Term
|
Definition
| A collection of mechanisms that work together to protect the assets of an enterprise. |
|
|
Term
| Access controls help protect against ______ and ______. |
|
Definition
| Threats and Vulnerabilities |
|
|
Term
| Access controls enable management to: |
|
Definition
Specify which users can access the system
Specify what resources they can access
Specify whater operations they can perform
Provide individual accountabilty |
|
|
Term
|
Definition
| Define and divide elements of a process or work function among different functions. |
|
|
Term
|
Definition
| Limit users and processes to access only resources necessary to perform assigned functions. |
|
|
Term
| The environment for access controls includes: |
|
Definition
Facilities
Support Systems
Information Systems
Personnel -
management, users, customers, business partners |
|
|
Term
Control categories:
Deterrent |
|
Definition
|
|
Term
Control Categories:
Preventive |
|
Definition
|
|
Term
Control categories:
Detective |
|
Definition
|
|
Term
Control categories:
Corrective |
|
Definition
Remedy circumstances
mitigate damage
Restore controls |
|
|
Term
Control Categories:
Compensating |
|
Definition
Alternative control
(for example, supervision) |
|
|
Term
Control Categories:
Recovery |
|
Definition
| Restore conditions to normal |
|
|
Term
|
Definition
Administrative
Technical (Logical)
Physical |
|
|
Term
|
Definition
| Policies and procedures, including personnel controls such as security clearances, background checks. |
|
|
Term
| Technical (logical) controls |
|
Definition
| Anti-virus software, password protection, firewalls, auditing |
|
|
Term
|
Definition
| locks, alarms, badge systems |
|
|
Term
|
Definition
| The use of influence and persuasion to deceive people by convincing them that the social engineer is someone he/she is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without use of technology. |
|
|
Term
|
Definition
| Identification, Authentication, Authorization, Accountability |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Verifies who the user is and whether access is allowed |
|
|
Term
|
Definition
| What the user is allowed to do. |
|
|
Term
|
Definition
| Tracks what the user did and when it was done. |
|
|
Term
|
Definition
User IDs
Username
Account Number
Personal Identification Number (PIN)
Badge System
Biometric Devices |
|
|
Term
| User Identification Guidelines |
|
Definition
Unique
Standard naming convention
Non-indicative of job function
Secure and documented process for issuance |
|
|
Term
|
Definition
Authentication by Knowledge
Authentication by Owernship
Authentication by Characteristic |
|
|
Term
| Authentication by Knowledge |
|
Definition
What a person Knows
Passwords, Passphrases
(Password encryption schemes) |
|
|
Term
| Authentication by Ownership |
|
Definition
|
|
Term
| Authentication by Characteristic |
|
Definition
|
|
Term
| Asynchronous Token Device |
|
Definition
| A challenge-response technology/scheme. Authentication servers provide a challenge to the remote entity that can only be answered by the token that the individual holds in his/her hands. Two way communiction between the token and the server. |
|
|
Term
|
Definition
Event, location, or time based.
Authentication server knows the expected value from the token and the user must input it or be in close proximity.
Like WoW Authenticator. |
|
|
Term
|
Definition
Identity is confirmed by either:
Physiological Trait (unique, fingerprint, retina, iris)
Behavioral characteristics (keystroke, signature pattern) |
|
|
Term
| Important elements of Biometric devices |
|
Definition
Accuracy: Type I, Type II errors
Processing Speed: how fast the accept/reject is made
User acceptability
Protection of Biometric Data |
|
|
Term
|
Definition
| Fingerprint, Hand Geometry, Palm Scan, Voice Pattern, Retina Pattern/Scan, Iris Pattern/Recognition, Signature Dynamics, Facial Recognition, Keystroke Dynamics |
|
|
Term
Authentication Methods
Risk Vs. Cost |
|
Definition
Password - High Risk, Low Cost
Software Token - High/Medium Risk - Medium Cost
Hardware Token - Medium Risk, Medium/High Cost
Signing Action - High Cost, Medium/High Risk
Biometric - High Cost, Low Risk |
|
|
Term
|
Definition
| Enables a user to logon once to the enterprise and access all additional authorized network resources. |
|
|
Term
|
Definition
Efficient log-on process
Users may create stronger password
No need for multiple passwords
Timeout and attempt thresholds enforced across entire platform
Centralized Administration |
|
|
Term
|
Definition
- Compromised password allows intruder into all authorized resources
- Inclusion of unique platforms may be challenging
|
|
|
Term
|
Definition
| Provides the means to heirarchically organize and manage information and to retrieve the information by name association. |
|
|
Term
| Network Directory Service |
|
Definition
Contains a set of information about resources and services on the network, such as users, workstations, and servers.
Used to simplify access and administration by providing a unified organization of the network resources. |
|
|
Term
|
Definition
Domain of trust that shares a single security policy and single management.
Access parameters controlling which sets of objects a subject can access.
Think of a “security domain” as a concept where the principle of separation protects each resource and each domain is encapsulated into distinct address spaces. |
|
|
Term
| Discretionary Access Control |
|
Definition
| Owner determines who has access & what privileges they have |
|
|
Term
|
Definition
Owner and System determine who has access.
Systems decision based on privilege (clearance) of subject (user) & sensitivity (classification) of object (file). |
|
|
Term
| Mandatory Access Control Features |
|
Definition
For systems of highly sensitive data
Sensitivity labels to all objects and clearance labels to all subjects.
Objects's sensitivity level and the subjects clearance level determine success.
Permits processing of multiple levels on one system. |
|
|
Term
| Major difference between Mandatory Access Controls and Discretionary Access Controls |
|
Definition
| Discretionary Controls involve only the resource owner's permission, while Mandatory Controls require the system's and the owner's permission. |
|
|
Term
Examples of Access Permissions
"No Access/Null" |
|
Definition
| No access permission granted |
|
|
Term
Example of Access Permissions
Read (R) |
|
Definition
| Read but make no other changes. |
|
|
Term
Example of Access Permissions
Write (W) |
|
Definition
| Write to File; includes change capability |
|
|
Term
Example of Access Permissions
Execute (X) |
|
Definition
|
|
Term
Example of Access Permissions
Delete (D) |
|
Definition
|
|
Term
Example of Access Permissions
Change (C) |
|
Definition
| Read, write, execute and delete; may not change file permission |
|
|
Term
Example of Access Permissions
Full Control |
|
Definition
| All abilities; including changing access control permission |
|
|
Term
| Rule-Based Access Control |
|
Definition
Access based on a list of rules that determine authorization.
Owners create or authorize the rules.
Mediation mechanisms enforce the rules to ensure authorized access. |
|
|
Term
| Role-Based Access Control |
|
Definition
- Access Control decisions are based on job function.
- Each role will have its own access capabilities.
- Determination of role/job function is discretionary and is in compliance with security access control policy.
|
|
|
Term
| Intrusion Prevention System (IPS) |
|
Definition
| Intrusions are prevented. |
|
|
Term
| Intrusion Detection Systems (IDS) |
|
Definition
| Intrusion attempts and any set of actions that attempt to gain unauthorized access are detected. Need for auditing for intrusion attempts in a timely basis. |
|
|
Term
| To ensure an effective IDS (Intrusion Detection System): |
|
Definition
- Employ a technically knowledgable person to select, install, configure, operate, and maintain the IDS.
- Update the system with new signature attacks and also to evaluate expected behavior profiles.
- Be aware that the IDS itself may be vulnerable to attacks.
|
|
|
Term
|
Definition
| A record of system activities. |
|
|
Term
| Audit Trail Configuration |
|
Definition
| Capturing data generated by system, network, application, and user activities. |
|
|
Term
|
Definition
- Alert staff to suspicious activity for investigation.
- Provide details on extent of intruder activity
- Provide information for legal proceedings.
|
|
|
Term
|
Definition
- Network connection event data
- System-level event data
- Application-level event data
- User-level event data - keystroke activity
|
|
|
Term
|
Definition
Series of activities undertaken to identify and exploit security vulnerabilities.
|
|
|
Term
Types of Penetration Testing
Zero-Knowledge |
|
Definition
Team has no relevant information about target
Typically performed by independent third party |
|
|
Term
Types of Penetration Testing
Partial Knowledge |
|
Definition
| Team may have some information about the target |
|
|
Term
Types of Penetration Testing
Full Knowledge |
|
Definition
| Performed by team with intimate knowledge of target environment |
|
|
Term
Examples of Pen Test Methods
Discovery |
|
Definition
| Identify and Document information about target |
|
|
Term
Examples of Pen Test methods
Enumeration |
|
Definition
| Gain more information with intrusive methods |
|
|
Term
Examples of Pen Test Methods
Vulerability Mapping |
|
Definition
| Map environment profile to known vulnerabilities |
|
|
Term
Examples of Pen Test Methods
Exploitation |
|
Definition
| Attempt to gain user and privileged access. |
|
|
Term
| Application Security Testing |
|
Definition
| Evaluate controls over the application and its process flow. |
|
|
Term
| Denial of Service (DoS) Testing |
|
Definition
| Evaluate system's susceptibility to attacks that will render it inoperable. |
|
|
Term
|
Definition
| Identify, analyze, and exploit modems, remote access devices, and maintenance connections. |
|
|
Term
|
Definition
| Prevents unauthorized disclosure of systems and information. |
|
|
Term
|
Definition
| Prevents unauthorized modification of systems and information. |
|
|
Term
|
Definition
| Prevents disruption of service and productivity. |
|
|
Term
| Goals of Information Security |
|
Definition
Confidentiality
Integrity
Availability |
|
|
Term
| Requirements fo Security Solutions |
|
Definition
| Functional Requirements & Assurance Requirements |
|
|
Term
|
Definition
| Define security behavior of the IT product or system. |
|
|
Term
|
Definition
| Establish confidence that the security function will perform as intended. |
|
|
Term
|
Definition
| Tailored best practices that, in total, form a comprehensive security policy program and technical architecture. |
|
|
Term
| Individual security blueprints reflect |
|
Definition
Tailored requirements meeting the organization's specific requirements.
Influenced by legal, regulatory, business, IT drivers. |
|
|
Term
|
Definition
•Documents and communicates management’s goals and objectives.
•Defines the organization’s response to laws, regulations, and standards of due care.
•Builds a foundation for a comprehensive and effective security program.
•Defines what assets and principles the organization considers valuable.
•Identifies organization goals and objectives. |
|
|
Term
|
Definition
Standards
Procedures
Baselines
Guidelines |
|
|
Term
|
Definition
| Specific hardware and software mechanisms and products. |
|
|
Term
|
Definition
| Step by step required actions, such as user registration, contracting for security purposes, information system material destruction, incident response. |
|
|
Term
Organization Roles and Responsibilities
Executive Management |
|
Definition
| Assigned overall responsibility for asset protection. |
|
|
Term
Organizational Roles and Responsibilities
Information Systems Security Professionals |
|
Definition
| Response for the design, implementation, management, and review of the organization's security policies, standards, baselines, procedures, and guidelines. |
|
|
Term
Organizational Roles and Responsibilities
Owners |
|
Definition
Responsible for:
- Ensuring that appropriate security, consistent with the organization's security policy, is implemented in their information systems.
- Determining appropriate sensitivity or classification levels
- Determining access privileges
|
|
|
Term
Organizational Roles and Responsibilities
Custodian |
|
Definition
| A function who has "custody" of the system/databases, not necessarily belonging to them, for any period of time. Usually network administration or operations. |
|
|
Term
Organizational Roles and Responsibilities
Users |
|
Definition
| Responsible to use resources and preserve availability, integrity, and confidentiality of assets - responsible to adhere to security policy. |
|
|
Term
Organizational Roles and Responsibilities
IS/IT Function |
|
Definition
| Responsible for implementing and adhering to security policies. |
|
|
Term
Organizational Roles and Responsibilities
Information Systems Auditor |
|
Definition
Responsible for:
- Providing independent assurance to management on the appropriateness of the security objectives.
- Determing whether the security policy, standards, baselines, procedures, and guidelines are appropriate and effective to comply with the organization's security objectives.
- Identifying whether the objectives and controls are being achieved.
|
|
|
Term
|
Definition
- Ensure all access cards and tools are returned.
- Remove user access immediately upon departure.
- Suspension/disciplinary procedures
|
|
|
Term
|
Definition
- Clearly defined roles, job descriptions, and responsibilities
- Least privilege/need to know basis
- Separation of duties
- Job rotation
- Mandatory Vacations
|
|
|
Term
| Key Points of Security Awareness |
|
Definition
Awareness - reminder of security responsibilities
Training - provides skills needed for security
Education - decision making and security management skills |
|
|
Term
| Quantitative Risk Analysis |
|
Definition
| An attempt to assign independently objective numeric values to the elements of the risk assessment and to the assessment of potential losses. |
|
|
Term
| Qualitative Risk Analysis |
|
Definition
| Scenario Oriented, does not attempt to assign absolute numeric values to components, purely qualitative risk analysis is possible. |
|
|
Term
| List the Five Goals of Physical Security |
|
Definition
1. Deter
2. Delay
3. Detect
4. Assess
5. Respond |
|
|
Term
| List the three key strategies of crime prevention through environmental design |
|
Definition
- Territoriality - people protect territory that is their own
- Surveillance - high degree of visual control
- Access control - limit access and control the flow of access
|
|
|