Sunflower Cissp
93 questions across 0 topics. Use the find bar or section chips to jump to what you need.
Confidentiality
protecting data or a resource from being altered in an unauthorized fashion
integrity
fault tolerance and recovery procedures - depends on business and value to business
Availability
ensuring that a subject is who he says he is - Unique user name, account number etc OR an issuance keycard - must be non descriptive you can't see what someone can do by the name - First piece of credentials
identification
password, phrase key token, pin - looking at access control matrix /comparing security labels - Stacking of authorizations is called Authorization Creep, too much rights is called excessive privileges - Granted privileges and system granted default access - default no access, give only access that's needed NEED TO KNOW - Second piece of credentials - Strong Authentication if you use 2 out of the three authentications know, has, is AKA 2-factor authentication - Something a person KNOWS, HAS, IS knowledge, ownership, characteristics
Authentication
testing of evidence of users identity
Accountability
each subject is uniquely identified and actions are recorded
Authorization
rights and permissions granted
privacy
level of confidentiality and privacy protections
Controls Prime objective
is to reduce the effects of security threats and vulnerabilities to a tolerable level
risk analysis
process that analyses threat scenarios and produces a representation of the estimated Potential loss
Types of controls
Physical, Technical and Administrative
Information Classification why?
Not all data has same value, demonstrates business commitment to security, Identify which information is most sensitive and vital
Classification criteria
Criteria Value, age, useful life, personal association
Levels of classification military
Unclassified - Sensitive but unclassified answers to test, Healthcare - Confidential some damage- Secret Serious damage- Top Secret Grave damage
Private sector classifications
Public - Sensitive - Private - Confidential
Security Awareness
Losses staff members pose more threat than external hackers loss of money stolen equipment, loss of time work hours loss off reputation declining trusts and loss of resources bandwidth theft
Losses
Policies is the first and highest level of documentation Very first is called Senior management Statement of Policy, Stating importance, support and commitment Types - Regulatory required due to laws, regulations, compliance and specific industry standards!) - Advisory not mandatory but strongly suggested - Informative to inform the reader
Security policies, standards and guidelines
has classifications and defines level of access and method to store and transmit information
information policy
has Authentications and defines technology used to control information access and distribution
Security policies
lists hard software to be used and steps to undertake to protect infrastructure
SYSTEM security policy
Specify use of specific technologies in a uniform way
Standards
same as standards but not forced to follow
Guidelines
Detailed steps to perform a task
Procedures
Minimum level of security
Baseline
ultimate responsibility
Roles and responsibilities Senior Manager
functional responsibility
Information security Officer
Strategic, develops policies and guidelines
Security Analyst
Responsible for asset - Determine level of classification - Review and change classification - Can delegate responsibility to data custodian - Authorize user privileges
owner
Run regular backups/restores and validity of them - Insuring data integrity and security C I A Maintaining records in accordance to classification - Applies user authorization
custodian
Uses information as their job - Follow instructions in policies and guidelines - Due care prevent open view by e.g. Clean desk) - Use corporation resources for corporation use
end user
examines security controls
Auditor
FISMA(federal agencies) Phase 1 categorizing, selecting minimum controls, assessment Phase 2: create national network of secures services to assess
Legislative drivers FISMA federal agencies
8 elements reassessments owners have responsibilities. Benefits: consistent; comparable; repeatable
NIST
Determine impact of the threat and risk of threat occurring
Risk Management GOAL
Primary risk assessment, mitigation methodology Secondary data collection and sources for risk analysis
Risk Management activities
Inherent chance of making an error with no controls in place Control chance that controls in place with prevent, detect or control errors Detection chance that auditors won't find an error Residual risk remaining after control in place Business concerns about effects of unforeseen circumstances Overall combination of all risks aka Audit risk
Types of Risk
Helps to gather the elements that you will need when the actual Risk Analysis takes place.
Preliminary Security Examination (PSE)
Steps: Identify assets, identify threats, and calculate risk. Qualitative HAPPY FACES - Higher level , brainstorming, focus groups etc
Risk Management -ANALYSIS -Qualitative
Quantitative VALUES!! - SLE single Loss Expectancy = Asset Value Times Exposure factor (% lost of asset) - ALE (Annual loss expectancy) = SLE Times ARO (Annualized Rate of occurrence)
Risk Management -quantitative
Accept, mitigate-reduce by implementing controls calculate costs Assign insure the risk to transfer it Avoid stop business activity Loss= probability Times cost
Risk remedies
Planning and information gathering - Access internal controls - Compliancy testing - Substantive tests - Finalize the audit
Risk-Based Audit Approach
flow of information between a subject and an object CONTROL security features that control how users and systems
Access Control
active entity that requests access to an object or data within the object user, program
Subject
Is a passive entity that contains information computer, database, file, program
object
assurance that information is not disclosure to unauthorized programs, users, processes • encryption, logical and physical access control, • The data needs to be classified
Controls-Administrative
Preventive: hiring policies, screening security awareness also called soft-measures! - Detective: screening behavior, job rotation, review of audit records
Controls- Technical -aka Logical
Preventive: protocols, encryption, biometrics smartcards, routers, firewall. Detective: IDS and automatic generated violation reports, audit logs.
Physical Controls
Preventive: fences, guards, locks - Detective: motion detectors, thermal detectors video cameras
Operational controls
Detective, Preventive PASSWORDS TOO Corrective restore controls Restore control ( restore resources deterrents
Controls-Types- Mandatory access control
Authorization depended on security labels which indicate clearance and classification of objects Military Restriction: need to know can apply. Lattice based is part of it! A as in mAndatory Rule based access control. Objects are: files, directories and devices
Discretionary Access Control
Access through ACL's. Discretionary can also mean: Controlled access protection object reuse, protect audit trail. User directed access control identity based and hybrid based are also forms of discretionary Identity Based AC
Non-discretionary access control
A central authority determines what subjects have access based on policies. Role based/task based. Also lattice based can be applied greatest lower, least upper bounds apply
Something a user knows -PASSWORDS
cheap and commonly used password generators user chooses own do triviality and policy checking
One-time password aka dynamic password
used only once
Static password
Same for each logon
Passphrase
easiest to remember. Converted to a virtual password by the system
Cognitive password:
easy to remember like your mother's maiden name
Hacking
access password file - brute force attack try many different characters aka exhaustive - dictionary attack try many different words - Social engineering convince an individual to give access - Rainbow Tables tables with passwords that are already in hash format
password checker and password hacker
both programs that can find passwords checker to see if its compliant, hacker to use it by the hacker
hashing encryption
On windows system with utility SYSKEY. The hashed passwords will be encrypted in their store LM hash and NT Hash - some OS's use Seed SALT or NONCE, random values added to the encryption process to add more complexity
Something a user has
Key, swipe card, access card, badge PASSWORDS. tokens
Static Password Token
owner authenticates to token, token authenticates to the information system
Synchronous (TIME BASED) dynamic
uses time or a counter between the token and the authentication server, secure-ID is an example
asynchronous NOT TIME BASED
server sends a nonce random value This goes into token device, encrypts and delivers a one-time password, with an added PIN its strong authentication
Challenge/response token
generates response on a system/workstation provided challenge
Something a user is
What you do: behavioral What you are: physical
Biometrics
Most expensive - Acceptable 2 minutes per person for enrollment time - Acceptable 10 people per minute throughput time - IRIS is the same as long as you live - TYPE 1 error: False rejection rate FRR - TYPE 2 error: False Acceptance rate FAR - CER Crossover Error Rate or EER Equal Error rate, where FRR = FAR. The lower CER/ERR the more accurate the system.
zephyr chart =
iris scan
Finger print: stores full fingerprint
one- to-many identification
finger scan only the features
one to one identifications
scan most widely used today ?
Finger print
Acceptability Issues in biometrics
privacy, physical, psychological
Fingerprints
made up of ridge endings and bifurcations exhibited by the friction ridges and other detailed characteristics that are called minutiae
Retina Scans
Scans the blood-vessel pattern of the retina on the backside of the eyeball
Iris Scans
Scan the colored portion of the eye that surrounds the pupil.
Facial Scans
Takes attributes and characteristics like bone structures, nose ridges, eye widths, forehead sizes and chin shapes into account.
Palm Scans
The palm has creases, ridges and grooves throughout it that are unique to a specific person.
Hand Geometry
The shape of a person's hand the length and width of the hand and fingers measures hand geometry.
voice print
Distinguishing differences in people's speech sounds and patterns
Signature Dynamics
Electrical signals of speed and time that can be captured when a person writes a signature
Keyboard dynamics
Captures the electrical signals when a person types a certain phrase.
Hand Topology
Looks at the size and width of an individual's hand and fingers.
Single Sign On SSO.
Advantage: ability to use stronger passwords, easier administration, less time to access resources. Disadvantage: once a key is compromised all resources can be accessed. Thin client is also a single sign on approach
single sign-on (SSO)-KERBEROS
Kerberos addresses Confidentiality and integrity and authentication, not availability
Kerberos Is based on
on symmetric key cryptology and is not a propriety control
KERBEROS time is:
Critical
What is included in windows now replaced NTLM=NT-LAN Managed?
KERBEROS
Passwords are never exchanged only hashes of passwords in what SSO?
KERBEROS
KERBEROS-benefits?
inexpensive, loads of OS's mature protocol
Kerberos Disadvantages
takes time to administer, can be bottleneck or single point of failure
What is the term realm in Kerberos?
indicates an authentication administrative domain. Its intention is to establish the boundaries within which an authentication server has the authority to authenticate a user, host or service.
KDC Key Distribution Center does what?
grants tickets to client for specific servers. Knows all secret keys of all clients and servers from the network
Client authenticates to the ?
KDC
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials