Principles of Information Assurance Corey Schou Dan Shoemaker Copyright 2003 Introduction to Information Assurance (CDS) ___________________________________ 17 McCumber Model (CDS) _________________________________________________________ 17 International View (DAN) ________________________________________________________ 17 BS 7799 (DAN) ________________________________________________________________________ 17 ISO 17799 (DAN) ______________________________________________________________________ 17 Assurance Management __________________________________________________________ 17 Confidentiality (CDS) (0011) _____________________________________________________________ 17 Integrity (CDS) (0011)___________________________________________________________________ 17 Availability (CDS) (0011) ________________________________________________________________ 17 Access Control (0010) _______________________________________________________ 18 Access Control Administration (0010) ______________________________________________ 18 Centralized Systems (0010) _______________________________________________________________ 18 Diameter (0010) ______________________________________________________________________ 18 RADIUS (0010) ______________________________________________________________________ 18 TACAC (0010) ______________________________________________________________________ 18 Decentralized Systems (0010) _____________________________________________________________ 18 Access Control Models and Techniques (0010) _______________________________________ 18 Categories of Access Control (0011) ________________________________________________________ 18 System Access Controls (0011) __________________________________________________________ 18 Data Access Controls (0011) ____________________________________________________________ 18 Access Control Techniques (0010) _________________________________________________________ 18 Capability Tables and ACL (0010) _______________________________________________________ 18 Content Dependent Access Control (0010) _________________________________________________ 18 Restricted Interfaces (0010) _____________________________________________________________ 18 DAC (0010) ___________________________________________________________________________ 18 MAC (0010)___________________________________________________________________________ 18 RBAC (0010) __________________________________________________________________________ 18 Concepts of Access Control (0011) _________________________________________________ 18 Control Types (0011) ____________________________________________________________________ 18 Access Control Services (0011) ____________________________________________________________ 18 Identification and Authentication (0010) ____________________________________________ 18 Authentication (0010) ___________________________________________________________________ 18 Biometrics (0010) ____________________________________________________________________ 18 Cognitive Password (0010) _____________________________________________________________ 18 Cryptographic Keys (0010) _____________________________________________________________ 18 Memory Cards (0010) _________________________________________________________________ 18 One Time Passwords (0010) ____________________________________________________________ 18 Passphrase (0010) ____________________________________________________________________ 18 Passwords (0010) _____________________________________________________________________ 18 Smart Cards (0010) ___________________________________________________________________ 18 Authorization (0010) ____________________________________________________________________ 18 Stage Setting __________________________________________________________________________ 18 Intrusion Detection Systems (0010) (0100) ___________________________________________ 18 Behavior Based (0010) __________________________________________________________________ 18 Host Based (0010) ______________________________________________________________________ 18 Network Based (0010) ___________________________________________________________________ 18 Signature Based (0010) __________________________________________________________________ 18 Pros and Cons (0010)____________________________________________________________________ 18 Single Sign-On Technology (0010) _________________________________________________ 18 Directory Services (0010) ________________________________________________________________ 18 KERBEROS (0010) _____________________________________________________________________ 18 SESAME (0010) _______________________________________________________________________ 18 Thin Clients? (0010) ____________________________________________________________________ 18 Unauthorized Access Control and Attacks (0010) _____________________________________ 18 Unauthorized Disclosure of Information (0010) _______________________________________________ 18 Emanation Security (WAP and TEMPEST) (0010) ____________________________________________ 18 Attack Types (0010) ____________________________________________________________________ 18 Network Attacks _____________________________________________________________________ 19 Syn Flood _________________________________________________________________________ 19 ICMP Flood _______________________________________________________________________ 19 UDP Flood ________________________________________________________________________ 19 SMURF __________________________________________________________________________ 19 Fraggle ___________________________________________________________________________ 19 Teardrop __________________________________________________________________________ 19 Spoofing __________________________________________________________________________ 19 Penetration Testing (Right Place?) (0010) ____________________________________________________ 19 Applications and Systems Development (0010) ___________________________________ 20 Knowledge Based Systems and Intelligence (0010) (0011) ______________________________ 20 Artificial Neural Network (0010) (IGGY) ____________________________________________________ 20 Expert Systems (0010) ___________________________________________________________________ 20 Application Security Controls _____________________________________________________ 20 Abstraction (0011) ______________________________________________________________________ 20 Accountability (0011) ___________________________________________________________________ 20 Data Hiding (0011) _____________________________________________________________________ 20 Defense in Depth (0011) _________________________________________________________________ 20 Hardware Segmentation (0011) ____________________________________________________________ 20 Process Isolation (0011)__________________________________________________________________ 20 Reference Monitor (0011) ________________________________________________________________ 20 Security Kernel (0011)___________________________________________________________________ 20 Separation of Privilege (0011) _____________________________________________________________ 20 Service Level Agreements (0011) __________________________________________________________ 20 Supervisor and User Modes (0011) _________________________________________________________ 20 System High Mode (0011) ________________________________________________________________ 20 Data and Information Security (0011) (CDS) ________________________________________ 20 Primary Storage (0011) __________________________________________________________________ 20 Real and Virtual (0011) __________________________________________________________________ 20 Secondary Storage (0011) ________________________________________________________________ 20 Databases (0010) ________________________________________________________________ 20 Aggregation and Inference (0010) __________________________________________________________ 20 Concurrency Issues (0010) _______________________________________________________________ 20 Data Mine (0010) _______________________________________________________________________ 20 Data Warehouse (0010) __________________________________________________________________ 20 Database Interface Languages (0010) _______________________________________________________ 20 Database Security ______________________________________________________________________ 20 Distributed Data Model (0010) ____________________________________________________________ 20 Hierarchical Database (0010) _____________________________________________________________ 20 Network Database Management System (0010) _______________________________________________ 20 Object Oriented Database (0010)___________________________________________________________ 20 Relational Data Model (0010) _____________________________________________________________ 20 Database Dictionary (0010) _____________________________________________________________ 20 Structured Query Language (0010) _______________________________________________________ 20 Distributed Computing (0010) _____________________________________________________ 20 Distributed Applications (0011) ___________________________________________________________ 20 Agents (0011) _______________________________________________________________________ 20 Applets (0011) _______________________________________________________________________ 20 Security in Distributed Systems (0011) ____________________________________________________ 20 Examples to Discuss (CDS) _______________________________________________________________ 20 ActiveX (0010) ______________________________________________________________________ 21 CGI (0010) __________________________________________________________________________ 21 COM an DCOM (0010) ________________________________________________________________ 21 Cookies (0010)_______________________________________________________________________ 21 Enterprise Java Bean (0010) ____________________________________________________________ 21 Java Applet (0010) ____________________________________________________________________ 21 OLE (0010) _________________________________________________________________________ 21 ORB and CORBA (0010) ______________________________________________________________ 21 Malicious Actions (0010) _________________________________________________________ 21 Brute Force (0011) ______________________________________________________________________ 21 Denial of Service (0010) _________________________________________________________________ 21 Distributed Denial of Service ____________________________________________________________ 21 Dictionary attack (0011) _________________________________________________________________ 21 Eavesdropping (0011) ___________________________________________________________________ 21 Hidden Code (0011)_____________________________________________________________________ 21 Inference (0011)________________________________________________________________________ 21 Logic Bomb (0010) _____________________________________________________________________ 21 Pseudo Flaw (0011) _____________________________________________________________________ 21 Remote Maintenance (0011) ______________________________________________________________ 21 Smurf Attacks (0010)____________________________________________________________________ 21 Sniffing (0011)_________________________________________________________________________ 21 Social Engineering (0011) ________________________________________________________________ 21 Timing Attacks (0010) ___________________________________________________________________ 21 Traffic Analysis (0011) __________________________________________________________________ 21 Trojan Horse (0010)_____________________________________________________________________ 21 Virus (0010) ___________________________________________________________________________ 21 Worm (0010) __________________________________________________________________________ 21 Object Oriented Environments and Principles (0010) _________________________________ 21 Abstraction (0010) ______________________________________________________________________ 21 Application Threat(s (0010) _______________________________________________________________ 21 Classes and Objects (0010) _______________________________________________________________ 21 Polyinstantiation (0010) __________________________________________________________________ 21 Polymorphism (0010) ___________________________________________________________________ 21 Project development (0010) _______________________________________________________ 21 Software Lifecycle (0010) ________________________________________________________________ 21 Software Development Models (0010) ______________________________________________________ 21 Acceptance Testing (0010) _____________________________________________________________ 22 Accreditation (0011) __________________________________________________________________ 22 Certification (0011) ___________________________________________________________________ 22 Change Management (0011) ____________________________________________________________ 22 Code (0011) _________________________________________________________________________ 22 Code Review (0011) __________________________________________________________________ 22 Conceptual definition (0011) ____________________________________________________________ 22 Configuration Management (0011) _______________________________________________________ 22 Design (0011) _______________________________________________________________________ 22 Disposal (0010) ______________________________________________________________________ 22 Functional Design Analysis and Planning (0010) ____________________________________________ 22 Functional Requirements (0011) _________________________________________________________ 22 Functional Specifications (0011) _________________________________________________________ 22 Implementation (0010) ________________________________________________________________ 22 Maintenance (0010) (0011) _____________________________________________________________ 22 Operations (0010) ____________________________________________________________________ 22 Project Initiation (0010) ________________________________________________________________ 22 Software Development (0010) ___________________________________________________________ 22 System Design Specification (0010) ______________________________________________________ 22 System Test (0011) ___________________________________________________________________ 22 Writing Secure Code (???) ________________________________________________________ 22 Awareness, Training and Education (CDS/VIC) __________________________________ 23 Tools (CDS) ____________________________________________________________________ 23 Standards _____________________________________________________________________________ 23 Cryptography (0100) (0010) Stuff from my book? _________________________________ 24 Cryptography Defined ___________________________________________________________ 24 Classes of Ciphers ______________________________________________________________________ 24 Cipher Types (0010) ____________________________________________________________________ 24 Asymmetric Cryptography (0010) ________________________________________________________ 24 Block Cipher (0010) __________________________________________________________________ 24 Kerckhoff Principle (0010) _____________________________________________________________ 24 Key Escrow (0010) ___________________________________________________________________ 24 Stream Cipher (0010)__________________________________________________________________ 24 Substitution Cipher (0010) ______________________________________________________________ 24 Symmetric Cryptography (0010) _________________________________________________________ 24 Transposition Cipher (0010) ____________________________________________________________ 24 Key Clusters (0011) _____________________________________________________________________ 24 Encryption and Decryption (0011) _________________________________________________________ 24 Work Factor Force times effort and work (0011) ______________________________________________ 24 Message Authentication __________________________________________________________ 25 Digital Signatures ______________________________________________________________________ 25 Message Digests _______________________________________________________________________ 25 Non Repudiation _______________________________________________________________________ 25 Attacks (0010) __________________________________________________________________ 24 Adaptive Chosen Plaintext Attack (0010) ____________________________________________________ 24 Analytic Attack (0010) (0011) _____________________________________________________________ 24 Brute Force (0011) ______________________________________________________________________ 24 Implementation Attacks (0011) ____________________________________________________________ 24 Known Plaintext Attack (0010) ____________________________________________________________ 24 Man in the Middle Attack (0010) __________________________________________________________ 24 Statistical Attacks (0011) _________________________________________________________________ 24 Specific Methods of Attack _______________________________________________________________ 24 Chosen Ciphertext Attack (0010) ________________________________________________________ 24 Chosen Plaintext Attack (0010) __________________________________________________________ 24 Ciphertext – Only Attack (0010) _________________________________________________________ 24 Key Issues (0011)________________________________________________________________ 25 Key Change (0011) _____________________________________________________________________ 25 Key Control (0011) _____________________________________________________________________ 25 Key Disposal (0011) ____________________________________________________________________ 25 Key Distribution (0011) __________________________________________________________________ 25 Key Generation (0011) __________________________________________________________________ 25 Key Installation (0011) __________________________________________________________________ 25 Key Escrow and Recovery (0011) __________________________________________________________ 25 Key Storage (0011) _____________________________________________________________________ 25 Cryptographic Applications (0010) _________________________________________________ 24 Encryption at Different Layers (0010) _______________________________________________________ 24 One Time Pad (0010) ____________________________________________________________________ 24 Public Key Infrastructure (PKI) (0010) ______________________________________________________ 24 Certificate Revocation List (CRL) (0010) __________________________________________________ 24 Certification Authority (CA) (0010) ______________________________________________________ 24 PKI Steps (0010) _____________________________________________________________________ 24 Registration Authority (0010) ___________________________________________________________ 24 Cryptographic Protocols (0010) ___________________________________________________ 24 Internet Security (0010) __________________________________________________________________ 24 HTTPS (0010) _______________________________________________________________________ 24 IPSec (0010) ________________________________________________________________________ 24 S/MIME (0010) ______________________________________________________________________ 24 Secure Hypertext Transfer Protocol (S-HTTP) (0010) ________________________________________ 24 Secure Sockets Layer (SSL) (0010) _______________________________________________________ 24 SET (0010)__________________________________________________________________________ 24 SSH2 (0010) ________________________________________________________________________ 24 Message Security Protocol (MSP) (0010) ____________________________________________________ 24 Pretty Good Privacy (PGP) (0010) _________________________________________________________ 24 Privacy Enhanced Mail (PEM) (0010)_______________________________________________________ 24 Cryptography Definitions (0010) ___________________________________________________ 24 Attacks (0010) _________________________________________________________________________ 25 Keys and Text (0010) ___________________________________________________________________ 25 Keyspace (0010) _______________________________________________________________________ 25 Spy Cipher (0010) ______________________________________________________________________ 25 Steganography (0010) ___________________________________________________________________ 25 Strength of Crypto Systems (0010) _________________________________________________________ 25 Hybrid Approaches (0010) ________________________________________________________ 25 Asymmetric Algorithm (0010) ____________________________________________________________ 25 Diffie Hellman Key Exchange (0010) _____________________________________________________ 25 El Gamal (0010)______________________________________________________________________ 25 Elliptic Curve Cryptosystems (ECC) (0010) ________________________________________________ 25 Data Encryption (0010) __________________________________________________________________ 25 Key Management (0010) _________________________________________________________________ 25 Security Goals (0010) ___________________________________________________________________ 25 Symmetric Algorithms (0010) _____________________________________________________________ 25 Advanced Encryption Standard (AES) (0010) _______________________________________________ 25 DES (0010) _________________________________________________________________________ 25 Triple DES (0010) ____________________________________________________________________ 25 Message Integrity and Digital Signatures (0010) ______________________________________ 25 Electronic Signaling (0010) _______________________________________________________________ 25 DSS? (0010)_________________________________________________________________________ 25 Message Authentication Code (0010) _______________________________________________________ 25 Message Integrity (0010) _________________________________________________________________ 25 Attacks on Hashing Functions (0010) _____________________________________________________ 25 Hashing Algorithms (0010) _____________________________________________________________ 25 One Way Hash (0010) _________________________________________________________________ 25 Disaster Recovery (DRP) and Business Continuity (BCP) (0010) (DAN?) _____________ 26 A Background for DRP and BCP (0011) ____________________________________________ 26 Classes of Disasters (0011) _______________________________________________________________ 26 Natural Disaster (0011) ________________________________________________________________ 26 Man Made Disaster (0011) _____________________________________________________________ 26 Disaster Recovery vs. Business Continuity (0010) (0011) _______________________________________ 26 BCP Keeps Ops Running (0011) _________________________________________________________ 26 DRP Restores Normal OPS (0011) _______________________________________________________ 26 Commonality (0011) __________________________________________________________________ 26 Identify Critical Business Functions (0011) ______________________________________________ 26 Identify Experts (0011) ______________________________________________________________ 26 Identify Possible Disaster Scenarios (0011) ______________________________________________ 26 BCP Development (0011) _________________________________________________________ 26 Backups and Off-Site Storage (0011) _______________________________________________________ 26 Document Strategy (0011) ________________________________________________________________ 26 Documentation (0011) ___________________________________________________________________ 26 Emergency Response (0011) ______________________________________________________________ 26 External Communications (0011) __________________________________________________________ 26 Fire Protection (0011) ___________________________________________________________________ 26 Identify Success Factors (0011) ____________________________________________________________ 26 Logistics and Supplies (0011) _____________________________________________________________ 26 Maintain the Plan (0011) _________________________________________________________________ 26 Organization awareness and Training (0011) _________________________________________________ 26 Personnel Notification (0011) _____________________________________________________________ 26 Project Team Management (0011)__________________________________________________________ 26 Senior Management Involvement (0011) ____________________________________________________ 26 Senior Management Support (0011) ________________________________________________________ 26 Simplify Critical Functions (0011) _________________________________________________________ 26 Software Escrow Agreements (0011) _______________________________________________________ 26 Utilities (0011) _________________________________________________________________________ 26 Backups and Off-Site Facilities (0010) ______________________________________________ 26 Backup Facility Alternatives (0010) ________________________________________________________ 26 Hot site (0010) _______________________________________________________________________ 26 Cold site (0010) ______________________________________________________________________ 26 Warm site (0010) _____________________________________________________________________ 26 Choosing a Software Backup Storage Facility (0010) ___________________________________________ 26 Employees and Working Environment (0010) ________________________________________________ 26 Business Impact Analysis (0010) ___________________________________________________ 26 Criticality Assessment (0011) _____________________________________________________________ 26 Defining the Resource Requirements (0011) __________________________________________________ 26 Identifying Key Players (0011) ____________________________________________________________ 26 Setting Maximum Tolerable Downtime (0011) ________________________________________________ 26 Threats (0011) (0010) ___________________________________________________________________ 26 Vulnerability Assessment (0011) ___________________________________________________________ 26 DRP and BCP Objectives (0010) ___________________________________________________ 26 Documentation (0010) ___________________________________________________________________ 26 Emergency Response (0010) ______________________________________________________________ 26 Maintenance (0010) _____________________________________________________________________ 26 Phase Breakdown (0010) _________________________________________________________________ 26 Prevention (0010) ______________________________________________________________________ 27 Recovery and Restoration (0010) __________________________________________________________ 27 Testing and Drills (0010) _________________________________________________________________ 27 DRP Development (0011) _________________________________________________________ 27 Facilitate External Communication (0011) ___________________________________________________ 27 Maintain Physical Security (0011)__________________________________________________________ 27 Personnel Identification (0011) ____________________________________________________________ 27 Prepare for Emergency Response (0011)_____________________________________________________ 27 Test Recovery Plan ______________________________________________________________ 27 Test Continuity Plan _____________________________________________________________ 27 Product Life Cycle (0010) ________________________________________________________ 27 Project Initiation Phase (0010) ____________________________________________________ 27 Threats (0010) __________________________________________________________________ 27 Law, Investigation, and Ethics (0010) __________________________________________ 28 Types of Law (0011) _____________________________________________________________ 28 Common Law _________________________________________________________________________ 28 Constitutional Law ______________________________________________________________________ 28 International Law _______________________________________________ Error! Bookmark not defined. Computer Crime Investigation (0010) ______________________________________________ 28 Admissibility of Evidence (0010) __________________________________________________________ 28 Collecting Evidence (0010) _______________________________________________________________ 28 Enticement and Entrapment (0010) _________________________________________________________ 28 Evidence Types (0010) __________________________________________________________________ 28 Best Evidence _______________________________________________________________________ 28 Hearsay Evidence ____________________________________________________________________ 28 Secondary Evidence ___________________________________________________________________ 28 Forensics (0010) _______________________________________________________________________ 28 Incident Handling (0010) _________________________________________________________________ 28 Incident Response Plan (0010) ____________________________________________________________ 28 Incident Response Team (0010) ___________________________________________________________ 28 Search and Seizure (0010) ________________________________________________________________ 29 Trial (0010) ___________________________________________________________________________ 29 Who should Perform Investigation (0010) ____________________________________________________ 29 Ethics (0010) ___________________________________________________________________ 29 General Ethics Discussion ________________________________________________________________ 29 Computer Ethics Institute ________________________________________________________________ 29 Internet Activities Board _________________________________________________________________ 29 ISC2 _________________________________________________________________________________ 29 Types of Attacks ________________________________________________________________ 29 Hacking (0010) ________________________________________________________________________ 29 Terrorist Attacks _______________________________________________________________________ 29 Military Attacks ________________________________________________________________________ 29 Intelligence Attacks _____________________________________________________________________ 29 Financial Attacks _______________________________________________________________________ 29 Business Attacks _______________________________________________________________________ 29 Grudge Attacks ________________________________________________________________________ 29 Recreation ____________________________________________________________________________ 29 Tools ________________________________________________________________________________ 29 Data Diddling ________________________________________________________________________ 29 Dumpster Diving _____________________________________________________________________ 29 Excessive Privilege ___________________________________________________________________ 29 IP Spoofing _________________________________________________________________________ 29 Password Sniffing ____________________________________________________________________ 29 Salami _____________________________________________________________________________ 29 Social Engineering ____________________________________________________________________ 29 Wiretapping _________________________________________________________________________ 29 Prosecution Problems ____________________________________________________________ 29 Investigation __________________________________________________________________________ 29 Evidence ___________________________________________________________________________ 29 Conducting Investigation _______________________________________________________________ 29 Incident Handling and Response _________________________________________________________ 29 What does an attacker look like? __________________________________________________ 29 Hackers (0011)_________________________________________________________________________ 29 Script Kiddies (0011) ____________________________________________________________________ 29 Virus Writers (0011) ____________________________________________________________________ 29 Phreakers (0011) _______________________________________________________________________ 29 Organization Liabilities and Ramifications (0010) ____________________________________ 29 Legal Liability _________________________________________________________________________ 29 Employee Suits ______________________________________________________________________ 29 Downstream Liability _________________________________________________________________ 29 Privacy Issues _________________________________________________________________________ 29 Electronic Communicat9ion Privacy Act of 1986 ____________________________________________ 29 Employee Monitoring _________________________________________________________________ 29 Gramm Leach Bliley Act 1999 __________________________________________________________ 29 Health Insurance Portability and Accountability Act (HIPPA) __________________________________ 29 Privacy Act of 1974 ___________________________________________________________________ 29 Transborder Information Flow ___________________________________________________________ 29 Security Principles ______________________________________________________________________ 29 Types of Law (0010) _____________________________________________________________ 29 International Laws ______________________________________________________________________ 28 Australia ____________________________________________________________________________ 28 United Kingdom _____________________________________________________________________ 28 Netherlands _________________________________________________________________________ 28 Administrative Law _____________________________________________________________________ 28 Civil Law _____________________________________________________________________________ 28 Criminal Law __________________________________________________________________________ 28 18 US Code 1029 (Credit Card Fraud) ____________________________________________________ 28 18 US Code 1030 (Computer Fraud and abuse) _____________________________________________ 28 18 US Code 2319 (Copyrights) __________________________________________________________ 28 18 US Code 2511 (Interception) _________________________________________________________ 28 18 US Code 2701 (Access to Electronic Info) _______________________________________________ 28 Child Pornography ____________________________________________________________________ 28 Computer Security Act of 1987 __________________________________________________________ 28 Mail Fraud __________________________________________________________________________ 28 Patriot Act __________________________________________________________________________ 28 Wire Fraud __________________________________________________________________________ 28 Federal Policies ________________________________________________________________________ 28 Computer Fraud and Abuse Act 1986 _____________________________________________________ 28 Economic Espionage act of 1996 _________________________________________________________ 28 Federal Sentencing Guidelines __________________________________________________________ 28 State Laws ____________________________________________________________________________ 28 Texas ______________________________________________________________________________ 28 Georgia ____________________________________________________________________________ 28 Florida _____________________________________________________________________________ 28 Maryland ___________________________________________________________________________ 28 Intellectual Property_____________________________________________________________________ 28 Copyright ___________________________________________________________________________ 28 Patent ______________________________________________________________________________ 28 Trade Secret _________________________________________________________________________ 28 Trademark __________________________________________________________________________ 28 Software Piracy ________________________________________________________________________ 28 Operations Security (0010) ___________________________________________________ 30 A General Concept (0011) ________________________________________________________ 30 Anti Virus Management (0011) ____________________________________________________________ 30 Backup of Critical Information (0011) ______________________________________________________ 30 Need to know (0011) ____________________________________________________________________ 30 Least Privilege (0011) ___________________________________________________________________ 30 Privileged Functions (0011) _______________________________________________________________ 30 Privacy (0011) _________________________________________________________________________ 30 Legal Requirements (0011) _______________________________________________________________ 30 Illegal Activities (0011) __________________________________________________________________ 30 Records Retention (0011) ________________________________________________________________ 30 Handling Sensitive Information (0011) ______________________________________________________ 30 Configuration Management and Media Control (0010) ________________________________ 30 Data Controls (Input and Output) __________________________________________________________ 30 Media Controls ________________________________________________________________________ 30 Operations Control (0010) ________________________________________________________ 30 Administrative Control __________________________________________________________________ 30 Clipping levels _______________________________________________________________________ 30 Job Rotation _________________________________________________________________________ 30 Least Privilege _______________________________________________________________________ 30 Mandatory Vacations __________________________________________________________________ 30 Need to Know _______________________________________________________________________ 30 Separation of Duties___________________________________________________________________ 30 Control Categories ______________________________________________________________________ 30 Due Care _____________________________________________________________________________ 30 Reacting to failures and recovering (0010) ___________________________________________ 30 Trusted Recovery (0010) _________________________________________________________________ 30 Operational Responsibility _______________________________________________________ 30 Deviation from Standards ________________________________________________________________ 30 Unscheduled Initial Program Loads _________________________________________________________ 30 Unusual or Unexplained Occurrence ________________________________________________________ 30 Software Backups (0010) _________________________________________________________ 30 Backups ______________________________________________________________________________ 30 Network Availability ____________________________________________________________________ 30 Physical Security (0010) _____________________________________________________ 31 Location Selection _______________________________________________________________ 31 Choose a Secure Location ________________________________________________________________ 31 Designate a Security Facility ______________________________________________________________ 31 Electrical Power and Environmental Issues (0010) ____________________________________ 31 Environmental Consideration (0010) ________________________________________________________ 31 Power Interference (0010) ________________________________________________________________ 31 UPS (0010) ___________________________________________________________________________ 31 Ventilation (0010) ______________________________________________________________________ 31 Water, Steam and Gas (0010) _____________________________________________________________ 31 Fire Detection and Suppression (0010) ______________________________________________ 31 Emergency Response (0010) ______________________________________________________________ 31 Fire Detection (0010) ____________________________________________________________________ 31 Fire Extinguishing Issues (0010) ___________________________________________________________ 31 Fire Prevention (0010) ___________________________________________________________________ 31 Fire Suppression(0010) __________________________________________________________________ 31 Fire Types (0010) ______________________________________________________________________ 31 Halon (0010) __________________________________________________________________________ 31 Water Sprinkler (0010) __________________________________________________________________ 31 Perimeter Security (0010) ________________________________________________________ 31 Entrance Protection (0010) _______________________________________________________________ 31 Facility Access (0010) ___________________________________________________________________ 31 Fencing (0010) _________________________________________________________________________ 31 Intrusion Detection (0010) ________________________________________________________________ 31 Lighting (0010) ________________________________________________________________________ 31 Locks (0010) __________________________________________________________________________ 31 Surveillance Devices (0010) ______________________________________________________________ 31 Physical Security Controls (0010) __________________________________________________ 31 Computing Area (0010) __________________________________________________________________ 31 Facility Construction (0010) ______________________________________________________________ 31 Facility Location (0010) _________________________________________________________________ 31 Hardware Backup (0010) _________________________________________________________________ 31 Security Management Practices (0010) _________________________________________ 32 Security Audit __________________________________________________________________ 32 Audit Trails ___________________________________________________________________________ 32 Anatomy of an Audit Record ____________________________________________________________ 32 Types of Audit Trail __________________________________________________________________ 32 Finding Trouble in Logs _______________________________________________________________ 32 Problem Management and Audit Trail _____________________________________________________ 32 Retaining Audit Logs __________________________________________________________________ 32 Protection of Audit Logs _______________________________________________________________ 32 Monitoring ____________________________________________________________________________ 32 Facilities Monitoring __________________________________________________________________ 32 Intrusion Detection ___________________________________________________________________ 32 Keystroke Monitoring _________________________________________________________________ 32 Penetration Testing ___________________________________________________________________ 32 Responding to Events _________________________________________________________________ 32 CERT? ___________________________________________________________________________ 32 Traffic and Trends Analysis _____________________________________________________________ 32 Violation Analysis ____________________________________________________________________ 32 Employee Management (0010) ____________________________________________________ 32 Operational and Administrative Controls (0011) _______________________________________________ 32 Background Checking (0011) ___________________________________________________________ 32 Background Checks and Security Clearance (0011) __________________________________________ 32 Employment Agreements (0011) _________________________________________________________ 32 Hiring and Termination Practice (0011) ___________________________________________________ 32 Job Description (0011) _________________________________________________________________ 32 Job Requirements (0011) _______________________________________________________________ 32 Job Rotation (0011) ___________________________________________________________________ 32 Job Specifications (0011) _______________________________________________________________ 32 Roles and Responsibilities (0011) ________________________________________________________ 32 Separation of Duties (0011) _____________________________________________________________ 32 Information Classification (0010) __________________________________________________ 32 Government vs Commercial model (CDS) ___________________________________________________ 32 Commercial Data Classification (0011) ____________________________________________________ 32 Governmental Data Classification (0011) __________________________________________________ 32 Management Responsibilities (0010) ________________________________________________ 32 Risk Calculation (0010) __________________________________________________________ 32 Dealing with Risk (0010) _________________________________________________________________ 32 Quantitative and Qualitative (0010) _________________________________________________________ 32 Selection of Countermeasures (0010) _______________________________________________________ 32 Risk Management (0010) _________________________________________________________ 32 Risk Analysis (0010) ____________________________________________________________________ 32 Risk Control (0011) _____________________________________________________________________ 32 Risk Identification (0011) ________________________________________________________________ 32 Roles and Responsibilities (0010) __________________________________________________ 32 DAA – need better name (CDS) ___________________________________________________________ 32 Data Custodian (0010) ___________________________________________________________________ 32 Data Owner (0010) _____________________________________________________________________ 32 ISSO (CDS) ___________________________________________________________________________ 32 Security Auditor (0010) __________________________________________________________________ 33 System Certifier (CDS) __________________________________________________________________ 33 Systems Administrator (CDS) _____________________________________________________________ 33 User (0010) ___________________________________________________________________________ 33 Security Control Types (0010) _____________________________________________________ 33 Administrative Controls (0011) ____________________________________________________________ 33 Change Controls (0011) __________________________________________________________________ 33 Media Controls (0011) ___________________________________________________________________ 33 Privileged Entity Controls (0011) __________________________________________________________ 33 Resource Protection (0011) _______________________________________________________________ 33 Trusted Recovery (0011) _________________________________________________________________ 33 Security Policies and Supporting Counterparts (0010) _________________________________ 33 Baselines (0010) _______________________________________________________________________ 33 Guidelines (0010) ______________________________________________________________________ 33 Procedures (0010) ______________________________________________________________________ 33 Security Policy (0010) ___________________________________________________________________ 33 Standards (0010) _______________________________________________________________________ 33 Threats (0010) (0011) Countermeasures_____________________________________________ 33 Employee Sabotage (0011) _______________________________________________________________ 33 Errors and Omissions (0011) ______________________________________________________________ 33 Fraud (0011) __________________________________________________________________________ 33 Hackers and Crackers (0011) ______________________________________________________________ 33 Industrial Espionage (0011) _______________________________________________________________ 33 Loss of Physical and Infrastructure Support (0011) ____________________________________________ 33 Malicious Code (0011) __________________________________________________________________ 33 Theft (0011) ___________________________________________________________________________ 33 Security Models and Architecture (0010) ________________________________________ 34 Architecture (0011) ______________________________________________________________ 34 Open and Closed Systems (0011) __________________________________________________________ 34 Protection Rings (0011) __________________________________________________________________ 34 Recovery Procedures (0011) ______________________________________________________________ 34 Security Modes (0011)___________________________________________________________________ 34 Trusted Security Base (0011)______________________________________________________________ 34 Operations Systems Security Mechanisms (0010) _____________________________________ 34 Process Isolation (0010)__________________________________________________________________ 34 Protection Rings (0010) __________________________________________________________________ 34 Reference Monitor (0010) ________________________________________________________________ 34 Security Kernel (0010)___________________________________________________________________ 34 Trusted Computing Base (0010) ___________________________________________________________ 34 Virtual Machine (0010) __________________________________________________________________ 34 Security Evaluation Criteria (0010) ________________________________________________ 34 Certification vs Accreditation (0010) (0011) __________________________________________________ 34 DITSCAP (0011) _____________________________________________________________________ 34 NIACAP (0011) ______________________________________________________________________ 34 Evaluation (0010) ______________________________________________________________________ 34 BS 7799 (DAN) ______________________________________________________________________ 34 Common Criteria (0010) (0011) _________________________________________________________ 34 European Information Technology Security Evaluation Criteria (ITSEC) (0011) ___________________ 34 Information Technology Security Evaluation Criteria (0010) ___________________________________ 34 ISO 17788 (DAN) ____________________________________________________________________ 34 Rainbow Series (OBE but..) (0010) _______________________________________________________ 34 Trusted Computer System Evaluation Criteria (0010) (0011) ___________________________________ 34 Trusted Network Interpretation (0011) ____________________________________________________ 34 Security Models (0010) Some Belong in Access Control? _______________________________ 34 Integrity VS Privacy Which model is which (CDS) ____________________________________________ 34 Access Matrix (0010) (0011) ______________________________________________________________ 34 Bell – LaPadula (0010) __________________________________________________________________ 34 Biba (0010) ___________________________________________________________________________ 34 Brewer and Nash Model (0010) ____________________________________________________________ 34 Clark – Wilson (0010) ___________________________________________________________________ 34 Graham – Denning (0010) ________________________________________________________________ 34 Harrison – Ruszzo – Ulman (0010) _________________________________________________________ 34 Information Flow Model (0010) ___________________________________________________________ 34 Non-Interference (0010) _________________________________________________________________ 34 State Machines (0010) ___________________________________________________________________ 34 Take Grant (0011) ______________________________________________________________________ 34 System Components (0010) (See the Big Computer) Early chapter? _____________________ 34 Central Processing Unit (0010) ____________________________________________________________ 34 Data Access Storage (0010) _______________________________________________________________ 34 Firmware _____________________________________________________________________________ 34 General Architecture of Systems (Von Neumann Bit) (0010) _____________________________________ 34 Hardware _____________________________________________________________________________ 34 ISO Model 7 layer ? (CDS) _______________________________________________________________ 34 Operating States (0010) __________________________________________________________________ 34 Pointers etc (CDS) ______________________________________________________________________ 34 Processing Instructions (0010) _____________________________________________________________ 35 Software ______________________________________________________________________________ 35 Storage and Memory Types (0010) _________________________________________________________ 35 Virtual Storage (0010) ___________________________________________________________________ 35 Telecommunications and Network Security (0010) ________________________________ 36 Network Types (0011)____________________________________________________________ 36 Local Area (0011) ______________________________________________________________________ 36 Wide Area (0011) ______________________________________________________________________ 36 Cables and Data Transmission Types (0010) _________________________________________ 36 802-11 (CDS)__________________________________________________________________________ 36 Asynchronous and Synchronous (0010) _____________________________________________________ 36 Broadband and Base band (0010) __________________________________________________________ 36 Cable Issues (0010) _____________________________________________________________________ 36 Coaxial Cable (0010) ____________________________________________________________________ 36 Fiber (0010) ___________________________________________________________________________ 36 Fire Ratings (0010) _____________________________________________________________________ 36 Microwave (CDS) ______________________________________________________________________ 36 Signals (0010) _________________________________________________________________________ 36 Transmission Methods (0010) _____________________________________________________________ 36 Twisted Pair Cable (0010) ________________________________________________________________ 36 Fault Tolerance Methods and Mechanisms (0010) ____________________________________ 36 RAID (0010) __________________________________________________________________________ 36 Clustering (0010) _______________________________________________________________________ 36 Backup (0010) _________________________________________________________________________ 36 LAN Technologies (0010) _________________________________________________________ 36 Media Access Technologies (0010) _________________________________________________________ 36 Ethernet (0010) ______________________________________________________________________ 36 Polling (0010)) _______________________________________________________________________ 36 Token (0010) ________________________________________________________________________ 36 Network Topologies (0010) _______________________________________________________________ 36 Bus (0010) __________________________________________________________________________ 36 Ring (0010) _________________________________________________________________________ 36 Star (0010) __________________________________________________________________________ 36 Protocols (0010)________________________________________________________________________ 36 Address Resolution Protocol (ARP) (0010) _________________________________________________ 36 Boot Protocol (0010) __________________________________________________________________ 36 Internet Control Message Protocol (ICMP) (0010) ___________________________________________ 36 Reverse Address Resolution Protocol (RARP) (0010) ________________________________________ 36 Network Devices and Services (0010) _______________________________________________ 36 Bridge (0010) __________________________________________________________________________ 36 Brouter (0010) _________________________________________________________________________ 36 Firewalls (0010) ________________________________________________________________________ 36 Administration (0010) _________________________________________________________________ 36 Architecture (0010) ___________________________________________________________________ 36 Packet Filter (0010) ___________________________________________________________________ 36 Proxy Firewall (0010) _________________________________________________________________ 36 State Firewall (0010) __________________________________________________________________ 36 Gateway (0010) ________________________________________________________________________ 36 Network Services (0010) _________________________________________________________________ 36 DNS (0010) _________________________________________________________________________ 36 NAT (0010) _________________________________________________________________________ 36 Remote Connection (0010) _______________________________________________________________ 36 CHAP (0010) ________________________________________________________________________ 37 EAP (0010) _________________________________________________________________________ 37 PAP (0010) _________________________________________________________________________ 37 PPP (0010) __________________________________________________________________________ 37 SLIP (0010) _________________________________________________________________________ 37 Repeater (0010) ________________________________________________________________________ 37 Router (0010) __________________________________________________________________________ 37 Switches (0010) ________________________________________________________________________ 37 VLAN (0010)________________________________________________________________________ 37 VPN (0010) ___________________________________________________________________________ 37 IPSec (0010) ________________________________________________________________________ 37 L2TP (0010)_________________________________________________________________________ 37 PPTP (0010)_________________________________________________________________________ 37 Remote Access Methods and Technologies (0010) _____________________________________ 37 Remote Access (0010) ___________________________________________________________________ 37 Wireless Technology (0010) ______________________________________________________________ 37 Access Points (0010) __________________________________________________________________ 37 OSA and SKA (0010) _________________________________________________________________ 37 Spread Spectrum (0010) _______________________________________________________________ 37 SSID (0010) _________________________________________________________________________ 37 WAP (0010) _________________________________________________________________________ 37 Telecommunications _____________________________________________________________ 37 Cell Phone Clone (0010) _________________________________________________________________ 37 E-Mail Security (0011) __________________________________________________________________ 37 E-mail Monitoring (CDS) ______________________________________________________________ 37 E-mail Storage (CDS) _________________________________________________________________ 37 E-mail Privacy (CDS) _________________________________________________________________ 37 Facsimile Security (0011) ________________________________________________________________ 37 PBX Threat (0010)______________________________________________________________________ 37 PBX Fraud (0011) ____________________________________________________________________ 37 PBX Abuse (0011) ____________________________________________________________________ 37 TCP/IP Model (0010) ____________________________________________________________ 37 Extranets (0010)________________________________________________________________________ 37 Internet Protocol (0010) __________________________________________________________________ 37 Intranets (0010) ________________________________________________________________________ 37 ISO/OSI Seven Layers (0011) _____________________________________________________________ 37 Physical Layer _______________________________________________________________________ 37 Data Link ___________________________________________________________________________ 37 Network ____________________________________________________________________________ 37 Transport ___________________________________________________________________________ 37 Session _____________________________________________________________________________ 37 Presentation _________________________________________________________________________ 37 Application _________________________________________________________________________ 37 Networks (0010) _______________________________________________________________________ 37 Telecommunications Protocols and Devices (0010) ____________________________________ 37 ATM (0010) ___________________________________________________________________________ 37 Cable Modems (0010) ___________________________________________________________________ 37 CSU/DSU (0010) _______________________________________________________________________ 37 Dedicated Link (0010) ___________________________________________________________________ 37 DSL (0010) ___________________________________________________________________________ 37 FDDI (0010) __________________________________________________________________________ 38 Frame Relay (0010) _____________________________________________________________________ 38 HDLC (0010) __________________________________________________________________________ 38 ISDN (0010) __________________________________________________________________________ 38 Multiservice Access Technology (0010) _____________________________________________________ 38 Quality of Service (0010) ________________________________________________________________ 38 S/WAN (0010) _________________________________________________________________________ 38 SDLC (0010) __________________________________________________________________________ 38 SMDS (0010) __________________________________________________________________________ 38 SONET (0010) _________________________________________________________________________ 38 WAN Switching (0010) __________________________________________________________________ 38 X.25 (0010) ___________________________________________________________________________ 38 Items looking for home (0100) ________________________________________________ 39 CERT – Where does it go? ________________________________________________________ 39 Non-Computer FAX type stuff PBX? _______________________________________________ 39 Challenge of Survivability (0100) __________________________________________________ 39 Compare and Contrast Security and Survivability (0100) ________________________________________ 39 Define Survivability (0100) _______________________________________________________________ 39 Describe Layered approaches (0100) ________________________________________________________ 39 Identify and define the components of the Information Security Model – Security Model, Information security Properties and Security measures. (0100) ____________________________________________________ 39 Asset and Risk Management (0100) ________________________________________________ 39 Policy Formulation and Implementation (0100) ______________________________________ 39 TCP/IP Security (0100) __________________________________________________________ 39 Threats Vulnerabilities and Attacks (0100) __________________________________________ 39 Host System Hardening (0100) ____________________________________________________ 39 Secure Network Infrastructure (0100) ______________________________________________ 39 Deploying Firewalls (0100)________________________________________________________ 39 Secure Remote Access (0100) ______________________________________________________ 39 Writing a Security Plan (CDS/?) ___________________________________________________ 39 Reliability and Availability Calculations ____________________________________________ 39 MTTR _______________________________________________________________________________ 39 MTBF _______________________________________________________________________________ 39 Valuing Assets (ISSA and CDS Class Notes) _________________________________________ 39 Introduction to Information Assurance (CDS) McCumber Model (CDS) International View (DAN) BS 7799 (DAN) ISO 17799 (DAN) Assurance Management Confidentiality (CDS) (0011) Integrity (CDS) (0011) Availability (CDS) (0011) Access Control (0010) Access Control Administration (0010) Centralized Systems (0010) Diameter (0010) RADIUS (0010) TACAC (0010) Decentralized Systems (0010) Access Control Models and Techniques (0010) Categories of Access Control (0011) System Access Controls (0011) Data Access Controls (0011) Access Control Techniques (0010) Capability Tables and ACL (0010) Content Dependent Access Control (0010) Restricted Interfaces (0010) DAC (0010) MAC (0010) RBAC (0010) Concepts of Access Control (0011) Control Types (0011) Access Control Services (0011) Identification and Authentication (0010) Authentication (0010) Biometrics (0010) Cognitive Password (0010) Cryptographic Keys (0010) Memory Cards (0010) One Time Passwords (0010) Passphrase (0010) Passwords (0010) Smart Cards (0010) Authorization (0010) Stage Setting Intrusion Detection Systems (0010) (0100) Behavior Based (0010) Host Based (0010) Network Based (0010) Signature Based (0010) Pros and Cons (0010) Single Sign-On Technology (0010) Directory Services (0010) KERBEROS (0010) SESAME (0010) Thin Clients? (0010) Unauthorized Access Control and Attacks (0010) Unauthorized Disclosure of Information (0010) Emanation Security (WAP and TEMPEST) (0010) Attack Types (0010) Network Attacks Syn Flood ICMP Flood UDP Flood SMURF Fraggle Teardrop Spoofing Penetration Testing (Right Place?) (0010) Applications and Systems Development (0010) Knowledge Based Systems and Intelligence (0010) (0011) Artificial Neural Network (0010) (IGGY) Expert Systems (0010) Application Security Controls Abstraction (0011) Accountability (0011) Data Hiding (0011) Defense in Depth (0011) Hardware Segmentation (0011) Process Isolation (0011) Reference Monitor (0011) Security Kernel (0011) Separation of Privilege (0011) Service Level Agreements (0011) Supervisor and User Modes (0011) System High Mode (0011) Data and Information Security (0011) (CDS) Primary Storage (0011) Real and Virtual (0011) Secondary Storage (0011) Databases (0010) Aggregation and Inference (0010) Concurrency Issues (0010) Data Mine (0010) Data Warehouse (0010) Database Interface Languages (0010) Database Security Distributed Data Model (0010) Hierarchical Database (0010) Network Database Management System (0010) Object Oriented Database (0010) Relational Data Model (0010) Database Dictionary (0010) Structured Query Language (0010) Distributed Computing (0010) Distributed Applications (0011) Agents (0011) Applets (0011) Security in Distributed Systems (0011) Examples to Discuss (CDS) ActiveX (0010) CGI (0010) COM an DCOM (0010) Cookies (0010) Enterprise Java Bean (0010) Java Applet (0010) OLE (0010) ORB and CORBA (0010) Malicious Actions (0010) Brute Force (0011) Denial of Service (0010) Distributed Denial of Service Dictionary attack (0011) Eavesdropping (0011) Hidden Code (0011) Inference (0011) Logic Bomb (0010) Pseudo Flaw (0011) Remote Maintenance (0011) Smurf Attacks (0010) Sniffing (0011) Social Engineering (0011) Timing Attacks (0010) Traffic Analysis (0011) Trojan Horse (0010) Virus (0010) Worm (0010) Object Oriented Environments and Principles (0010) Abstraction (0010) Application Threat(s (0010) Classes and Objects (0010) Polyinstantiation (0010) Polymorphism (0010) Project development (0010) Software Lifecycle (0010) Software Development Models (0010) Acceptance Testing (0010) Accreditation (0011) Certification (0011) Change Management (0011) Code (0011) Code Review (0011) Conceptual definition (0011) Configuration Management (0011) Design (0011) Disposal (0010) Functional Design Analysis and Planning (0010) Functional Requirements (0011) Functional Specifications (0011) Implementation (0010) Maintenance (0010) (0011) Operations (0010) Project Initiation (0010) Software Development (0010) System Design Specification (0010) System Test (0011) Writing Secure Code (???) Awareness, Training and Education (CDS/VIC) Tools (CDS) Standards Cryptography (0100) (0010) Stuff from my book? Cryptography Defined Classes of Ciphers Cipher Types (0010) Asymmetric Cryptography (0010) Block Cipher (0010) Kerckhoff Principle (0010) Key Escrow (0010) Stream Cipher (0010) Substitution Cipher (0010) Symmetric Cryptography (0010) Transposition Cipher (0010) Key Clusters (0011) Encryption and Decryption (0011) Work Factor Force times effort and work (0011) Attacks (0010) Adaptive Chosen Plaintext Attack (0010) Analytic Attack (0010) (0011) Brute Force (0011) Implementation Attacks (0011) Known Plaintext Attack (0010) Man in the Middle Attack (0010) Statistical Attacks (0011) Specific Methods of Attack Chosen Ciphertext Attack (0010) Chosen Plaintext Attack (0010) Ciphertext – Only Attack (0010) Cryptographic Applications (0010) Encryption at Different Layers (0010) One Time Pad (0010) Public Key Infrastructure (PKI) (0010) Certificate Revocation List (CRL) (0010) Certification Authority (CA) (0010) PKI Steps (0010) Registration Authority (0010) Cryptographic Protocols (0010) Internet Security (0010) HTTPS (0010) IPSec (0010) S/MIME (0010) Secure Hypertext Transfer Protocol (S-HTTP) (0010) Secure Sockets Layer (SSL) (0010) SET (0010) SSH2 (0010) Message Security Protocol (MSP) (0010) Pretty Good Privacy (PGP) (0010) Privacy Enhanced Mail (PEM) (0010) Cryptography Definitions (0010) Attacks (0010) Keys and Text (0010) Keyspace (0010) Spy Cipher (0010) Steganography (0010) Strength of Crypto Systems (0010) Hybrid Approaches (0010) Asymmetric Algorithm (0010) Diffie Hellman Key Exchange (0010) El Gamal (0010) Elliptic Curve Cryptosystems (ECC) (0010) Data Encryption (0010) Key Management (0010) Security Goals (0010) Symmetric Algorithms (0010) Advanced Encryption Standard (AES) (0010) DES (0010) Triple DES (0010) Key Issues (0011) Key Change (0011) Key Control (0011) Key Disposal (0011) Key Distribution (0011) Key Generation (0011) Key Installation (0011) Key Escrow and Recovery (0011) Key Storage (0011) Message Authentication Digital Signatures Message Digests Non Repudiation Message Integrity and Digital Signatures (0010) Electronic Signaling (0010) DSS? (0010) Message Authentication Code (0010) Message Integrity (0010) Attacks on Hashing Functions (0010) Hashing Algorithms (0010) One Way Hash (0010) Disaster Recovery (DRP) and Business Continuity (BCP) (0010) (DAN?) A Background for DRP and BCP (0011) Classes of Disasters (0011) Natural Disaster (0011) Man Made Disaster (0011) Disaster Recovery vs. Business Continuity (0010) (0011) BCP Keeps Ops Running (0011) DRP Restores Normal OPS (0011) Commonality (0011) Identify Critical Business Functions (0011) Identify Experts (0011) Identify Possible Disaster Scenarios (0011) BCP Development (0011) Backups and Off-Site Storage (0011) Document Strategy (0011) Documentation (0011) Emergency Response (0011) External Communications (0011) Fire Protection (0011) Identify Success Factors (0011) Logistics and Supplies (0011) Maintain the Plan (0011) Organization awareness and Training (0011) Personnel Notification (0011) Project Team Management (0011) Senior Management Involvement (0011) Senior Management Support (0011) Simplify Critical Functions (0011) Software Escrow Agreements (0011) Utilities (0011) Backups and Off-Site Facilities (0010) Backup Facility Alternatives (0010) Hot site (0010) Cold site (0010) Warm site (0010) Choosing a Software Backup Storage Facility (0010) Employees and Working Environment (0010) Business Impact Analysis (0010) Criticality Assessment (0011) Defining the Resource Requirements (0011) Identifying Key Players (0011) Setting Maximum Tolerable Downtime (0011) Threats (0011) (0010) Vulnerability Assessment (0011) DRP and BCP Objectives (0010) Documentation (0010) Emergency Response (0010) Maintenance (0010) Phase Breakdown (0010) Prevention (0010) Recovery and Restoration (0010) Testing and Drills (0010) DRP Development (0011) Facilitate External Communication (0011) Maintain Physical Security (0011) Personnel Identification (0011) Prepare for Emergency Response (0011) Test Recovery Plan Test Continuity Plan Product Life Cycle (0010) Project Initiation Phase (0010) Threats (0010) Law, Investigation, and Ethics (0010) Types of Law (0011) (0010) Administrative Law Common Law Constitutional Law Civil Law Intellectual Property Copyright Patent Trade Secret Trademark Criminal Law 18 US Code 1029 (Credit Card Fraud) 18 US Code 1030 (Computer Fraud and abuse) 18 US Code 2319 (Copyrights) 18 US Code 2511 (Interception) 18 US Code 2701 (Access to Electronic Info) Child Pornography Computer Security Act of 1987 Mail Fraud Patriot Act Wire Fraud Federal Policies Computer Fraud and Abuse Act 1986 Economic Espionage act of 1996 Federal Sentencing Guidelines State Laws Texas Georgia Florida Maryland International Laws Australia United Kingdom Netherlands Software Piracy Computer Crime Investigation (0010) Admissibility of Evidence (0010) Collecting Evidence (0010) Enticement and Entrapment (0010) Evidence Types (0010) Best Evidence Hearsay Evidence Secondary Evidence Forensics (0010) Incident Handling (0010) Incident Response Plan (0010) Incident Response Team (0010) Search and Seizure (0010) Trial (0010) Who should Perform Investigation (0010) Ethics (0010) General Ethics Discussion Computer Ethics Institute Internet Activities Board ISC2 Types of Attacks Hacking (0010) Terrorist Attacks Military Attacks Intelligence Attacks Financial Attacks Business Attacks Grudge Attacks Recreation Tools Data Diddling Dumpster Diving Excessive Privilege IP Spoofing Password Sniffing Salami Social Engineering Wiretapping Prosecution Problems Investigation Evidence Conducting Investigation Incident Handling and Response What does an attacker look like? Hackers (0011) Script Kiddies (0011) Virus Writers (0011) Phreakers (0011) Organization Liabilities and Ramifications (0010) Legal Liability Employee Suits Downstream Liability Privacy Issues Electronic Communicat9ion Privacy Act of 1986 Employee Monitoring Gramm Leach Bliley Act 1999 Health Insurance Portability and Accountability Act (HIPPA) Privacy Act of 1974 Transborder Information Flow Security Principles Types of Law (0010) Operations Security (0010) A General Concept (0011) Anti Virus Management (0011) Backup of Critical Information (0011) Need to know (0011) Least Privilege (0011) Privileged Functions (0011) Privacy (0011) Legal Requirements (0011) Illegal Activities (0011) Records Retention (0011) Handling Sensitive Information (0011) Configuration Management and Media Control (0010) Data Controls (Input and Output) Media Controls Operations Control (0010) Administrative Control Clipping levels Job Rotation Least Privilege Mandatory Vacations Need to Know Separation of Duties Control Categories Due Care Reacting to failures and recovering (0010) Trusted Recovery (0010) Operational Responsibility Deviation from Standards Unscheduled Initial Program Loads Unusual or Unexplained Occurrence Software Backups (0010) Backups Network Availability Physical Security (0010) Location Selection Choose a Secure Location Designate a Security Facility Electrical Power and Environmental Issues (0010) Environmental Consideration (0010) Power Interference (0010) UPS (0010) Ventilation (0010) Water, Steam and Gas (0010) Fire Detection and Suppression (0010) Fire Types (0010) Fire Prevention (0010) Fire Detection (0010) Emergency Response (0010) Fire Extinguishing Issues (0010) Fire Suppression (0010) Halon (0010) Water Sprinkler (0010) Perimeter Security (0010) Facility Access (0010) Perimeter Protection (0010) Fencing (0010) Intrusion Detection (0010) Lighting (0010) Locks (0010) Surveillance Devices (0010) Physical Security Controls (0010) Computing Area (0010) Facility Construction (0010) Facility Location (0010) Hardware Backup (0010) Security Management Practices (0010) Security Audit Audit Trails Anatomy of an Audit Record Types of Audit Trail Finding Trouble in Logs Problem Management and Audit Trail Retaining Audit Logs Protection of Audit Logs Monitoring Facilities Monitoring Intrusion Detection Keystroke Monitoring Penetration Testing Responding to Events CERT? Traffic and Trends Analysis Violation Analysis Employee Management (0010) Operational and Administrative Controls (0011) Background Checking (0011) Background Checks and Security Clearance (0011) Employment Agreements (0011) Hiring and Termination Practice (0011) Job Description (0011) Job Requirements (0011) Job Rotation (0011) Job Specifications (0011) Roles and Responsibilities (0011) Separation of Duties (0011) Information Classification (0010) Government vs Commercial model (CDS) Commercial Data Classification (0011) Governmental Data Classification (0011) Management Responsibilities (0010) Risk Calculation (0010) Dealing with Risk (0010) Quantitative and Qualitative (0010) Selection of Countermeasures (0010) Risk Management (0010) Risk Analysis (0010) Risk Control (0011) Risk Identification (0011) Roles and Responsibilities (0010) DAA – need better name (CDS) Data Custodian (0010) Data Owner (0010) ISSO (CDS) Security Auditor (0010) System Certifier (CDS) Systems Administrator (CDS) User (0010) Security Control Types (0010) Administrative Controls (0011) Change Controls (0011) Media Controls (0011) Privileged Entity Controls (0011) Resource Protection (0011) Trusted Recovery (0011) Security Policies and Supporting Counterparts (0010) Baselines (0010) Guidelines (0010) Procedures (0010) Security Policy (0010) Standards (0010) Threats (0010) (0011) Countermeasures Employee Sabotage (0011) Errors and Omissions (0011) Fraud (0011) Hackers and Crackers (0011) Industrial Espionage (0011) Loss of Physical and Infrastructure Support (0011) Malicious Code (0011) Theft (0011) Security Models and Architecture (0010) Architecture (0011) Open and Closed Systems (0011) Protection Rings (0011) Recovery Procedures (0011) Security Modes (0011) Trusted Security Base (0011) Operations Systems Security Mechanisms (0010) Process Isolation (0010) Protection Rings (0010) Reference Monitor (0010) Security Kernel (0010) Trusted Computing Base (0010) Virtual Machine (0010) Security Evaluation Criteria (0010) Certification vs Accreditation (0010) (0011) DITSCAP (0011) NIACAP (0011) Evaluation (0010) BS 7799 (DAN) Common Criteria (0010) (0011) European Information Technology Security Evaluation Criteria (ITSEC) (0011) Information Technology Security Evaluation Criteria (0010) ISO 17788 (DAN) Rainbow Series (OBE but..) (0010) Trusted Computer System Evaluation Criteria (0010) (0011) Trusted Network Interpretation (0011) Security Models (0010) Some Belong in Access Control? Integrity VS Privacy Which model is which (CDS) Access Matrix (0010) (0011) Bell – LaPadula (0010) Biba (0010) Brewer and Nash Model (0010) Clark – Wilson (0010) Graham – Denning (0010) Harrison – Ruszzo – Ulman (0010) Information Flow Model (0010) Non-Interference (0010) State Machines (0010) Take Grant (0011) System Components (0010) (See the Big Computer) Early chapter? Central Processing Unit (0010) Data Access Storage (0010) Firmware General Architecture of Systems (Von Neumann Bit) (0010) Hardware ISO Model 7 layer ? (CDS) Operating States (0010) Pointers etc (CDS) Processing Instructions (0010) Software Storage and Memory Types (0010) Virtual Storage (0010) Telecommunications and Network Security (0010) Network Types (0011) Local Area (0011) Wide Area (0011) Cables and Data Transmission Types (0010) 802-11 (CDS) Asynchronous and Synchronous (0010) Broadband and Base band (0010) Cable Issues (0010) Coaxial Cable (0010) Fiber (0010) Fire Ratings (0010) Microwave (CDS) Signals (0010) Transmission Methods (0010) Twisted Pair Cable (0010) Fault Tolerance Methods and Mechanisms (0010) RAID (0010) Clustering (0010) Backup (0010) LAN Technologies (0010) Media Access Technologies (0010) Ethernet (0010) Polling (0010)) Token (0010) Network Topologies (0010) Bus (0010) Ring (0010) Star (0010) Protocols (0010) Address Resolution Protocol (ARP) (0010) Boot Protocol (0010) Internet Control Message Protocol (ICMP) (0010) Reverse Address Resolution Protocol (RARP) (0010) Network Devices and Services (0010) Bridge (0010) Brouter (0010) Firewalls (0010) Administration (0010) Architecture (0010) Packet Filter (0010) Proxy Firewall (0010) State Firewall (0010) Gateway (0010) Network Services (0010) DNS (0010) NAT (0010) Remote Connection (0010) CHAP (0010) EAP (0010) PAP (0010) PPP (0010) SLIP (0010) Repeater (0010) Router (0010) Switches (0010) VLAN (0010) VPN (0010) IPSec (0010) L2TP (0010) PPTP (0010) Remote Access Methods and Technologies (0010) Remote Access (0010) Wireless Technology (0010) Access Points (0010) OSA and SKA (0010) Spread Spectrum (0010) SSID (0010) WAP (0010) Telecommunications Cell Phone Clone (0010) E-Mail Security (0011) E-mail Monitoring (CDS) E-mail Storage (CDS) E-mail Privacy (CDS) Facsimile Security (0011) PBX Threat (0010) PBX Fraud (0011) PBX Abuse (0011) TCP/IP Model (0010) Extranets (0010) Internet Protocol (0010) Intranets (0010) ISO/OSI Seven Layers (0011) Physical Layer Data Link Network Transport Session Presentation Application Networks (0010) Telecommunications Protocols and Devices (0010) ATM (0010) Cable Modems (0010) CSU/DSU (0010) Dedicated Link (0010) DSL (0010) FDDI (0010) Frame Relay (0010) HDLC (0010) ISDN (0010) Multiservice Access Technology (0010) Quality of Service (0010) S/WAN (0010) SDLC (0010) SMDS (0010) SONET (0010) WAN Switching (0010) X.25 (0010) Items looking for home (0100) CERT – Where does it go? Non-Computer FAX type stuff PBX? Challenge of Survivability (0100) Compare and Contrast Security and Survivability (0100) Define Survivability (0100) Describe Layered approaches (0100) Identify and define the components of the Information Security Model – Security Model, Information security Properties and Security measures. (0100) Asset and Risk Management (0100) Policy Formulation and Implementation (0100) TCP/IP Security (0100) Threats Vulnerabilities and Attacks (0100) Host System Hardening (0100) Secure Network Infrastructure (0100) Deploying Firewalls (0100) Secure Remote Access (0100) Writing a Security Plan (CDS/?) Reliability and Availability Calculations MTTR MTBF Valuing Assets (ISSA and CDS Class Notes)