Security+ Study Guide: Ch01 Today's Security Professional
Cybersecurity Objectives
- Confidentiality authorized users only.
- Integrity authorized data modification only.
- Availability proper redundancy of data and physical resources (power, computers, etc…)
“Nonrepudiation, while not part of the CIA triad, is also an important goal of some cybersecurity controls. Nonrepudiation means that someone who performed some action, such as sending a message, cannot later deny having taken that action.”
Data Breach Risks
Security incidents happen when the CIA is broken/violated.
- Malicious attack
- Accidental oversight
- Natural disaster
The DAD Triad
- Disclosure when data violates the confidentiality principle
- otherwise known as data loss
- Attackers remove information, data exfiltration
- Accidental, employee loses a device
- Alteration when data violates integrity
- Attackers modify records
- power surge causing a “bit flip”
- Cosmic particles change elections
- In 2003 in Schaerbeek, Belgium, an SEU (single-event upset) was responsible for giving a candidate in an election an extra 4,096 votes.
- Cosmic particles change elections
- Denial violates the principle of availability
- DDoS distributed denial-of-service
The CIA and DAD triads are very useful tools for cybersecurity planning and risk analysis.
Breach Impact
Financial Risk
- monetary damage to the organization as the result of a data breach.
- second-order consequence
- Lost laptop 1st order
- 2nd order competitors gain hold of product plans on the laptop and beat the organization to market.
Reputational Risk
- when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.
- Identity Theft
- The most common impact on these groups is the risk of identity theft posed by the exposure of personally identifiable information (PII) to unscrupulous individuals.
Strategic Risk
- organization will become less effective in meeting its major goals and objectives as a result of the breach.
- See laptop example above.
- If the product plans were stolen, it would directly impact the organizations market strategies.
Operational Risk
- organization’s ability to carry out its day-to-day functions.
- Ransomware data encryption of hospital databases
- Operational risk and strategic risk are closely related, so it might be difficult to distinguish between them.
- If it could end the organization - Strategic
- If it merely delays (recover via backups) - Operational
Compliance Risk
- Health Insurance Portability and Accountability Act (HIPAA) requires that health-care providers and other covered entities protect the confidentiality, integrity, and availability of protected health information (PHI).
- see Chapter 16 Security Governance and Compliance
In most cases, a risk will cross multiple risk categories.
Implementing Security Controls
- control objectives level of protection required to preserve the confidentiality, integrity, and availability of data and systems.
- Security controls are specific measures that fulfill the security objectives of an organization.
Gap Analysis
- “During a gap analysis, the cybersecurity professional reviews the control objectives for a particular organization, system, or service and then examines the controls designed to achieve those objectives.”
- Chapter 5 Security Assessment and Testing
Security Control Categories
Four categories based on their mechanism of action:
- Technical controls enforce CIA in digital space.
- Firewalls
- Access control lists
- intrusion prevention systems
- encryption
- Operational controls: access reviews, log monitoring, and vulnerability management.
- Managerial controls: mechanics of risk management process.
- Risk assessments
- security planning exercises
- incorporation of security into daily processes
- Physical controls: typical thoughts of security.
- Locks
- Fire alarms
- etc…
Security Control Types
- Preventive controls
- Deterrent controls
- Detective controls
- Corrective controls
- Compensating controls: mitigate the risk associated with exceptions made to a security policy.
- Directive controls:
- Policies and procedures are examples of directive controls.
Exploring Compensating Controls
Payment Card Industry Data Security Standard (PCI DSS) sets 3 criteria:
- Meet the rigor of the original.
- Similar level of defense.
- “above and beyond” other PCI DSS requirements.
Example: Running an outdated OS for a specific piece of software.
- Run the system on an isolated network, with little or no access to main/other networks.
Compensating Controls should only be used if absolutely necessary and only for as long as required to “bring the organization back into compliance”.
Data Protection
Data Three States:
- Data at rest: resides on hard drives, tapes, in the cloud, or on other storage media.
- Data in transit: motion/transit over a network.
- Data in use: actively in use by a computer system.
Data Encryption
- Encryption technology uses mathematical algorithms to protect information.
- Chapter 7 Cryptography and the PKI
Data Loss Prevention
- Data loss prevention (DLP) DLP systems work in two different environments:
- Agent-based DLP
- uses software to search systems for sensitive information.
- Can be removed or encrypted when found.
- monitor system configuration and user actions
- for instance blocking USB devices
- uses software to search systems for sensitive information.
- Agentless (network-based) DLP
- Monitor the outbound traffic for unencrypted sensitive information.
- Can automatically encrypt all transitions, common for email.
DLP systems also have two mechanisms of action:
- pattern matching: telltale signs of sensitive information.
- for instance unencrypted CCs and SSNs
- watermarking: tags applied to sensitive information.
- also commonly used in digital rights management (DRM)
see Chapter 5 Security Assessment and Testing
Data Minimization
- reduce sensitive information on hand.
- “destroy data when it is no longer necessary to meet our original business purpose.”
- deidentification process removes the ability to link data back to an individual.
- Alternatively, data obfuscation: format where the original information can’t be retrieved.
- Hashing: apply a hash function (limited encryption)
- vulnerable to a rainbow table attack.
- Tokenization: replace data with an id and lookup table.
- Masking: replace sensitive fields with blank characters (password login screen)
- “replace all but the last four digits of a credit card number with X’s”
- Hashing: apply a hash function (limited encryption)
- Alternatively, data obfuscation: format where the original information can’t be retrieved.
Access Restrictions
Two common types of access restrictions are geographic restrictions and permission restrictions:
- Geographic restrictions limit access based on physical location. (must be inside the building to palm scan)
- Permission restrictions (most common, should be default) limit “resources based on the user’s role or level of authorization”
- Groups and Permissions inside admin panels
see Chapter 8 Identity and Access Management
Segmentation and Isolation
- “Segmentation places sensitive systems on separate networks where they may communicate with each other but have strict restrictions on their ability to communicate with systems on other networks.”
- “Isolation goes a step further and completely cuts a system off from access to or from outside networks.”
Review Question (17/20) 85%
Not good, given I just read the chapter. I’ll need to review again before testing, and take a full practice test!
Correct
2, 3, 4, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 20
Incorrect
1, 8, 19
- 19, I was thinking from the system admin perspective not the user. Need to not overly focus on keywords
- 8, Makes sense now that I read the answer LOL.
- 1, No excuses. It was self-explanatory and I just failed to recall correctly. More review needed.