Port Numbers, and MAC Addresses.
Wi-Fi and other wireless networks.
Virtualization, Cloud, and Distributed Computing.
Fault tolerance and resiliency.
Data centers.
Attacks and Attackers.
 Network Basics and Definitions:

What is networking?
▪
A computer network is a set of computers sharing resources or data.
We use defense-in-depth on our internal network and when our data traverses the
internet.
 We do this by ensuring all our network devices, protocols, and traffic are as secure as
possible.
 Simplex is a one-way communication (One system transmits, the other listens).
 Half-duplex communication sends or receives at one time only (Only one system can
transmit at a time).
 Full-duplex communication sends and receives simultaneously. (Both systems can
transmit/receive simultaneously).
 Baseband networks have one channel and can only send one signal at a time.
▪ Ethernet is baseband: “1000base-T” STP cable is a 1000-megabit, baseband,
Shielded Twisted Pair cable.
 Broadband networks have multiple channels and can send and receive multiple signals
at a time.
 The Internet is a global collection of peered WAN networks, it really is a patchwork of
ISPs.
 An Intranet is an organization's privately owned network, most larger organizations
have them.
 An Extranet is a connection between private Intranets, often connecting business
partners' Intranets.
1|Page
https://thorteaches.com/
CC Chapter 4








Lecture notes
Circuit Switching - Expensive, but always available,
Circuit Switching Network
used less often.
▪ A dedicated communications channel through
the network.
▪ The circuit guarantees the full bandwidth.
▪ The circuit functions as if the nodes were
physically connected by a cable.
Packet Switching - Cheap, but no capacity guarantee,
Packet Switching Network
very widely used today.
▪ Data is sent in packets but take multiple
different paths to the destination.
▪ The packets are reassembled at the
destination.
▪ QoS (Quality of Service) gives specific traffic
priority over other traffic.

Most commonly VOIP (Voice over IP)
or other UDP traffic needing close to real time communication.

Other non-real time traffic is down prioritized, the 0.25 second delay
won’t be noticed.
PAN (Personal Area Network) - A personal area network is a computer network used for
communication among computers and other information technological devices close to
one person (PCs, printers, scanners, consoles …).
▪ Can include wired (USB and FireWire) and wireless devices (Bluetooth and
infrared).
LAN (Local Area Network) - A network that connects computers and devices in a limited
geographical area such as a home, school, office building or campus.
▪ Each computer or device on the network is a node, wired LANs are most likely
based on Ethernet technology.
MAN (Metropolitan Area Network) – A large computer network that usually spans a
city or a large campus.
WAN (Wide Area Network) - A computer network that covers a large geographic area
such as a city, country, or spans even intercontinental distances. Combines many types
of media such as telephone lines, cables, and air waves.
GAN (Global Area Network) - A global area network, is a network used for supporting
mobile users across a number of wireless LANs, satellite coverage areas, … the transition
from one to the next can be seamless.
VPN (Virtual Private Network) - A VPN network sends private data over an insecure
network, most often the Internet.
▪ Your data is sent across a public network, but looks and feels private.
2|Page
https://thorteaches.com/
CC Chapter 4
Lecture notes
 The OSI Model:
•
The OSI Model (Open Systems Interconnect):
▪ A layered network model that standardizes the communication functions of
a telecommunication or computing system regardless of their underlying
internal structure and technology.
▪ The model partitions a communication system into abstraction layers, the
model has 7 layers.
1. Physical
2. Data Link
3. Network
4. Transport
5. Session
6. Presentation
7. Application.
▫ 7-1 All People Seem To Need Data Processing.
▫ 1-7 Please Do Not Throw Sausage Pizza Away.
▪ Know the PDUs (Data, Segments, Packets, Frames, Bits).
▪
Layer 1 - Physical Layer:
⬧ Wires, Fiber, Radio waves, hub, part of
NIC, connectors (wireless).
⬧ Cable types:
▫ Copper TP (Twisted Pair) Least
secure, eavesdropping,
interference, easy tap into, but
also cheap.
▫ Fiber is more secure, not
susceptible to eavesdropping,
harder to use, can break, higher
cost.
⬧ Topologies:
▫ Bus, Star, Ring, Mesh partial/full.
⬧ Threats:
▫ Data emanation, theft,
eavesdropping, sniffing,
interference.
3|Page
https://thorteaches.com/
CC Chapter 4
Lecture notes
▪
Layer 2 - Data Link Layer:
⬧ Transports data between 2
nodes connected to same
network.
⬧ LLC – Logical Link Control –
error detection.
⬧ MAC address (BIA) – a
unique identifier on the
network card.
▫ Can be spoofed very easily, both for good and not so good
reasons.
▫ 48-bit hexadecimal first 24 manufacturer identifier, last 24
unique.
▫ 64-bit hexadecimal first 24 manufacturer identifier, last 40
unique.
▫ Threats - MAC Spoofing, MAC Flooding.
⬧ ARP (Address Resolution Protocol) Layer 2/3.
⬧ CSMA/CD – Ethernet – minimized with switches vs. hubs.
⬧ CSMA/CA – Wireless.
⬧ Token passing – Similar to the talking stick, not really used anymore.
▪
Layer 3 - Network Layer:
⬧ Expands to many different nodes (IP) – The Internet is IP based.
⬧ Isolates traffic into broadcast domains.
⬧ Protocols:
▫ IP, ICMP, IPSEC, IGMP, IGRP, IKE, ISAKMP, IPX.
⬧ Threats:
▫ Ping of Death, Ping Floods, Smurf – spoof source and directed
broadcast, IP modifications, DHCP attacks, …
▪
Layer 4: Transport Layer:
⬧ SSL/TLS Layer 4 to 7.
⬧ UDP (User Datagram Protocol):
▫ Connectionless protocol, unreliable, VOIP, Live video, gaming,
“real time’’.
▫ Timing is more important than delivery confirmation.
▫ Sends message, doesn’t care if it arrives or in which order.
4|Page
https://thorteaches.com/
CC Chapter 4
▫
⬧
Lecture notes
Attack: Fraggle attack –
works the same way as
smurf but may be more
successful since it uses
UDP and not ICMP.
TCP (Transmission Control Protocol):
▫ Reliable, Connection orientated, Guaranteed delivery, 3-way
handshake, slower/more overhead, data reassembled.
▫ Attacks: SYN floods – half open TCP sessions, client sends
1,000s of SYN requests, but never the ACK.
▪
•
•
Layer 5 – Session Layer:
⬧ Establishes connection between 2 applications: Setup > Maintenance >
Tear Down.
▪ Layer 6 - Presentation Layer:
⬧ Only layer with no protocols.
⬧ Formatting, compressing, encryption (file level).
▪ Layer 7 - Application Layer:
⬧ Presents data to user (applications/websites).
⬧ HTTP, HTTPS, FTP, SNMP, IMAP, POP, and many more.
⬧ Non-Repudiation, certificates, application proxies, deep packet
inspection, content inspection, AD integration.
The higher you go up the layers, the slower it is. Speed is traded for intelligence.
Threats to Level 5-7: Virus, worms, trojans, buffer overflow, application, or OS
vulnerabilities.
5|Page
https://thorteaches.com/
CC Chapter 4
Lecture notes
 The TCP/IP Model:
•
The TCP/IP Model (Internet Protocol Suite):
▪ A conceptual model that provides end-to-end data communication.
▪ Specifying how data should be packetized, addressed, transmitted,
routed, and received.
▪ It has four layers which are used to sort all related protocols according to
the scope of networking involved.
▪ From lowest to highest:
⬧ The link layer containing communication methods for data that
remains within a single network segment.
⬧ The internet layer connecting independent networks, thus providing
internetworking.
⬧ The transport layer handling host-to-host communication.
⬧ The application layer provides process-to-process data exchange for
applications.
6|Page
https://thorteaches.com/
CC Chapter 4
▪
▪
▪
▪
▪
▪
Lecture notes
The link and physical layer have the networking scope of the local
network connection to which a host is attached.
⬧ Used to move packets between the Internet layer interfaces of two
different hosts on the same network.
⬧ The process of transmitting and receiving packets on a given link can
be controlled both in the software device driver for the network
card, as well as on firmware or specialized chipsets.
⬧ These perform functions such as adding a packet header to prepare
it for transmission, then transmit the frame over a physical medium.
⬧ The TCP/IP model includes specifications of translating the network
addressing methods used in the Internet Protocol to link layer
addresses, such as Media Access Control (MAC) addresses.
⬧ The link and physical layer = OSI layer 1-2.
Internet/Internetwork layer is responsible for sending packets across
potentially multiple networks.
⬧ Requires sending data from the source network to the destination
network (routing).
⬧ Internet/Internetwork layer = OSI layer 3.
⬧ The Internet Protocol performs two basic functions:
▫ Host addressing and identification: This is done with a
hierarchical IP address.
▫ Packet routing: Sending the packets of data (datagrams)
from the source to the destination by forwarding them to
the next network router closer to the final destination.
The transport layer establishes basic data channels that applications use
for task-specific data exchange.
⬧ Its responsibility includes end-to-end message transfer independent
of the underlying network, along with error control, segmentation,
flow control, congestion control, and application addressing (port
numbers).
⬧ Data is sent connection-oriented (TCP) or connectionless (UDP).
⬧ The transport layer = OSI layer 4.
The application layer includes the protocols used by applications for
providing user services or exchanging application data over the network
(HTTP, FTP, SMTP, DHCP, IMAP).
Data coded according to application layer protocols are encapsulated
into transport layer protocol units, which then use lower layer protocols
for data transfer.
The transport layer and the lower-level layers are unconcerned with the
specifics of application layer protocols.
7|Page
https://thorteaches.com/
CC Chapter 4
Lecture notes
▪
•
•
Routers and switches do not typically examine the encapsulated traffic,
rather they just provide a conduit for it. However, some firewall and
bandwidth throttling applications must interpret application data.
▪ The TCP/IP reference model distinguishes between user protocols and
support protocols.
▪ The application layer = OSI layer 5, 6, and 7.
Each layer of the model adds or removes encapsulation (encapsulation / decapsulation).
The higher we go, the slower and smarter the stack is, just like the OSI model.
 IP Addresses, Port Numbers, and MAC Addresses:
•
•
•
A unique identifier on the network card.
Can be spoofed pretty easily, both for good and less good reasons.
EUI/MAC-48 are 48bits (original design).
▪ The first 24 are the manufacturer identifier.
▪ The last 24 are unique and identify the host.
• EUI-64 Mac Addresses use
24bit for manufacturer, but 40
for unique ID.
▪ The first 24 are the
manufacturer identifier.
▪ The last 40 are unique and
identify the host.
• Both are widely used today and used by both IPv4 and IPv6.
▪ For 48bit MAC’s IPv6 modified it into 64bit MAC’s by adding FF:FE to the
device identifier.
8|Page
https://thorteaches.com/
CC Chapter 4
Lecture notes
•
IP Addresses:
▪ First deployed for production in the ARPANet in 1983, ARPANet later
became the internet.
▪ IP was developed in the 1970’s for secure closed networks (DARPA Defense Advanced Research Projects Agency). Security was not built in
but was bolted on later.
▪ IPv4 is a connectionless protocol for use on packet-switched networks.
▪ It operates on a best effort delivery model, it does not guarantee
delivery, it also does not assure proper sequencing or avoidance of
duplicate delivery. We have added protocols on top of IP to ensure those.
▪ IPv4 is the IT route's most Internet traffic today, but we are slowly
moving towards IPv6.
⬧ The move towards IPv6 is mainly dictated by IPv4 Addresses being
depleted years ago.
▪ IPv4 has around 4.2 billion IP addresses and of those ~4 billion are usable
internet addresses.
⬧ There are currently over 35 billion mobile devices on the internet, 75
billion is predicted by 2025.
⬧ All major cellphone carriers in the US use IPv6 for all cell phones.
⬧ IPv4 has 4,294,967,296 addresses where IPv6 has
340,282,366,920,938,463,463,374,607,431,768,211,456.
•
IP Addresses and Ports:
▪ When we send traffic, we use both the Source IP and Port as well as
Destination IP and Port. This ensures we know where we are going, and
when the traffic returns it knows where to return to.
▪ The IP addresses can be seen as the number of an apartment building.
⬧ The Port number is your apartment number.
⬧ If you have 50 browser tabs open, each tab has its own port
number(s).
▪ Well-known Ports:
⬧ 0-1023 - Mostly used for protocols.
9|Page
https://thorteaches.com/
CC Chapter 4
▪
▪
•
•
Lecture notes
Registered Ports:
⬧ 1024 to 49151 - Mostly used for vendor specific applications.
Dynamic, Private or Ephemeral Ports:
⬧ 49152–65535 - Can be used by anyone for anything.
Common Ports:
▪ 20
▪ 21
▪ 22
▪ 23
▪ 25
TCP
TCP
TCP/UDP
TCP
TCP
▪
80
TCP/UDP
▪
▪
110
137
TCP
UDP
▪
▪
▪
138
143
443
TCP/UDP
TCP
TCP
▪
3389
TCP/UDP
FTP data transfer.
FTP control.
Secure Shell (SSH).
Telnet unencrypted text communications.
Simple Mail Transfer Protocol (SMTP) can also
use port 2525.
Hypertext Transfer Protocol (HTTP) can also
use port 8008 and 8080.
Post Office Protocol, version 3 (POP3).
NetBIOS Name Service, used for name
registration and resolution.
NetBIOS Datagram Service.
Internet Message Access Protocol (IMAP).
Hypertext Transfer Protocol over TLS/SSL
(HTTPS).
Microsoft Terminal Server (RDP).
IPv4 (Internet Protocol version 4) addresses:
▪ IPv4 addresses are made up of 4 octets (dotted-decimal notation) and
broken further down in a 32bit integer binary.
▪ We use IP addresses to make
it readable to normal people,
it is easier to read 4 sets of
numbers than a 32 bits string
of 0s and 1s.
▪ Similarly, websites are really
just IP addresses translated
with DNS, which is then
translated into binary.
▪ It is easier to remember
google.com, than it is to
remember 66.102.12.231 or
2607:f8b0:4007:80b::200e.
▪ Public IP Addresses (Internet routable addresses):
⬧ Used to communicate over the internet between hosts.
▪ Private Addresses (RFC 1918 – Not routable on the internet):
10 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
Other notable IP spaces:
⬧ 10.0.0.0 10.255.255.255 16777216 127.0.0.0/8 Loopback IPs
⬧ 172.16.0.0 172.31.255.255 1048576 169.254.0.0/16 Link-Local
⬧ 192.168.0.0 192.168.255.255 65536 255.255.255.255 Broadcast
•
IPv6:
▪
▪
▪
▪
▪
▪
▪
IPv6 is 128bit in hexadecimal numbers (uses 0-9 and a-f).
8 groups of 4 hexadecimals, making addresses look like this:
⬧ fd01:fe91:aa32:342d:74bb:234c:ce19:123b
The IPv6 address space is huge compared to IPv4.
340,282,366,920,938,463,463,374,607,431,768,211,456 addresses.
⬧ 34 with 37 0s
total or 79 with
27 0s as many
addresses as
IPv4.
⬧ Every square
foot on the
planet can have
65000 IP
addresses.
IPSec is built in, not bolted on like with IPv4.
Mostly switched behind the scenes today, many organizations do not have
Dual Stack equipment in place.
Used by major US ISPs for cell phones (and to some extend the connection
to your modem).
To make the address more manageable 1 set of 0s can be shortened with ::
above you see the last 16 0s being shortened to 2001:0DB8:AC10:FE01::
11 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
 IP Support Protocols:
•
ARP (Address Resolution Protocol):
▪ Translates IP Addresses into MAC Addresses.
⬧ OSI Data/Network Layer or Network/Internet Layer.
▪ ARP is a simple and trusting protocol,
anyone can respond to an ARP
request.
▪ ARP (cache) Poisoning: An attacker
sends fake responses to ARP requests,
often done repeatedly for critical ARP
entries (Default Gateway).
⬧ A countermeasure can be
hardcoding ARP entries.
▪ RARP (Reverse ARP) is used by
diskless workstations to get IPs.
•
ICMP (Internet Control Message Protocol):
▪ Used to help IP, for Ping
(Echo request/reply) and TTL
Exceeds in Traceroute.
▪ Often used for
troubleshooting.
▪ An ICMP Echo Request is
sent to the IP, which then
sends an ICMP reply back (or
not).
▪ Originally used (and still) to
see if a host is up or down.
▪ Today if we get an Echo reply
we know the host is up, but
no reply does not mean it is
down.
▪ Firewalls and routers can block ICMP replies.
12 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
•
Traceroute:
▪ Uses ICMP to trace a network
route.
▪ Traceroute uses the TTL value
in somewhat reverse.
▪ We send a message with TTL
1.
⬧ The first router
decrements the TTL to
0 and sends an ICMP
Time Exceed message
back, First Hop is now
identified.
▪ We send message 2 with TTL 2, 2nd router does the same, it is identified.
▪ We do that over and over till the destination is reached (maximum 30
hops).
•
HTTP and HTTPS - Transport HTML data.
▪ HTTP (Hypertext Transfer Protocol):
⬧ Uses TCP port 80 (8008 and 8080), unencrypted website data sent
across the internet.
HTTPS (HTTP Secure):
▪ Uses TCP Port 443 (8443), encrypted data sent over the internet.
HTML (Hypertext Markup Language):
▪ The actual language webpages are written in.
▪ Not to be
confused with
HTTP/HTTPS.
•
•
13 | P a g e
https://thorteaches.com/
CC Chapter 4
•
Lecture notes
DHCP (Dynamic Host Configuration
Protocol):
▪ The common protocol we use
to assign IPs. Controlled by a
DHCP Server for your
environment.
▪ You most likely already use it
on your home network, this is
how when you connect a
cable or connect wireless,
you are online right away.
Both BOOTP and DHCP use UDP Port 67
for the BOOTP/DHCP Server and UDP
Port 68 for the Client.
•
 Cables:
•
Networking Cables:
▪ When it comes to networking cables, most people think RJ45 Copper
Ethernet cables, many more types are used though.
▪ Networking cables all come with pros
and cons, some are cheap, some more
secure, some faster, ...
▪ They can also pose different security
vulnerabilities depending on the cable
type and the environment.
▪ EMI (Electromagnetic Interference):
⬧ Magnetism that can disrupt data
availability and integrity.
▪ Crosstalk is the signal crossing from one
cable to another, this can be a confidentiality issue.
▪ Attenuation is the signal getting weaker the farther it travels.
⬧ Copper lines have attenuation, with DSL the farther you are
from the DSLAM (Digital Subscriber Line Access Multiplexer) the
lower speed you get.
14 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
•
Twisted Pair Cables:
▪ UTP (Unshielded Twisted Pair):
▪ Pairs of twisted pairs of cable.
⬧ Twisting them makes them less
susceptible of EMI.
⬧ 1 cable sends and 1 receives data.
⬧ The tighter the cables are twisted, the
less susceptible to EMI. For example,
CAT3 pairs (less tight) are more
susceptible to EMI than CAT6 (more
tight).
▪ STP (Shielded Twisted Pair):
⬧ Has extra metal mesh shielding
around each pair of cables, making
them less susceptible to EMI, but also
making the cables thicker, stiffer, and
more expensive.
•
Fiber Optic Cables Use light to carry data (vs. electricity for copper cables):
▪ Pros: Speed 1 Petabit per second, 35miles/50 km over a single fiber.
⬧ Distance, it has no attenuation like
copper, a single uninterrupted cable can
be 150 miles+ (240km+) long.
⬧ Not susceptible to EMI.
⬧ More secure than copper since it can't be
sniffed as easily as copper.
▪ Cons: Price, more difficult to use, you can
break the glass in the cable if you are not
careful.
▪ Single-Mode fiber - A Single strand of fiber
carries a single mode of light (down the
center), used for long distance cables (Often
used in IP-Backbones).
▪ Multi-Mode fiber - Uses multiple modes (light
colors) to carry multiple data streams
simultaneously, this is done with WDM
(Wavelength Division Multiplexing).
15 | P a g e
https://thorteaches.com/
CC Chapter 4
•
•
Lecture notes
All cable measurements are in metric system (m/km).
Only 3 countries in the world do not use metric system (Burma (Myanmar), Liberia,
and the United States).
▪ 1Kbps - Kilobits per second
⬧ 1,000 bps (103)
▪ 1Mbps - Megabit per second
⬧ 1,000,000 bps (106)
▪ 1Gbps - Gigabit per second
⬧ 1,000,000,000 bps (109)
▪ 1Tbps - Terabit per second
⬧ 1,000,000,000,000 bps (1012)
▪ 1Pbps - Petabit per second
⬧ 1,000,000,000,000,000 bps (1015)
16 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
 LAN Topologies:
•
•
•
•
•
Network topology describes the layout and topologies of interconnections between
devices and network segments.
Ethernet and Wi-Fi are the two most common transmission technologies in use for
local area networks.
At the data link layer and physical layer, a wide variety of LAN topologies have been
used, including ring, bus, mesh, and star.
At the higher layers, NetBEUI, IPX/SPX, and AppleTalk used to be common, but
TCP/IP is now the de facto standard.
Bus:
▪
•
All nodes are connected in a line, each
node inspects traffic and passes it along.
▪ Not very stable, a single break in the
cable will break the signal to all nodes
past that point, including
communication between nodes way
past the break.
▪ Faulty NICs (Network Interface Card) can
also break the chain.
Tree (Hierarchical):
▪ The base of the Tree topology controls
the traffic, this was often the
mainframe.
•
Ring:
•
Star:
▪
All nodes are connected in a ring.
▪
All nodes are connected to a
central device.
This is what we normally use for
Ethernet, our nodes are
connected to a switch.
Provides better fault tolerance, a
break in a cable or a faulty NIC
will only effect that one node.
If we use a switch, no token
passing, or collision detection is
needed since each node is on its
own segment.
If we use hubs, collisions will still
occur; but I hope none are
around anymore, not just how
slow they are, but more how
unsecure they are now.
▪
▪
▪
▪
17 | P a g e
https://thorteaches.com/
CC Chapter 4
•
Lecture notes
Mesh:
▪
▪
▪
Nodes are connected to
each other in either a partial
mesh or a full mesh.
Partial Mesh:
⬧ Nodes are directly
connected to some
other nodes.
Full Mesh:
⬧ All nodes are directly
connected to all other
nodes.
⬧ More redundant but
requires a lot more
cables and NICs.
⬧ Often used in HA (High
Availability)
environments, with
cluster servers for
keepalives.
 Wi-Fi:






A wireless computer network that links two or more devices
using a wireless distribution method within a
limited area (a home, a school, a coffee shop, or
an office building).
Gives users the ability to move around within a
locally covered area and be connected to the
network.
Often multiple APs (Access Points) are set up
throughout an office building to give seamless
roaming coverage for the employees.
WLAN normally also provides an Internet
connection, but not always.
Most modern WLANs are based on IEEE 802.11
standards and are marketed under the Wi-Fi brand
name.
Wi-Fi makes us more mobile and our connection more
seamless, but it is easier to compromise than cabled
internet connection.
18 | P a g e
https://thorteaches.com/
CC Chapter 4

Lecture notes
Wi-Fi Attacks:
▪ Rogue Access Points:

An unauthorized access point
that has been added to our
network without our
knowledge.

This can be malicious by an
attacker or just an employee
wanting Wi-Fi somewhere
with bad coverage.

Without our security posture,
they are a very big concern.

Can be somewhat mitigated
with Port security on the
Switches and by scanning for
Rogue access points.

Can compromise confidentiality and
integrity.
▪
Jamming/Interference:

This can be a lot of traffic on the Wi-Fi frequencies or done by attackers
to disrupt our network (DOS).

If interference is an issue, we can
change to other channels if any
less crowded channels are
available or to different
frequencies if our equipment
supports it.

The 2.4 GHz band is used by
Bluetooth, microwaves,
cordless phones, baby
monitors, Wi-Fi,…

Can compromise
integrity and
availability.
19 | P a g e
https://thorteaches.com/
CC Chapter 4
▪

Lecture notes
Evil Twin:

An evil twin is used when
attackers are trying to create
rogue access points so as to gain
access to the network or access
to information that is being put
through a network.

Can be done on your network
or not, the attacker simply
names their access point the
same as ours but with no
security and user
devices automatically
connect to them.

Can compromise
confidentiality and
integrity.
Wireless Networks:

Bluetooth:
▪ A wireless technology standard for exchanging data over short distances using
2.4 GHz from fixed and mobile devices and building personal area networks
(PANs).
▪ Bluetooth has three classes of devices; while designed for short-distance
networking, Class 1 can reach up to 100 meters.
▪ Class 1: 100 meters, 2: 10 meters, 3: under 10 meters.
▪ Bluetooth implements confidentiality, authentication, and key derivation with
custom algorithms based on the SAFER+ block cipher.
▪ The E0 stream cipher is used for encrypting packets, granting confidentiality,
and is based on a shared cryptographic secret, namely a previously generated
link key or master key.
▪ Cryptanalysis of E0 has proven it to be weak, attacks show the true strength to
be 38 bits or even less.
▪ Bluetooth key generation is generally based on a Bluetooth PIN which must be
entered on one or both devices.
▪ Bluetooth security is to some extent security through obscurity, it assumes the
48-bit MAC address of the Bluetooth adapter is not known.
▪ Even when disabled, Bluetooth devices may be discovered by guessing the MAC
address.
▪ The first 24 bits are the OUI, which can be easily guessed, the last 24 bits can be
discovered with brute-force attacks.
20 | P a g e
https://thorteaches.com/
CC Chapter 4

▪
Attacks:

Bluejacking: Sending unsolicited messages over Bluetooth, most often
harmless but annoying.

Bluesnarfing: Unauthorized access of information from a Bluetooth
device: phones, desktops, laptops,...

Bluebugging: The attacker gains total access and control of your device;
it can happen when your device is left in the discoverable state.

Only possible on older phones with outdated OSs, newer smartphones
constantly update their OS.
▪
Countermeasures:

Enable Bluetooth only when you needed it.

Enable Bluetooth discovery only when necessary and disable discovery
when your devices are paired.

Do not enter link keys or PINs when unexpectedly prompted to do so.

Remove paired devices when you do not use them.

Regularly update firmware on all Bluetooth enabled devices.
Li-Fi:
▪
▪
▪
▪
▪
▪
▪

Uses light to transmit data and position between devices.
Can send high-speed data using visible light, ultraviolet, and infrared spectrums.
Can be used in areas prone to EMI (Electromagnetic interference), such as
aircraft cabins, hospitals, and nuclear power plants.
Speeds (currently) up to 100 Gbit.
Light can reflect off walls and still reach 70 Mbit without requiring a direct line
of sight.
Pros: Not the same capacity as Wi-Fi (radio frequency exhaustion) and can be
used in places where Wi-Fi is prohibited.
Cons: Short-range, not always reliable, and high cost of implementation.
Zigbee:
▪
▪
▪

Lecture notes
Mesh wireless network with low power, low data rate, and close proximity.
Simple and less complex compared to other WPANs (Wireless Personal Area
Networks) such as Bluetooth or Wi-Fi.
It has a range of 10 to 100 meters, but it requires line-of-sight. Data rates vary
between 20 kbit/s (868 MHz band) and 250 kbit/s (2.4 GHz band).
Satellite:
▪ For many years, satellite internet was a relatively slow and expensive option.
▪ You have a modem, as with any other internet connection, as well as a satellite
dish (2-3 ft. or 60-90 cm).
▪ Typical satellite connections have had a latency of 500 ms and speeds ranging
from 10 to 50 Mbps.
▪ Starlink is currently testing speeds ranging from 20-200 Mbps down to 15-50
Mbps up, with latencies ranging from 15-40 ms.
21 | P a g e
https://thorteaches.com/
CC Chapter 4







Lecture notes
Cellular networks/mobile networks are communication
networks where the last leg is wireless.
The network is divided into cells and distributed across
areas, with each cell containing at least one fixedlocation transceiver, if not more.
These base stations provide network coverage to the
cell, allowing it to transmit voice, data, and other types
of content.
To avoid interference and provide guaranteed service
quality within each cell, a cell typically uses a different
set of frequencies than neighboring cells.
3G:
▪
Bandwidth: 2 Mbps, latency: 100-500 ms,
average speed 144 kbps.
▪
Bandwidth: 200 Mbps, latency: 20-30 ms,
average speed 25 Mbps, 16km (10 miles).
▪
Bandwidth: 5-20 Gbps, latency: <10 ms, average
speed 200-400 Mbps, 500m (1500 ft).
High frequency, short-range, and can be blocked by anything metal and even
just solid objects.
A lot more 5G towers are needed to get coverage.
4G:
5G:
▪
▪
22 | P a g e
https://thorteaches.com/
CC Chapter 4

Lecture notes
VLANs and Routers:


Layer 2 Protocols:
VLAN (Virtual LAN) is a broadcast domain that is
partitioned and isolated at layer 2.
▪ Specific ports on a switch are assigned to
a certain VLAN.
▪ The Payroll VLAN is in 2 different
buildings and spans multiple switches.
▪ VLANs use tags within network packets
and tag handling in networking systems,
replicating the appearance and
functionality of network traffic that is
physically on a single network but acts as
if it is split between separate networks.
▪ It allows networks and devices that must
be kept separate to share the same
physical devices without interacting, for
simplicity, security, traffic management,
and/or cost reduction.
▪ VLAN Trunks - Ports connecting two
switches to span VLANs across them.
▪ VLANs share bandwidth, a VLAN trunk
can use link aggregation, quality-ofservice prioritization, or both to route
data efficiently.

Virtual eXtensible Local Area Network (VXLAN):
▪ Made and widely used
for cloud computing
with organizations that
have mass tenants.
(Think AWS, Google or
similar).
▪ Solves the issue with
only having 4094
maximum VLANs.
23 | P a g e
https://thorteaches.com/
CC Chapter 4


Lecture notes
Layer 3 Devices:
▪ Routers:

Normally have a few ports vs. a lot on switches.

For our organizations, they are in the data centers.

In your home, they are often combined with a switch and wireless in
one box.

Forward traffic based on source and destination IPs and ports.

Connecting our LANs to the WAN.

Send traffic to the most specific route in their routing table.

Static route is a preconfigured route, always sends traffic there for a
certain subnet.

Default gateway sends all non-local traffic to an ISP for instance.

Dynamic route is learned from another routing via a routing protocol
(OSPF, EIGRP, BGP, IS-IS).

Metric is used to determine the best route to a destination.
VPNs, NAC, and Third-party Connectivity:

Authentication Protocols:
▪ VPN (Virtual Private Network):

Extends a private network
across a public network and
users can send and receive data
across shared or public
networks as if they were on the
private network.

VPNs may allow employees and
satellite offices to securely
access the organization's
intranet.

They are used to securely
connect.

Can also be used to get around
geo-restrictions and censorship
or to connect to proxy servers
for the purpose of protecting personal identity and location.

Created by establishing a virtual point-to-point connection using
dedicated connections, virtual tunneling protocols or traffic encryption.

Third-party Connectivity:
▪ Medium size enterprises typically have 20 or more third-party providers. I
believe the hospital where I worked in Hawaii had more than 200 third-party
providers.
▪ How do we ensure they are secure enough and conform to our policies and
procedures?
▪ Many never have direct contact with IT or IT-Security.
24 | P a g e
https://thorteaches.com/
CC Chapter 4
▪
▪


Lecture notes
We must conduct a thorough risk assessment to ensure that whatever they
provide does not jeopardize our security posture, or we must accept the risk.
We should have MOUs/MOAs and ISAs (Interconnection Security Agreement).
Network Access Control (NAC):
▪ Automatic detection and response to ensure our systems are in adherence with
our security policies.
▪ Can helps us with the prevention or reduction of 0-day and known attacks.
▪ Along with ensuring that security policies are adhered to at all times.
SDN, SD-WAN, and SDX:


SDN (Software-Defined Networking):
▪ Allows network administrators via software
to initialize, control, change, and manage
network behavior dynamically.
▪ Addresses the static architecture of
traditional networks that doesn't support
the dynamic, scalable computing and
storage needs of more modern
computing environments such as data
centers.
▪ This is done by separating the router’s
control plane from the data plane, the control
plane makes routing decisions, the data plane
forwards data through the router.
▪ Giving us the option to be hardware vendor agnostic.
Software-Defined Wide Area Network (SD-WAN)
▪ 85%+ of surveyed companies have deployed or plan to deploy within 2 years
(Cisco/FortiNet).
▪ Why we are seeing a move
towards SD-WAN:

Higher cheaper bandwidth,
LAN
flexibility and scalability of
bandwidth allocation, and
traffic engineering.

Ability to utilize many different
connection types (DSL, cable, fiber,
satellite, 4G/5G, ...).
SD-WAN

Near real-time failover between
connection types.
Fiber

Centralized easier
DSL
management, better
MPLS
insights, reporting, and
5G
statistics.
Satellite
L
25 | P a g e
https://thorteaches.com/
LAN
CC Chapter 4
Lecture notes


Better performance with intelligent routing, it can choose the optimal
network circuit for a given application or type of traffic.

Rapid deployment with pre-configured appliances or virtual appliances.

Secure connectivity - IPSec and next-generation firewall.
SDx (Software-Defined Everything):
▪ Any function that can be performed by or automated by software. This includes
networking, storage, data center, compute, security, WAN, really anything.
 Attacks and Attackers:

Hackers:
▪ Now: Anyone trying to get access to or disrupt any leg of the CIA Triad
(Confidentiality, Integrity, Availability).
▪ Original use: Someone using something in a way not intended.
▪ White Hat hackers: Professional pen testers trying to find flaws so we can fix it
(Ethical hackers).
▪ Black Hat hackers: Malicious hackers, trying to find flaws to exploit them
(Crackers – they crack the code).
▪ Gray/Grey Hat hackers: They are somewhere between the white and black
hats, they go looking for vulnerable code, systems or products.
▪ Script Kiddies: They have little or no coding knowledge, but many sophisticated
hacking tools are available and easy to use.
26 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
▪
Outsiders:

Unauthorized individuals - Trying to gain access; they launch the
majority of attacks but are often mitigated if the organization has good
Defense in Depth.

Interception, malicious code (e.g. virus, logic bomb, trojan horse), sale
of personal information, system bugs, system intrusion, system
sabotage or unauthorized system access.

48-62% of risks are from outsiders.
▪
Insiders:

Authorized individuals - Not necessarily to the compromised system,
who intentionally or unintentionally compromise the system or data.

This could be assault on an employee, blackmail, browsing of
proprietary information, computer abuse, fraud and theft, information
bribery, input of falsified or corrupted data.

38-52% of risks are from insiders, another reason good Authentication
and Authorization controls are needed.
▪
Hacktivism/Hacktivist (hacker activist):
Hacking for political or socially motivated
purposes.

Often aimed at ensuring free
speech, human rights, freedom of
information movement.
▪
Governments:

State sponsored hacking is common;
often you see the attacks happening
between the hours of 9 and 5 in that
time zone; this is a day job.

Approximately 120 countries have
been developing ways to use the
internet as a weapon to target
financial markets, government
computer systems and utilities.

Famous attacks: US elections
(Russia), Sony websites (N. Korea),
Stuxnet (US/Israel), US Office of
Personnel Management (China), …
27 | P a g e
https://thorteaches.com/
CC Chapter 4

▪
Bots and botnets (short for robot):

Bots are a system with malware
controlled by a botnet.

The system is compromised by an attack
or the user installing a remote access
trojan (game or application with a hidden
payload).

They often use IRC, HTTP, or HTTPS.

Some are dormant until activated.

Others are actively sending data from the
system (Credit card/bank information for
instance).

Active bots can also be used to send spam
emails.
▪
Botnets is a C&C (Command and Control)
network, controlled by people (bot-herders).

There can often 1,000s or even 100,000s
of bots in a botnet.
Lecture notes
Malware:
▪ Malware (Malicious Code) - This is the catch-all name for any malicious
software used to compromise systems or data.

Viruses - require some sort of human interaction and are often
transmitted by USB sticks or other portable devices.

When the program is executed, it replicates itself by inserting its own
code into other programs.
 Macro (document) Viruses: Written in Macro Languages,
embedded in other documents (Word, Outlook).
 Boot Sector Viruses: Infect the boot sector or the Master Boot
Record, ensuring they run every time the PC boots.
 Stealth Viruses: Try to hide themselves from the OS and
antivirus software.
 Polymorphic Viruses: Change their signature to avoid the
antivirus signature definitions.
 Multipart (Multipartite) Viruses: Spread across multiple
vectors. They are often hard to get rid of because even if you
clean the file infections, the virus may still be in the boot sector
and vice-versa.
▪
▪
Worms - spread through self-propagation - they need no human interaction;
they do both the payload damage and replicate through aggressive network use
(also makes them easier to spot).
Trojans - malicious code embedded in a program that is normal. This can be
games, attachments, website clicks, etc.
28 | P a g e
https://thorteaches.com/
CC Chapter 4

▪

Lecture notes
RAT (Remote Access Trojan): A malware program that gives the attacker
admin control over the target system.
Antivirus Software - tries to protect us against malware.

Signature based - looks for known malware signatures - MUST be
updated constantly.

Heuristic (Behavioral) based - looks for abnormal behavior - can result in
a lot of false positives.
Intrusion Detection and Prevention Systems (IDS/IPS):

IDS’s and IPS’s:
▪ We use both IDS’s (Intrusion Detection Systems) and IPS’s (Intrusion Prevention
Systems) on our network to capture and alert or block traffic seen as malicious.
▪ They can be categorized into 2 types and with 2 different approaches toward
identifying malicious traffic.

Network-Based, placed on a network segment (a switch port in
promiscuous mode).

Host-Based, on a client, normally a server or workstation.

Signature (Pattern) Matching, similar to anti-virus, it matches traffic
against a long list of known malicious traffic patterns.

Heuristic-Based (Behavioral), uses a normal traffic pattern baseline to
monitor for abnormal traffic.
▪ Just like firewalls, routers, servers, switches, and everything else in our
environment they just see part of the larger picture, for full picture views and
data correlation we use a SIEM (Security Information and Event Management)
system or even better a SOAR (Security Orchestration, Automation, and
Response) system.

IDS (Intrusion Detection System):
▪ They are passive, they monitor, but they take no action other than sending out
alerts.
▪ Events trigger alerts: Emails/text message to administrators or an alert on a
monitoring tool, but if not monitored right this can take hours before noticed.
IPS (Intrusion Prevention System):
▪ Similar to IDS, but they also take action to malicious traffic, what they do with
the traffic is determined by configuration.
▪ Events trigger an action, drop/redirect traffic, often combined with the trigger
monitoring/administrator warnings, emails, or text messages.
IDS/IPS:
▪ Part of our layered defense.
▪ Basically, they are packet sniffers with analysis engines.
Network-Based, placed on a network segment (a switch port in promiscuous mode).
▪ Looks at a segment of our network, normally a switch, but can aggregate
multiple switches.



29 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
▪





Inspects Host/destination ports, IP's, protocols, content of traffic, but can
obviously not look in encrypted traffic.
▪ Can protect against DDOS, Port scans, brute force attacks, policy violations, …
▪ Deployed on one switch, port and NIC must be promiscuous, and port must be a
span port.
Host-Based, on a client, normally a server or workstation.
▪ We only look at a single system.
▪ Who is using the system, the resource usage, traffic, ...
▪ It can be application specific; it doesn’t have to be the entire system we
monitor.
▪ If we do choose to do traffic analysis it will impact the host by slowing it down.
▪ Certain attacks can turn off HIDS/HIPS.
▪ Can look at the actual data (it is decrypted at the end device), NIDS/NIPS can't
look at encrypted packets.
Signature-Based:
▪ Looks for known malware signatures.
▪ Faster since they just check traffic against malicious signatures.
▪ Easier to set up and manage, someone else does the signatures for us.
▪ They are completely vulnerable to 0-day attacks and have to be updated
constantly to keep up with new vulnerability patterns.
Heuristic-Based (Behavioral):
▪ Looks for abnormal behavior - can produce a lot of false positives.
▪ We build a baseline of what normal network traffic looks like and all traffic is
matched to that baseline.
▪ Traffic not matching the baseline is handled depending on settings, they can
take a lot of tweaking.
▪ Can detect 'out of the ordinary' activity, not just attacks.
▪ Takes much more work and skills.
Hybrid-Based:
▪ Systems combining both are more used now and check for both signatures and
abnormalities.
Intrusion Events and Masking:
▪ IDS/IPS obviously then prompt attackers to develop attacks that try to avoid
detection.

Fragmentation: Sending fragmented packets, the attack can avoid the
detection system's ability to detect the attack signature.

Avoiding Defaults: The TCP port utilized by a protocol does not always
provide an indication to the protocol which is being transported.
Attackers can send malware over an unexpected port.

Low-Bandwidth Coordinated Attacks: A number of attackers (or agents)
allocate different ports or hosts to different attackers making it difficult
for the IDS to correlate the captured packets and deduce that a network
scan is in progress.
30 | P a g e
https://thorteaches.com/
CC Chapter 4
▪
▪

Lecture notes
Alerts on IDS’s/IPS’s can, like biometrics, be one of 4 categories:

True Positive: An attack is
happening, and the system
detects it and acts.

True Negative: Normal traffic
on the network and the system
detects it and does nothing.

False Positive: Normal traffic
and the system detects it and
acts.

False Negative: An attack is
happening the system does not
detect it and does nothing.
We rarely talk about the “true” states since things are happening like they are
supposed to, we are interested in when it doesn’t, and we prevent authorized
traffic or allow malicious traffic.
SIEM and SOAR systems:


SIEM (Security information and event management):
▪ Provides a holistic view of our organization’s events and incidents.
▪ Gathers from all our systems and looks at everything.
SOAR (Security Orchestration, Automation, and Response):
▪ A software solution that uses AI to allows us to respond to some security
incidents automatically.
▪ SOAR will also react to some events.
31 | P a g e
https://thorteaches.com/
CC Chapter 4

Honeypots and Honeynets:

Honeypots and Honeynets:
▪ Honeypots:
▪ System looking like a real system, but with the
sole purpose of attracting attackers.
▪ They are used to learn about our vulnerabilities
and how attackers would circumvent our security
measures.
▪

Lecture notes
Honeynets:

A network (real or simulated) of honeypots, can
be a full server farm simulated with applications,
OSs, and fake data.

Best practice segments the honeynet from our
actual network by a DMZ/firewall.

The SIEM/SOAR systems collect the data from our
internal systems as well as the honeynet.
Firewalls:

Firewalls: A firewall typically establishes a barrier between a trusted, secure internal
network, and another outside network, like the Internet.
▪ Packet filtering firewalls, OSI Layer 1-3.

Packet filters act by inspecting the "packets" which are transferred
between clients.

If a packet does not match the packet
filter's set of filtering rules, the packet
filter will drop the packet or reject it and
send error responses to the source.

Any packet that matches one of the
Permits is allowed to pass.

Rules are checked in order; the
attacker's traffic is dropped on the 3rd
filter rule. Drop anything trying to
access 100.1.1.100.

The internal machines can access the
server since their IPs are whitelisted in
the first rule.
32 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
▪
Stateful filtering firewalls, OSI Layer 1-4.

Records all connections
passing through and
determines whether a
packet is the start of a new
connection, a part of an
existing connection or not
part of any connection.

Static rules are still used,
these rules can now
contain connection state
as one of their criteria.

Some DOS attacks
bombard the firewall with
thousands of fake
connection packets trying
to overwhelm the firewall
by filling its connection
state memory.
▪
A proxy server can act as a firewall by responding to input packets in the
manner of an application while blocking other packets.

A proxy server is a gateway from one network to another for a specific
network application in the sense that it
functions as a proxy on behalf of the
network user.
Application layer firewalls, OSI Layer 7.

The key benefit of application layer
firewalls is that they can understand
certain applications and protocols.

They see the entire packet, the packet
isn't decrypted until layer 6, any other firewall can
only inspect the packet but not the payload.

They can detect if an unwanted application or service is attempting to
bypass the firewall using a protocol on an allowed port or detect if a
protocol is being used any malicious way.
Network firewalls filter traffic between two or more networks, either software
appliances running on general purpose hardware or hardware-based firewall.
Host-based firewalls provide a layer of software security on one host that
controls network traffic in and out of that single machine.
▪
▪
▪
33 | P a g e
https://thorteaches.com/
CC Chapter 4
▪

Lecture notes
Next-generation firewall (NGFW)

NGFW combines traditional firewall technologies with deep packet
inspection (DPI) and network security systems (IDS/IPS, malware
filtering and antivirus).

Packet inspection in traditional firewalls only looks at the protocol
header of the packet DPI also looks at the actual data the packet is
carrying.

Next-generation firewalls tries to include more layers of the OSI model,
improving filtering of network traffic that is dependent on the packet
contents.

DPI firewalls track the progress of web browsing sessions and can tell if
a packet payload, when assembled with other packets in an HTTP server
reply, is actually a legitimate HTML-formatted response.
Firewalls Design:
▪ DMZs:

Normal DMZs use 2 firewalls in a screened
subnet, but they can also be three-legged
DMZs which only use 1 firewall.

Physical or logical subnetwork that contains
and exposes an organization's externalfacing services to an untrusted network, like
the Internet.

It adds an additional layer of security to our
organization's LAN, an external network
node can access only what is exposed in the
DMZ, while the rest of the organization's
network is firewalled.

Firewalls are designed to fail closed, if they
crash, get flooded with traffic or are shut
down, they block all traffic.

To get some redundancy we often use
firewall pairs and have the firewall in a mesh
topology, this way one firewall failure will
just shift the traffic paths.
34 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
 0-day Attacks and Exploits:

0-day Vulnerabilities:
▪ Vulnerabilities not generally known or discovered, the first time an attack is
seen is considered day 0, hence the name.
▪ From when a vulnerability is discovered it is now only a short timespan before
patches or signatures are released on major software.
▪ With millions of lines of code in a lot of software and the 1% errors we talked
about there will always be new attack surfaces and vulnerabilities to discover.
The only real defense against the 0-day exploits is defense in depth and when
discovered immediate patching as soon as it is available, and we have tested it
in our test environments. Most signatures in IDS/IPS and anti-virus auto update
as soon as new signatures are available.
▪ 0-day Vulnerability: The vulnerability that has not been widely discovered and
published.
▪ 0-day Exploit: Code that uses the 0-day vulnerability.
▪ 0-day Attack: The actual attack using the code.
▪
Stuxnet has three modules:

A worm that executes all routines related to the main payload of the
attack.

A link file that automatically executes the propagated copies of the
worm.

A rootkit responsible for hiding all malicious files and processes,
preventing detection of Stuxnet.

It is introduced to the target environment by an infected USB flash
drive.

The worm then propagates across the network, scanning for Siemens
Step7 software on computers controlling a PLC, If both are not present,
Stuxnet becomes dormant inside the computer, it will still replicate the
worm.

If both are present, Stuxnet introduces the infected rootkit onto the PLC
and Step7 software, modifying the codes and giving unexpected
commands to the PLC while returning a loop of normal operations
system values feedback to the users.
35 | P a g e
https://thorteaches.com/
CC Chapter 4

Lecture notes
Vulnerability Scanning/Testing:

Vulnerability Scanning/Testing:
▪ A vulnerability scanning tool is used to scan a network or system for a list of
predefined vulnerabilities such as system misconfiguration, outdated software,
or a lack of patching.
▪ It is very important to understand the output from a vulnerability scan, they can
be 100's of pages for some systems, and how do the vulnerabilities map to
Threats and Risks (Risk = Threat x Vulnerability).
▪ When we understand the true Risk, we can then plan our mitigation.
 Virtualization, Cloud, and Distributed Computing:

Virtualization:
▪ Virtualization poses a whole new set of standards, best practices, and security
concerns.
▪ With Virtualization we have many servers (clients) on the same hardware
platform (host).
▪ Virtualization is software running under the OS and above the Hardware (Ring 1).
▪ Traffic between the clients on the host doesn't have to traverse our network.
▪ Common Virtualization software could be VMWare, Hyper-V, or Xen.
▪ With Distributed Computing we use either multiple local or remote clients for
our needs, most commonly cloud computing. How do we ensure the cloud Data
Center meets our security posture, how do they segment their network?
36 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
▪
Virtualization holds a ton of benefits:

Virtualized environments cost a lot less than all physical servers.

It is much easier to stand up new servers (don't need to buy hardware,
wait 2 weeks, rack it, run power/internet).

You can easily back up servers with snapshots; server builds can be
done with images.

You can instantly reallocate resources.

They have lower power and cooling costs, a much smaller rack footprint
(50-100 servers in the space of 5-8).
▪
Hypervisor - Controls the access between the virtual guest/clients and the host
hardware.

Type 1 hypervisor (Bare Metal) is a part of a Virtualization OS that runs
on top of the host hardware (Think Data Center).

Type 2 hypervisor runs on top of a regular OS like Windows 10 - (Think
your PC).
▪
Virtualization also poses new
vulnerabilities because the
technology is new-ish and very complex.
Clients on the same host should be on the same network segment
(Internal/DMZ). A host should never house both zones.
Clients should be logically separated on the network like physical servers would
be (HR, Accounting, IT VLANs).
VM Escape (Virtualization escape) is when an attacker can jump from the host
or a client to another client, this can be even more of a concern if you have
different Trust Level Clients on the same host. They should ideally be on
separate hosts.
Hypervisor Security - If an attacker can get access to the hypervisor, they may
be able to gain access to the clients.
▪
▪
▪
▪
37 | P a g e
https://thorteaches.com/
CC Chapter 4
▪
Lecture notes
Resource Exhaustion - Admins oversubscribe the CPU/Memory and do not
realize more is needed (availability).

Cloud Computing:
▪ Cloud Computing - (There is no 'Cloud', it is just another computer somewhere
else).

When we use cloud computing we build or outsources some part of our
IT Infrastructure, storage, applications.

This can be done for many good reasons, but most are cost related.

Cloud Computing can be divided into 4 main types:
 Private Cloud Computing - Organizations build and run their
own cloud infrastructure (or they pay someone to do it for
them).
 Public Cloud Computing - Shared tenancy – A company builds
massive infrastructures and rents it out to anyone who wants it.
(Amazon AWS, Microsoft, Google, IBM).
 Hybrid Cloud Computing – A mix of Private and Public Cloud
Computing. An organization can choose to use Private Cloud for
sensitive information and Public Cloud for non-sensitive data.
 Community Cloud Computing – Only for use by a specific
community of consumers from organizations that have shared
concerns. (Mission, policy, security requirements, and/or
compliance considerations.)
▪ As with any other outsourcing, make sure you have the right to audit, pen test
(clearly agreed upon criteria), conduct vulnerability assessment, and check that
the vendor is compliant with your industry and the standards you adhere to.

Cloud Computing Public Cloud Computing:
▪ Platforms are normally offered as:

IaaS - (Infrastructure as a Service) The vendor provides infrastructure up
to the OS; the customer adds the OS and up.

PaaS - (Platform as a Service) The vendor provides pre-configured OSs,
then the customer adds all programs and applications.

SaaS - (Software as a Service) The vendor provides the OS and
applications/programs. Either the customer interacts with the software
manually by entering data on the SaaS page, or data is automatically
pushed from your other applications to the SaaS application (Gmail,
Office 365, Dropbox, Payroll,…).
38 | P a g e
https://thorteaches.com/
CC Chapter 4

Lecture notes
Distributed Systems:
▪ Can also be referred to as:

Distributed computing environment (DCE),
concurrent computing, parallel computing, and
distributed computing.
▪ A collection of individual systems that work together to
support a resource or provide a service.
▪ Most end-users see the DCE as a single entity and not as
multiple systems.
▪ Why do we use DCEs?

They can give us horizontal scaling (size,
geography, and administration), modular
growth, fault tolerance, cost-effectiveness,
low latency (users connect to the closest
node).
▪ Where do we use DCEs?

All over the place (The internet, websites, cell
networks, research, P2P networks, blockchain, …).
39 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
•

High-Performance Computing (HPC) Systems:
▪ Most often aggregates of compute nodes in a
system designed to solve complex calculations or
manipulate data at very high speeds.
▪ HPCs have 3 components. Compute, network, and
storage.
▪ All 3 must have enough resources to not become a
bottleneck.
▪ Most well-known versions are super computers.
Edge Computing Systems:
▪ The processing of data is done as close as possible
to where it is needed, we do that by moving the
data and compute resources.
▪ This will optimize bandwidth use and lower
latency.
▪ CDN’s are one of the most common types of edge
computing.
▪ 80%+ of large enterprises have already
implemented or are in the process of
implementing an edge computing strategy.
 The Internet of Things (IoT):



It is really anything “Smart”: Smart TVs, Thermostats, Lightbulbs, Cars, anything that
connects to the internet in some way (that didn’t before).
They can be an easy way into your smart device, as most are never patched (many don’t
even have the option).
Asset Tracking and Hardware Hardening:



Asset Tracking:
▪ Keeping an accurate inventory of all our assets is important; we can't protect
what we don't know we have.
▪ We covered this a little in our risk analysis section, but other than identifying
the assets, we also should have it as part of our technology refresh cycle to
record the Asset Serial Number, Model Number, and often an internal Asset ID.
Hardware Hardening:
▪ On our servers - we harden the server.

Apply all patches, block ports not needed, delete default users, … most
places are good about this.
▪ Workstations are often overlooked.
Disabling the USB Ports, CD drives and any other port that can introduce malware to
our network:
▪ Physically: Disabled on motherboard or port itself blocked, easy to bypass - not
very secure.
▪ Logically: Locked in Windows services or through AD (Active Directory) is not
easy to bypass (if done right) - more secure.
40 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
 Electricity:

Electricity:
▪ Electricity - It is important to have clean, reliable power for our servers, disk
arrays, network equipment.
▪ Loss of power can affect our availability and the Integrity of our data.

Nothing can be accessed, and power fluctuations can damage hardware
and corrupt data.
▪ Power Fluctuation Terms:

Blackout - Long loss of power.

Fault - Short loss of power.

Brownout - Long low voltage.

Sag - Short low voltage.

Surge - Long high voltage.

Spike - Short high voltage.
▪
Surge Protectors, UPSs and
Generators are used to get clean
power.

Surge Protectors - Protect
equipment from high voltage.

UPSs (Uninterruptible Power
Supplies):
 Ensure constant clean
power to the systems.
 Have large battery
banks that take over
in the event of a
power outage, they also act as surge protectors.

Generator:
 Fueled generators are programmed to kick in during a power
outage event manually or automatically (preferred).
 Will run as long as they have fuel, must be maintained.

PDU (Power Distribution Unit) can be in rack or not.
41 | P a g e
https://thorteaches.com/
CC Chapter 4

Lecture notes
Backups:

Fault Tolerance:
▪ To ensure our internal SLAs and provide as high availability as possible we use as
high degree of redundancy and resiliency as makes sense to that particular
system and data set.
▪ Backups:

One of the first things that comes to mind when talking about fault
tolerance is backups of our data, while it is very important it is often like
log reviews an afterthought and treated with "Set it and forget it"
mentality.

For backups we use Full, Incremental, Differential and Copy backups,
and how we use them is determined on what we need from our
backups.

How much data we can stand to lose and how fast we want the backup
and restore process to be.

In our backup solution we make backup policies of what to back up,
what to exclude, how long to keep the data of the Full, Incremental and
Differential backups.

All these values are assigned dependent on what we back up, and
normal organizations would have different backup policies and apply
those to the appropriate data.

This could be Full 3, 6, 12, 36, 84 months and infinity, the retention is
often mandated by our policies and the regulations in our field of
business.

It is preferable to run backups outside of business hours, but if the
backup solution is a little older it can be required to run around the
clock, in that case we put the smaller and less important backups in the
daytime and the important larger ones after hours.

We often want to exclude parts of the system we are backing up, this
could be the OS, the trashcan, certain program folders, ... we just
backup what is important and rarely everything.

If a system is compromised and the issue is a rootkit, the rootkit would
persist on the backup if we did a full mirror restore, by eliminating some
of the system data we not only backup a lot less data, we also may
avoid the infection we are trying to remedy.

For very important data we may do hourly incremental or use another
form of data loss prevention (covered later in this chapter).
Full Backup:
 This backs everything up, the entire database (most often), or
the system.
 A full backup clears all archive bits.
 Dependent on the size of the data we may do infrequent full
backups, with large datasets it can take many hours for a full
backup.
 IF we need to restore on Thursday:
42 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
 Restore with a single Wednesday full backup tape.
 1 tape.
Full Backup:
•
Everything in the backup policy is backed up.

Incremental Backup:
 Backs up everything that has changed since the last backup.
 Clears the archive bits.
 Incremental are often fast to do, they only backup what has
changed since the last incremental or full.
 The downside to them is if we do a monthly full backup and
daily incremental, we have to get a full restore and could have
to use up to 30 tapes, this would take a lot longer than with 1
Full and 1 Differential.
 IF we need to restore on Thursday:
 Restore with the full Sunday backup and Monday,
Tuesday, and Wednesday’s incremental tapes.
 4 tapes.
Incremental Backup:
•
Anything changed since the last backup is backed up.
•
The archive bit is cleared.

Differential Backup:
 Backs up everything since the last Full backup.
 Does not clear the archive bit.
 Faster to restore since we just need 2 tapes for a full restore,
the full and the differential.
 Backups take longer than the incremental, we are backing
everything since the last full.
43 | P a g e
https://thorteaches.com/
CC Chapter 4


Lecture notes
Never use both incremental and differential on the same data, it
is fine on the same backup solution, different data has different
needs.
IF we need to restore on Thursday:
 Restore with the Sunday full backup and Wednesday’s
incremental tapes.
 2 tapes.
Differential Backup:
•
Anything changed since the last Full backup is backed up.
•
The archive bit is not cleared.
▪
Copy Backup:

This is a full backup with one important difference, it does not clear the
archive bit.

Often used before we do system updates, patches, and similar
upgrades.

We do not want to mess up the backup cycle, but we want to be able to
revert to a previous good copy if something goes wrong.
▪
Archive Bit:

For Windows the NTFS has an archive bit on file, it is a flag that indicates
if the file was changed since the last Full or Incremental backup.
 Fault Tolerance, Redundancy, and Resiliency:

RAID (Redundant Array of Independent/Inexpensive Disks):
▪ Comes in 2 basic forms, disk mirroring and disk striping.

Disk Mirroring:
 Writing the same data across multiple hard disks, this is slower,
the RAID controller has to write all data twice.
 Uses at least 2 times as many disks for the same data storage,
needs at least 2 disks.

Disk Striping:
 Writing the data simultaneously across multiple disks providing
higher write speed.
 Uses at least 2 disks, and in itself does not provide redundancy.
 We use parity with striping for the redundancy, often by XOR, if
we use parity for redundancy, we need at least 3 disks.
44 | P a g e
https://thorteaches.com/
CC Chapter 4
Disk Striping, no parity:
Disk Mirroring:
Disk A
Disk B
▪
▪
▪
Lecture notes
Disk A
Disk B
Disk C
There are many different types of RAID, for the exam I would know the above
terms and how RAID 0, 1 and 5 works.
RAID 0:

Striping with no mirroring or parity, no fault tolerance, only provides
faster read write speed, requires at least 2 disks
RAID 1:

Mirror set, 2 disks with identical data, and write function is written to
both disks simultaneously.
RAID 1
RAID 0
45 | P a g e
https://thorteaches.com/
CC Chapter 4
▪
Lecture notes
RAID 5:


Block level striping with distributed parity, requires at least 3 disks.
Combined speed with redundancy.
RAID 5
▪
▪
▪
▪

RAID will help with data loss when we have a single disk failure if we use a fault
tolerant RAID type, if more than one disk fails before the first is replaced and
rebuilt, we will need to restore from our tapes.
Most servers have the same disks with the same manufacturer date, they will
hit their MTBF (Mean time between failures) around the same time.
Larger data centers often have SLAs with the hard disk/server vendor, which
also includes MTTR (Mean time to repair).
This could be within 4 or 8 hours the vendor has to be onsite with a
replacement disk.
System Redundancy:
▪ On top of the RAID and the backups we also try to provide system redundancy
as well as redundant parts on the systems.
▪ The most common system failures are from pieces with moving parts, this could
be disks, fans, or PSU (power supplies).
▪ Most servers have redundant power supplies, extra fans, redundant NIC’s.
▪ The NIC and PSU serve a dual purpose, both for internal redundancy and
external. If a UPS fails, the server is still operational with just the 1 PSU getting
power.
▪ Redundant disk controllers are also reasonably common, we design and buy the
system to match the redundancy we need for that application.
▪ Often, we have spare hardware on hand in the event of a failure, this could
include hard disks, PSU's, fans, memory, NICs.
▪ Many systems are built for some hardware to be hot-swappable, most
commonly HDD's, PSU’s, and fans.
46 | P a g e
https://thorteaches.com/
CC Chapter 4
▪
▪
▪
▪
▪
▪
▪
▪
Lecture notes
If the application or system is important, we often also have multiple systems in
a cluster.
Multiple servers often with a virtual IP, seen as a single server to users.
Clustering is designed for fault tolerance, often combined with load balancing,
but not innately.
Clustering can be active/active, this is load balancing, with 2 servers both
servers would actively process traffic.
In well-designed environments the servers are geographically dispersed.
Database Shadowing:

Exact real time copy of the database or files to another location.
Electronic Vaulting (E-vaulting):

Using a remote backup service, backups are sent off-site electronically
at a certain interval or when files change.
Remote Journaling:

Sends transaction log files to a remote location, not the files
themselves.
 Fire Suppression:

Fire Suppression is done by removing one of the 3
requirements a fire has.
▪ A fire needs Oxygen, Heat, and Fuel to burn.
▪ Removing any of the 3 will put the fire out.
▪ Removing Oxygen is done by replacing the
oxygen in the room with something else or
covering the fire, so the burning material
doesn’t have oxygen access (Halon, FM200,
Argon).
▪ Removing Heat is done by adding chemicals
or water to the fire, cooling it down.
▪ Removing Fuel is rarely done since the fuel is
our equipment.

Fire Classes:
▪ Answer all questions from a right point of view and in a top-down security
organization.
47 | P a g e
https://thorteaches.com/
CC Chapter 4

Lecture notes
Automatic Fire Suppression Systems:
▪ Water:

Removes the “heat” leg of the fire triangle by lowering the temperature.

Is the safest suppression
agent, but for Data Centers:

Water + hardware = dead
hardware.

Electricity could always be
cut before water is used.

Sprinkler Systems:
 Sprinklers have
different types of
bulbs for different
temperatures.
 Should be
connected to
alarm/warning
sirens and lights.
 Each sprinkler head
is independent; it
will trigger if the
temperature for that bulb is met.
48 | P a g e
https://thorteaches.com/
CC Chapter 4




Lecture notes
Wet Pipe: Sprinkler heads are closed. The pipes for the sprinkler
system have water until the sprinkler.
Dry Pipe: Sprinkler heads are closed.
The pipe contains compressed air and a valve that stays shut as
long as the air is present.
Fire Suppression:
▪ Fire Extinguishers:

A fire extinguisher is an active fire protection device used to extinguish
or control small fires, often in emergency situations.

All portable fire extinguishers should be marked with the type of fire
they are designed to extinguish.

Never use a fire extinguisher on a fire it was not intended for.

Use the PASS method to extinguish a fire with a portable fire
extinguisher:
 Pull the pin in the handle.
 Aim at the base of the fire.
 Squeeze the lever slowly.
 Sweep from side to side.
 Secure Design Principles:





Least Privilege:
▪ We give employees the minimum necessary access they
need, no more, no less.
Need to Know:
▪ Even if you have access, if you do not need to
know, then you should not access the data
(Kaiser employees).
Separation of Duties:
▪ More than one individual in one single task
is an internal control intended to prevent
fraud and error.
▪ We do not allow the same person to enter
the purchase order and issue the check.
▪ For the exam assume the organization is large
enough to use separation of duties, in smaller
organizations where that is not practical,
compensating controls should be in place.
Defense in Depth – Also called Layered Defense or Onion Defense:
▪ We implement multiple overlapping security controls to protect an asset.
▪ This applies to physical, administrative, and logical controls.
Secure Defaults:
▪ A program or a system is as secure as possible when implemented.
▪ We can then remove security for usability.
▪ What is secure and usability is determined by risk analysis and usability tests.
49 | P a g e
https://thorteaches.com/
CC Chapter 4






Lecture notes
Fail Securely:
▪ Systems are designed to prevents or mitigates unsafe consequences if the
system fails.
▪ If the system fails, it stays at least as secure as it was before the failure.
▪ Open/safe vs. closed/secure.
Keep It Simple:
▪ Keeping our security simple, makes it better understood and accepted.
▪ The more complex our security is the harder it is to control, troubleshoot, and
manage.
Trust but Verify:
▪ Implicit trust but we verify you.
▪ A majority of serious compromises are from privileged users (admins accounts).
Zero Trust (never trust, always verify) - NIST SP 800-207 - Zero Trust Architecture:
▪ We do by default not trust devices on our network, even if they have been
verified.
▪ We change our defenses from static, network-based perimeters to focus on
users, assets, and resources.
▪ With ZT there is no implicit trust given to assets or users based on their physical
or logical location.
▪ We use authentication and authorization of both subject and device that is done
before a session to an enterprise resource can be established.
Privacy by Design:
▪ Proactive not reactive, Privacy as the default setting, Privacy embedded into
design, Full functionality, End-to-end security, Visibility and transparency,
Respect for user privacy
Shared Responsibility:
▪ With cloud computing the provider and customer share responsibility for the
security.
➢ Domain 4: What we covered.

This is a GIANT domain.








Network Basics and Definitions.
The OSI and TCP/IP model.
IP Addresses, Port Numbers, and MAC Addresses.
Wi-Fi and other wireless networks.
Virtualization, Cloud, and Distributed Computing.
Fault tolerance and resiliency.
Data centers.
Attacks and Attackers.
50 | P a g e
https://thorteaches.com/
CC Chapter 4
Lecture notes
51 | P a g e
https://thorteaches.com/
CC Chapter 5
Lecture notes
Welcome to the Fifth Chapter.
➢ Domain 5: What we will be covering.
•
This is everything we do in our day-to-day jobs to make sure we are secure.
•
•
•
•
•
•
•
Configuration, patch, and change management.
Cryptography and hashing.
Attacks on our cryptography.
Data handling, classification, labeling, retention, and destruction/disposal.
Administrative (Directive) controls.
Security awareness training.
Social engineering.
 Configuration Management:
•
Configuration Management:
▪ When we receive or build new systems, they often are completely open, before
we introduce them to our environment we harden them.
▪ We develop a long list of ports to close, services to disable, accounts to delete,
missing patches and many other things.
▪ Often it is easier to have OS images that are completely hardened and use the
image for the new system, we then update the image when new vulnerabilities
are found or patches need to be applied, often though we use a standard image
and just apply the missing patches.
▪ We do this for any device on our network, servers, workstations, phones,
routers, switches,...
▪ Pre-introduction into our production environment we run vulnerability scans
against the system to ensure we didn't miss anything (Rarely done on
workstations, should be done on servers/network equipment).
▪ Having a standard hardening baseline for each OS ensures all servers are
similarly hardened and there should be no weak links, we also have the
standardized hardening making troubleshooting much easier.
▪ Once a system is introduced to our production environment we monitor
changes away from our security baseline, most changes are administrators
troubleshooting or making workarounds, which may or may not be allowed, but
it could also be an attacker punching a path out of our network.
 Patch Management:
•
Patch Management:
▪ In order to keep our network secure we need to apply patches on a regular
basis.
▪ Whenever a vulnerability is discovered the software producer should release a
patch to fix it.
▪ Most organizations give the patches a few weeks to be reviewed and then
implement them in their environment.
1|Page
https://thorteaches.com/
CC Chapter 5
▪
▪
Lecture notes
We normally remember the OS patches, but can often forget about network
equipment updates, array updates, IoT updates and so on, if they are not
patched, we are not fully using defense in depth and we can expose ourselves to
risk.
We use software to push our patches to all appropriate systems, this is easier,
we ensure all systems gets patched and they all get the same parts of the patch,
we may exclude some parts that have an adverse effect on our network.
 Change Management:
•
Change Management:
▪ Our formalized process on how we handle changes to our environments.
▪ If done right we will have full documentation, understanding and we
communicate changes to appropriate parties.
▪ The change review board should be comprised of both IT and other operational
units from the organization, we may consider impacts on IT, but we are there to
serve the organization, they need to understand how it will impact them and
raise concerns if they have any.
▪ A change is proposed to the change board, they research in order to understand
the full impact of the change.
▪ The person or group submitting the change should clearly explain the reasons
for the change, the pro's and con's of implementing and not implementing, any
changes to systems and processes they know about and in general aide and
support the board with as much information as needed.
▪ The board can have senior leadership on it or they can have a predefined range
of changes they can approve and anything above that threshold they would
make recommendations but changes require senior leadership approval.
▪
There are many different models and process flows for change management,
some are dependent on organization structure, maturity, field of business and
many other factors.
⬥ A generalized flow would look like this:
→ Identifying the change.
→ Propose the change.
→ Assessing risks.
→ Provisional change approval.
→ Testing the change.
→ Scheduling the change.
→ Change notification for impacted parties.
→ Implementing the change.
→ Post implementation reporting of the actual change impact.
2|Page
https://thorteaches.com/
CC Chapter 5
▪
▪

Lecture notes
We closely monitor and audit changes, remember changes can hold residual risk
which we would then have to mitigate.
Everything in the change control process should be documented and kept, often
auditors want to see that we have implemented proper change controls, and
that we actually follow the paper process we have presented them with.
Cryptography:
•
The History of Cryptography (yes, this is testable).
▪ Spartan Scytale - Message written
lengthwise on a long thin piece of
parchment wrapped around a certain
size round stick. By itself it would make
no sense, but if rewrapped around a
stick of the same diameter it would be
decipherable.
▪ Caesar Cipher (Substitution) - Done by
switching Letters by a certain number of spots in the alphabet.
•
For the exam, what you need to know is that cryptography helps us:
▪ Keep our secrets secret (Confidentiality) ← This is what most people think all
cryptography does.
▪ Keep our data unaltered (Integrity).
▪ Provide a way to verify (Authentication) our Subjects; it can also provide nonrepudiation.
•
Definitions:
▪ Cryptology is the science of securing communications.
▪ Cryptography creates messages where the meaning is hidden.
▪ Cryptanalysis is the science of breaking encrypted communication.
3|Page
https://thorteaches.com/
CC Chapter 5
Lecture notes
⬥
▪
▪
▪
▪
▪
▪
▪
Cryptanalysis is used to breach cryptographic security systems and gain
access to the contents of encrypted messages, even if the cryptographic
key is unknown.
⬥ It uses mathematical analysis of the cryptographic algorithm, as well as
side-channel attacks that do not target weaknesses in the cryptographic
algorithms themselves, but instead exploit weaknesses in their
implementation and the devices that run them.
Cipher is a cryptographic algorithm.
Plaintext (Cleartext) is an unencrypted message.
Ciphertext is an encrypted message.
Encryption converts the plaintext to a ciphertext.
Decryption turns a ciphertext back into a plaintext.
Book Cipher - Use of a well-known text (Often a book) as the key.
⬥ Messages would then look like 244.2.13, 12.3.7, 41.42.1,...
⬥ The person reviewing the message would look at page 244, sentence 2,
word 13, then page 12, sentence 3, word 7, page 41, sentence 42 word
1,...
Running-Key Cipher – uses a well-known test as a key as well but uses a
previously agreed upon phrase.
⬥ The sender would add the plaintext message to the letters from the key,
and the receiver would subtract the letters from the key.
•
Asymmetric vs Symmetric Encryption and Hybrid:
▪ Asymmetric
⬥ Pros: It does not need a pre-shared
key, only 2x users = total keys.
⬥ Cons: It is much slower; it is weaker
per bit.
▪ Symmetric:
⬥ Pros: Much faster, stronger per bit.
⬥ Cons: Needs a pre-shared key, n(n1)/2 users, becomes unmanageable
with many users.
•
Asymmetric Encryption (Public Key Encryption):
▪ Asymmetric Encryption uses 2 keys: A Public Key and a Private Key (Key Pair):
⬥ Your Public Key is publicly available.
→ Used by others to encrypt messages sent to you. Since the key is
asymmetric, the cipher text can't be decrypted with your public
Key.
⬥ Your Private Key - You keep this safe.
→ You use it to decrypt messages sent with your public key.
4|Page
https://thorteaches.com/
CC Chapter 5
•

Asymmetric vs Symmetric Encryption and Hybrid:
▪ Hybrid Encryption:
⬥ Uses Asymmetric encryption to share a Symmetric Key (session key).
⬥ We use the security over an unsecure media from Asymmetric for the
initial exchange and we use the speed and higher security of the
Symmetric for the actual data transfer.
⬥ The Asymmetric Encryption may send a new session key every so often
to ensure security.
Hashing:
•

Lecture notes
Hash Functions (One-Way Hash Functions) are used for Integrity:
▪ A variable-length plaintext is hashed into a fixed-length value hash or MD
(Message Digest).
▪ It is used to prove the Integrity of the data has not changed. Even changing a
comma in a 1000-page document will produce an entirely new hash.
▪ Collisions: When 2 hashes of different
data provide the same hash. It is
possible, but very unlikely.
▪ Just 1 bit change completely changes
the hash.
▪ Using Great Expectations (Charles
Dickens 1867 Edition again, 4 pages at
font size 11, 1827 words, 7731
characters).
▪ Hash#1 is the original
2b72b2c18554112e36bd0db4f27f1d89
▪ Hash#2 is with 1 comma removed
21b78d32ed57a684e7702b4a30363161
▪ Just a single “.” added will change the hash value to
5058f1af8388633f609cadb75a75dc9d
Attacks on our Cryptography:
•
Cryptographic Attacks:
▪ Steal the Key: Modern encryption being so difficult to break, it is easier to
recover the private key.
⬥ Law enforcement does this when they get search warrants, to recover
the private key from the PC or phone of someone charged with a crime.
⬥ Attackers do this by gaining access to your system or key repository;
they can then decrypt your data.
▪ Brute Force:
⬥ Uses the entire key space (every possible key); with enough time, any
plaintext can be decrypted.
⬥ Effective against all key-based ciphers except the one-time pad; it would
eventually decrypt it, but it would also generate so many false positives
that the data would be useless.
5|Page
https://thorteaches.com/
CC Chapter 5
▪
Key stretching: Adding 1-2 seconds to password verification.
⬥ If an attacker is brute forcing password and needs millions of attempts,
it will become an unfeasible attack vector.
▪
Man-in-the-Middle Attack (MITM):
⬥ The attacker secretly relays and may alter
communication between two parties, who
believe they are directly communicating
with each other.
⬥ The attacker must be able to intercept all
relevant messages passing between the
two victims.
⬥ They can alter the information, just steal it
or inject new messages.
Side Channel Attacks:
⬥ Attackers use physical data to break a crypto system. This can be CPU
cycles, power consumption while encrypting/decrypting,...
▪

Lecture notes
Data Handling Classification Labeling Retention Destruction/Disposal:
•
Sensitive information
▪ Data handling:
⬥ Only trusted individuals should handle our data; we should also have
policies on how, where, when, and why the data was handled. Logs
should be in place to show these metrics.
▪ Data storage:
⬥ Where do we keep our sensitive data? It should be kept in a secure,
climate-controlled facility, preferably geographically distant or at least
far enough away that potential incidents will not affect that facility too.
⬥ Many older breaches were from bad policies around tape backups.
⬥ Tapes were kept at the homes of employees instead of at a proper
storage facility or in a storage room with no access logs and no access
restrictions (often unencrypted).
▪ Data retention:
⬥ Data should not be kept beyond the period of usefulness or beyond the
legal requirements (whichever is greater).
⬥ Regulation (HIPAA or PCI-DSS) may require a certain retention of the
data (1, 3, 7 years, or infinity).
⬥ Each industry has its own regulations and company policies may differ
from the statutory requirements.
⬥ Know your retention requirements!
•
Paper disposal – It is highly encouraged to dispose of ANY paper with any data on it in a
secure manner. This also has standards and cross shredding is recommended.
It is easy to scan and have a program re-assemble documents from normal shreds like
this one.
6|Page
https://thorteaches.com/
CC Chapter 5
Lecture notes
•
Digital disposal – The digital disposal procedures are determined by the type of media.
▪ Deleting, formatting, and overwriting (Soft destruction):
⬥ Deleting a file just removes it from the table; everything is still
recoverable.
⬥ Formatting does the same, but it also puts a new file structure over the
old one. Still recoverable in most cases.
⬥ Overwriting (Clear) is done by writing 0s or random characters over the
data.
⬥ Sanitization is a process of rendering target data on the media
infeasible for a given level of recovery effort.
⬥ Purge is removing sensitive data from a system or device to a point
where data recovery is no longer feasible even in a laboratory
environment.
•
Degaussing destroys magnetic media by exposing it to a very strong magnetic field. This
will also most likely destroy the media integrity.
Full physical destruction is safer than soft destruction:
▪ Disk crushers do exactly what their name implies: they crush disks (often used
on spinning disks).
▪ Shredders do the same thing as paper shredders do; they just work on metal.
These are rare to have at normal organizations, but you can buy the service.
▪ Incineration, pulverizing, melting, and acid are also (very rarely) used to ensure
full data destruction.
It is common to do multiple types of data destruction on sensitive data (both degaussing
and disk crushing/shredding).
•
•
•
The Information Life Cycle:
▪ Data acquisition.
⬥ The information is either created or
copied from another location.
⬥ Make it useful, index it, and store it.
▪ Data use.
⬥ How to we ensure the data is kept
confidential, the integrity is intact,
and it is available when needed (The
CIA triad).
▪ Data archival.
⬥ Retention required by law, or the
data will be used later.
▪ Archival vs. backup.
▪ Data disposal.
⬥ How do we dispose properly of the
data once it is no longer useful and
required.
7|Page
https://thorteaches.com/
CC Chapter 5
Lecture notes
 Administrative (Directive) Controls:
•
Access Control Categories:
▪ Administrative (Directive) Controls:
⬥ Organizational policies and procedures.
▪ Technical Controls:
⬥ Hardware/software/firmware – Firewalls, routers, encryption.
▪ Physical Controls:
⬥ Locks, fences, guards, dogs, gates, bollards.
•
Access Control Types:
▪ Access Control Types (Many can be multiple types – On the exam look at
question content to see which type it is).
⬥ Preventative:
→ Prevents action from happening.
⬥ Detective:
→ Controls that Detect during or after an attack.
⬥ Corrective:
→ Controls that Correct an attack.
⬥ Recovery:
→ Controls that help us Recover after an attack.
⬥ Deterrent:
→ Controls that Deter an attack.
⬥ Compensating:
→ Controls that Compensate.
8|Page
https://thorteaches.com/
CC Chapter 5
Lecture notes
•
Policies – Mandatory and high level.
▪ AUP (Acceptable Use Policy).
⬥ What is acceptable use of the network, data,
resources, …
▪ BYOD (Bring Your Own Device) policy.
⬥ Allows employees to bring their own
devices within certain parameters.
▪ Privacy policy.
⬥ How we gather, use, disclose, and
manage private data.
•
Policies – Mandatory.
▪ Password policy.
⬥ Remember last 24 passwords.
⬥ Max. password age 90 days.
⬥ Min. password age 2 days
⬥ Min. password length 8
characters.
⬥ Complex passwords.
⬥ Stored not using
reversible encryption.
▪ ,…
•
•
Data handling policy:
Classify, categorize, label, encrypt, store, backup, disposal/destroy.
•
Data has 3 States:
▪ Data at Rest: Stored data.
▪ Data in Motion: Data being transferred on a network.
▪ Data in Use: We are actively using the files/data, it cannot be encrypted.
 Training and Awareness:
•
Users often pose the largest security risk:
▪ Training: Provides users with a skillset - this is nice, but if they ignore the
knowledge, it does nothing.
▪ Awareness: Change user behavior - this is what we want, we want them to
change their behavior.
▪ We want to build a cybersecurity culture, with a good cyber hygiene.
9|Page
https://thorteaches.com/
CC Chapter 5
Lecture notes
 Social Engineering:
•
Cryptographic Attacks:
▪ Social Engineering:
⬥ Much easier than breaking the key is convincing the key holder to hand
it over to the “help desk”.
FREE ICE CREAM!
▪ A very successful social engineering attack was a Pentest company driving up in
front of a company office with "Free Ice Cream” and company logo signs on an
ice cream van.
•
Social Engineering uses people skills to bypass security controls.
▪ Can be used in a combination with many other attacks, especially client-side
attacks or physical tests.
▪ Attacks are often more successful if they use one or more of these approaches:
⬥ Authority (someone you trust or are afraid of) - Look and sound like an
authority figure, be in charge, this can be in a uniform or a suit. Most
effective with impersonation, whaling, and vishing attacks.
⬥ Intimidation (If you don't bad thing happens) - Virus on the network,
credit card compromised, lawsuit against your company, intimidation is
most effective with impersonation and vishing attacks.
•
Social Engineering Attacks:
▪ Consensus (Following the crowd, everyone else was doing it) - Fake reviews on
a website, using consensus/social proof is most effective with Trojans and
hoaxes.
▪ Scarcity (If you don't act now, it is too late) - New iPhone out, only 200
available, often effective with phishing and Trojan attacks.
▪ Urgency (It has to happen now or else) - The company will be sued for
$1,000,000 if these papers are not filled out before Friday, often used with
Phishing.
▪ Familiarity (Have a common ground or build it) - Knowing something about the
victim ahead of time and then reference it can raise chances of a successful
attack drastically. People want to be helpful, if they feel like they know you they
want too even more. Often successful with vishing and in-person social
engineering.
•
Phishing, spear phishing, and whale phishing: Fishing spelled in hacker speak with Ph
not F.
▪ Phishing (Social engineering email attack):
⬥ Click to win, Send information to get your inheritance …
⬥ Sent to hundreds of thousands of people; if just 0.02% follow the
instructions they have 200 victims.
→ A public treasurer in Michigan sent $1.2m to Nigeria ($1.1m of
taxpayer funds and $72,000 of his own).
10 | P a g e
https://thorteaches.com/
CC Chapter 5
▪
▪
▪
Lecture notes
Spear Phishing: Targeted phishing, not just random spam, but targeted at
specific individuals.
⬥ Sent with knowledge about the target (person or company); familiarity
increases success.
Whale Phishing (Whaling): Spear phishing targeted at senior leadership of an
organization.
⬥ This could be: “Your company is being sued if you don’t fill out the
attached documents (with trojan in them) and return them to us within
2 weeks”.
Vishing (Voice Phishing): Attacks over automated VOIP (Voice over IP) systems,
bulk spam similar to phishing.
⬥ These are: “Your taxes are due”, “Your account is locked” or “Enter your
PII to prevent this” types of calls.
➢ Domain 5: What we covered.
•
This is everything we do in our day-to-day jobs to make
sure we are secure.
•
•
•
•
Configuration, patch, and change management.
Cryptography and hashing.
Attacks on our cryptography.
Data handling, classification, labeling, retention, and
destruction/disposal.
Administrative (Directive) controls.
Security awareness training.
Social engineering.
•
•
•
11 | P a g e
https://thorteaches.com/
Download