Cyber Security Chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

issue-specific security policy

(1) addresses specific areas of technology (2) requires frequent updates, (3) contains a statement on the organization's position on a specific issue

The Defense Strategy includes 3 common methods

1) Application of policy (Managerial control) 2) Education and training (Operational control) 3) Application of technology (Technological control)

Things to consider when considering Best Practices for your organization

1) Does your organization resemble the identified target organization? Is your organization in a similar industry as the target? 2) Can your organization expend resources similar to those identified with the best practice? 3) Is your organization in a similar threat environment as the target organization?

12. What are the strategies from controlling risk as described in this chapter?

1. Defend - The defend control strategy attempts to prevent the exploitation of the vulnerability. 2. Transfer - The transfer control strategy attempts to shift risk to other assets, other processes, or other organizations. 3. Mitigate - The mitigate control strategy attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation. 4. Accept - The accept control strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation. 5. Terminate - The terminate control strategy directs the organization to avoid those business activities that introduce uncontrollable risks.

Six steps in contingency planning process

1. Identifying the mission- or business-critical functions: 2. Identifying the resources that support 3. Anticipating potential contingencies or disasters:he critical functions. 4. Selecting contingency planning strategies 5. Implementing the contingency strategies 6. Testing and revising the strategy

Three main concerns if fire occurs in OR

1. protect the patient 2. contain the fire 3. move the anesthesia equipment as far away as possible from the fire source

11. What is competitive disadvantage? Why has it emerged as a factor?

A competitive disadvantage occurs when a company falls behind the competition in its ability to maintain the highly responsive services required in today's marketplaces. This is a factor because almost all organizations have an IT system in this day and time. Therefore, organizations need to obtain or improve their IT systems to avoid falling behind all others.

Security clearance

A component of data classification scheme that assigns a status level to employees to designate maximum level classified data they may access

Risk assessment

A determination of the extent to which an organization's information assets are exposed to risk

Threats-vulnerabilities-assets worksheet

A document that shows a comparative ranking of prioritized assets against prioritized threats, with an indication of any vulnerabilities in the asset/threat pairings

Threat-vulnerabilities-assets triples

A pairing of an asset with a threat and an identification of vulnerabilities that exist between the two. This pairing is often expressed in the format TVA, where there may be one or more vulnerabilities between the threat and asset.

Baseline

A performance value or metric used to compare changes in the object being measured

Acceptable Use Policy(AUP)

A policy used by organizations such as schools and businesses to regulate online use.

asset valuation

A process of assigning financial value or worth to each information asset

19. What is the definition of single loss expectancy? What is annual loss expectancy?

A single loss expectancy is the value associated with the most likely loss from an attack. It is a calculation based on the value of the asset and the expected percentage of loss that would occur from a single occurrence of a particular attack. Annual loss expectancy is the expected loss from exploitation of a vulnerability for a specific information asset over the course of a year. It is calculated by multiplying the single loss expectancy for a particular information asset by the annualized rate of occurrence.

Federal Agencies Security Practices (FASP)

A web site established by the U.S. government to share best practices in Information Security

Hot Sites

A xxx is a fully configured computer facility,

Warm Sites

A xxxx site typically does not include the actual applications the company needs,

Cold Sites

A xxxxx provides only rudimentary services and facilities.

Cost benefit analysis (CBA)

AKA an economic feasibility study, the formal assessment and presentation of the economic expenditures needed for a particular security control; contrasted with its projected value to the organization

Asset exposure

Also known as event loss magnitude, the combination of an asset's value and the percentage of it that might be lost in an attack

Loss magnitude

Also known as event loss magnitude, the combination of an asset's value and the percentage of it that might be lost in an attack

NIST Special Publication SP 800-12

An Introduction to Computer Security (The computer Security handbook)

organizational feasibility

An assessment of how well the proposed information security alternatives will contribute to the efficiency, effectiveness, and overall operation of an organization

Operational feasibility

An assessment of user acceptance and support, management acceptance and support, and the overall requirements of the organization's stakeholders

behavioral feasibility

An assessment of user acceptance and support, management acceptance and support, and the overall requirements of the organization's stakeholders

technical feasibility

An assessment of whether the organization can acquire the technology necessary to implement and support the proposed control

Political feasibility

An assessment of which controls can and cannot occur based on the consensus and relationships among communities of interest

Qualitative assessment

An asset valuation approach that uses categorical or non-numeric values rather than absolute numerical measures

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

Field change order (FCO)

An authorization issued by an organization for the repair, modification, or update of a piece of equipment

DNS poisoning

An entry is embedded in the victim's local DNS cache that

Dumpster diving

An information attack that involves searching through a organization's trash and recycling bins for sensitive information

Clean desk policy

An organizational policy that specifies employees must inspect their work areas and ensure that all classified information, documents, and materials are secured at the end of every workday

Threat assessment

And evaluation of the threats to information assets, including a determination of their potential to endanger the organization

ALE = Single Loss Expectancy (SLE) x Annualized Rate of Occurance (ARO)

Annualized Loss Expectancy (ALE)

Quantitative Assessment

As asset valuation approach that attempts to assign absolute numerical measures

6. What value does an automated asset inventory system have for the risk identification process?

Automated tools can sometimes identify the system elements that make up hardware, software, and network components. The inventory listing is usually available in a database. Once stored, the inventory listing must be kept current. When you move to the later steps of risk management, which involve calculations of loss and projections of costs, the case for the use of automated risk management tools for tracking information assets becomes stronger.

EMI Shielding

Barrier placed around wires block EMI from interfering with the electrical signals in the wires

The most common mitigation plans are:

Contigency Plans (IR, DR, BC plans)

18. What is a Cost Benefit Analysis?

Cost benefit analysis is the formal decision-making process used by an organization to evaluate whether or not the benefit gained from a given project is worth the expense its undertaking incurs.

CBA = ALE (prior) - ALE (post) - ACS (Annualized Cost of Safeguard)

Cost-Benefit Analysis (CBA)

Turnstiles

Device with bars or other obstruction to alternately block an entry way

separation of duty

Different people do parts of the process, which is well documented; no single person has control end to end

Fire class

Different types of fire based on the fuel that feeds the fire

Electromagnetic radiation (EMR)

Electromagnetic signals given off all electronic equipment

NIST SP 800-27, Rev. A

Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

Data Center

Facility specifically designed to store and manage vast quantities of data

FUD

Fear, uncertainty, and doubt (FUD) emotions of upper management officials

Data classification scheme

Formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it

4. In risk management strategies, why must periodic review be a part of the process?

Frequently, organizations implement control mechanisms, but then neglect the necessary periodic review, revision, and maintenance. The policies, education and training programs, and technologies that protect information must be carefully maintained and administered to ensure that they are still effective.

Hot and Cold Aisles

Fronts of servers face cold aisles; hot air is expelled into hot aisles

Policy Management

Good management practices for policy development and maintenance make for a more resilient organization.

NIST SP 800-37, Rev. 1

Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Lifecycle Approach

Waterholes

Hackers discover which websites are often visited by specific individuals, department, or all employees of a company

Internet engineering task force

IETF

Single Loss Expectancy (SLE)

In a cost benefit analysis, the calculated value associated with the most likely loss from an attack. The SLE is the product of the asset's value and the exposure factor

Annualized rate of occurrence (ARO)

In a cost benefit analysis, the expected frequency of an attack, expressed on a per year basis

Exposure Factor (EF)

In a cost benefit analysis, the expected percentage of loss that would occur from a particular attack

Annualized Loss expectancy

In a cost benefit analysis, the product of the annualized rate of occurrence and single loss expectancy

Annualized cost of a safeguard

In a cost-benefits analysis, the total cost of a control or safeguard, including all purchase, maintenance, subscription, personnel, and support fees, divided by the total number of expected years of use

3. Who is responsible for risk management in an organization? Which community of interest usually takes the lead in information security risk management?

In an organization, it is the responsibility of each community of interest to manage the risks that organization encounters. Each community of interest has a role to play. Since the members of the information security community best understand the threats and attacks that introduce risk into the organization, they often take a leadership role in addressing risk.

Pharming

Involves setting up a website that looks legitimate and credible but is used to steal personal information entered by users

8. Which is more important to the systems components classification scheme, that the list be comprehensive or mutually exclusive?

It is more important that the list be comprehensive than mutually exclusive. It would be far better to have a component assessed in multiple categories rather than to have it go completely unrecognized during a risk assessment.

2. According to Sun Tzu, what two key understandings must you achieve to be successful?

Know yourself Know your enemy

Loss Event Frequency (LEF) Formula

LEF = Likelihood of attack x attack success probability

Primary factors to consider when selecting a risk control strategy

Level of the threat and value of the asset

Reasons for back pain or injury

Lifting with the back bowed out, bending and reaching with the back bowed out, jerking or twisting at the hips, obesity, loss of strength and flexibility, poor nutrition

Two measures to compare benchmarking practices

Metrics-based and Process-based measures

Compartmented Information

Named projects requiring an extreme-need-to-know before access is allowed

Security Framework

OUtline of Information security

Defense in Depth

One of the basic tenets of security architectures is the layered implementation of security.

The Reasoned Approach to Risk

One that balances the expense of controlling vulnerabilities against possible losses if the vulnerabilities are exposed

Process-based measures

Performance measures or metrics based on intangible activities

Metrics-based measures

Performance measures or metrics based on observed numerical data

Whale Phishing

Phishing attack targeting individuals with high net worth or high status

Vishing

Phishing attacks committed using telephone calls or VoIP systems.

Smishing

Phishing attacks committed using text messages (SMS).

Mantrap

Physical access control system that uses two sets of interlocking doors

Three goals of security measures

Preventing a problem

Risk management

Process of identifying risk, assessing its relative magnitude, taking steps to reduce it to an acceptable level

Offboarding

Process of managing the way employees leave the organization.

spear phishing

Recipients are deliberately chosen for attack

RACE

Remove/rescue anyone from fire or smoke danger to a safe area; Alert/sound the alarm; Contain the fire; Extinguish/evacuate

Central Sterile Supply and Processing (CSPD)

Responsible for wrapping instrument sets and sterilizing them; also used for storing an distributing supplies and equipment and processing supplies as they arrive from manufacturers

9. What's the difference between an asset's ability to generate revenue and its ability to generate profit?

Revenue is the recognition of income from an activity supported by the system. Profit is the amount of revenue that exceeds operating costs. Some systems may cost more to operate than they contribute to revenue.

Risk Formula

Risk = Loss frequency x Loss magnitude + uncertainty

17. What is risk appetite? Explain why risk appetite varies from organization to organization?

Risk appetite defines the quantity and nature of risk that organizations are willing to accept as they evaluate the trade offs between perfect security and unlimited accessibility. Risk appetite varies from organization to organization because different organizations maintain different balances between the expense of controlling vulnerabilities and the losses possible if these vulnerabilities were exploited. The key for each organization is to find the balance in its decision-making processes and in its feasibility analyses, therefore assuring that an organization's risk appetite is based on experience and facts.

1. What is risk management? Why is identification of risks, by listing assets and their vulnerabilities, so important to the risk management process?

Risk management is the process of identifying risk, assessing its relative magnitude, and taking steps to reduce it to an acceptable level.

Server Room

Secured room in which servers and networking equipment are installed

NIST SP 800-26

Security Self-Assessment Guide for Information Technology Systems

Best business practices

Security efforts that seek to provide a superior level of performance in the protection of information. AKA best practices or recommended practices.

5. Why do networking components need more examination from an information security perspective than from a systems development perspective?

Since networking subsystems are often the focal point of attacks against the system, they should be considered as special cases rather than combined with general hardware and software components. Additionally, some networking components require examination from an information security perspective due to the fact that they must be reconfigured from their default settings to both serve their required purpose and maintain security requirements. From the systems development perspective, the networking component may function perfectly, as is, right out of the box. However, without information security oversight, potential vulnerabilities could go unnoticed.

SLE = Exposure Factor (EF) x Asset Value

Single Loss Expectancy Formula

The Fire Triangle

Source of ignition (ignition), oxygen (oxygen-rich environment), flammable chemical gas, vapor, or liquid (fuel)

TEMPEST

Spe

FAIR Approach to Risk Assessment

Stage 1: Identify scenario components Stage 2: Evaluate Loss Event Frequency (LEF) - Threat Event Frequency (TEF) - Threat capability (TCap) - Control strength (CS) - Vulnerability (Vuln) Stage 3: Evaluate Probable Loss Magnitude (PLM) Stage 4: Derive and Articulate Risk

Closed-Circuit Television(CCTV)

System in which video cameras transmit signals to a centralized monitoring location, not publicly broadcast

16. How is an incident response plan different from a disaster recovery plan?

The DR plan focuses more on preparations completed before and actions taken for disasters - often escalated incidents; to reestablish operations at the primary site. The IR plan focuses on Incident Response: intelligence gathering, information analysis, coordinated decision making, and urgent, concrete actions taken while an incident is occurring.

NIST Special Publication 800-18 Rev. 1

The Guide for Developing Security Plans for Federal Information Systems can be used as the foundation for a comprehensive security blueprint and framework.

7. What information attribute is often of great value for networking equipment when DHCP is not used?

The IP address is a useful attribute for networking equipment. Note that many organizations use the dynamic host control protocol (DHCP) within TCP/IP that reassigns IP numbers to devices as needed, making the use of IP numbers as part of the asset identification process problematic. As a result, IP address use in inventory is usually limited to those devices that use static IP addresses.

Crisis Management

The actions taken during and after a disaster

Avoidance of competitive disadvantage

The adoption and implementation of a business model, method, technique, resource, or technology prevent being a out performed by a competing an organization; working to keep pace with the competition and innovation, rather than falling behind

Competitive advantage

The adoption and implementation of an innovative business model, method, technique, resource, or technology in order to out perform the competition

Risk appetite

The amount of risk organization is willing to accept

Residual risk

The amount of risk that remains to an information asset even after the organization has applied its desired level controls

Risk control

The application of controls that reduce the risks to an organization's information assets to an acceptable level

Loss frequency

The calculation of the likelihood of an attack coupled with the attack frequency to determine the expected number of losses within a specified time range

Baselining

The comparison of past security activities and events against the organization's current performance

13. Describe the "defend" strategy. List and describe the three common methods.

The defend control strategy attempts to prevent the exploitation of the vulnerability. This Is the preferred approach, and is accomplished by means of countering threats, removing vulnerabilities from assets, limiting access to assets, and adding protective safeguards. There are three common methods used to defend: - Application of policy - Education and training - Application of technology

Performance gap

The difference between an organization's observed and desired performance

Risk identification

The enumeration and documentation of risks to an organization's information assets

Business Impact Analysis

The first phase in the development of the contingency planning process is the xxxxx). A xxxx is an investigation and assessment of the impact that various attacks can have on the organization. xxxx takes up where the risk assessment process leaves off. It begins with the prioritized list of threats and vulnerabilities identified in the risk management process.

Strategic plan

The first priority of the CISO and the information security management team is the creation of a __________ to accomplish the organization's information security objectives.

15. Describe the "mitigate" strategy. What three planning approaches are discussed in the text as opportunities to mitigate risk?

The mitigate strategy is the control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation. Mitigation begins with the early detection that an attack is in progress and the ability of the organization to respond quickly, efficiently, and effectively. This approach requires the creation of three types of plans: the incident response plan, the disaster recovery plan, and the business continuity plan. Each of these plans depends on the ability to detect and respond to an attack as quickly as possible and relies on the existence and quality of the other plans. Incident Response Plan (IRP) - Defines the actions an organization can and perhaps should take while an incident is in progress. Disaster recovery plan (DRP) - The most common mitigation procedure; preparations for the recovery process. Business Continuity Plan (BCP) - Encompasses the continuation of business activities if a catastrophic event occurs.

attack success probability

The number of successful attacks that are expected to occur within a specified time period.

policy administrator

The policy champion and manager

Incident Planning

The predefined responses enable the organization to react quickly and effectively to the detected incident.

Likelihood

The probability that a specific vulnerability within an organization will be the target of an attack

Benchmarking

The process of comparing other organization's activities against the practices used in one's own organization to produce results it would like to duplicate

cost avoidance

The process of preventing the financial impact of an incident by implementing a control

Onboarding

The process through which new employees learn the attitudes, knowledge, skills, and behaviors required to function effectively within an organization.

Defense Control Strategy

The risk control strategy that attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards

mitigation control strategy

The risk control strategy that attempts to reduce the impact of a successful attack through planning and preparation

transfer control strategy

The risk control strategy that attempts to shift residual risk to other assets, other processes, or other organizations

termination control strategy

The risk control strategy that eliminates all risk associated with an information asset by removing it from service

acceptance control strategy

The risk control strategy that indicates an organization is willing to accept the current level of residual risk

20. What is residual risk?

The risk to information assets that remains even after current controls have been applied.

Electronic vaulting

The transfer of large batches of data to an offsite facility is called xxxxx. This transfer is usually conducted through leased lines, or services provided for a fee.

Remote journaling

The transfer of live transactions to an offsite facility is called xxxxxx

14. Describe the "transfer" strategy. Describe how outsourcing can be used for this purpose.

The transfer strategy is the control approach that attempts to shift risk to other assets, other processes, or other organizations. Outsourcing allows an organization to transfer the risk associated with the management of complex systems to another organization that has experience in dealing with those risks. One of the benefits of outsourcing is that the service provider is responsible for disaster recovery when recovery efforts are needed.

Three Safety Factors around ionizing radiation

Time, shielding , and distance

Tailgating

Unauthorized person walking into a facility with or right behind authorized people to appear as if with them

Bollards

Vertical cylinders permanently installed to prevent vehicles from passing

10. What are vulnerabilities and how do you identify them?

Vulnerabilities are specific avenues that threat agents can exploit to attack an information asset. They are a flaw or weakness in an information asset, security procedure, design, or control that could be exploited accidentally or on purpose to breach security. Analyzing all components of an Information System and evaluating the risk to each component should identify any vulnerabilities.

Dissemination

________ demonstrate that the policy has been made readily available for review by the employee. Common xxx techniques include hard copy and electronic distribution.

Systems-Specific Policy (SysSP)

________ often function as standards or procedures to be used when configuring or maintaining systems

Governance

________ providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise's resources are used responsibly."

DMZs

a no-man's-land between the inside and outside networks; it is also where some organizations place Web servers. These servers provide access to organizational Web pages, without allowing Web requests to enter the interior networks.

Incident Response Plan

a set of documents that direct the actions of each involved individual who reacts to and recovers from the incident.

Proxy Servers

actions on behalf of another system.

Personally Identifiable Information (PII)

any data that can be used to identify, locate, or contact an individual

Operational controls

are management and lower-level planning functions that deal with the operational functionality of security in the organization, such as disaster recovery and incident response planning. xxxxx address personnel security, physical security, and the protection of production inputs and outputs.

Intrusion Detection and Prevention Systems (IDPSs)

detect unauthorized activity within the inner network or on individual machines

Business Unit Analysis

determine which are most vital to continued operations.

Firewalls

discriminates against information flowing into or out of the organization. A xxxxx is usually a computing device or a specially configured computer that allows or prevents access to a defined area based on a set of rules. xxxxx are usually placed on the security perimeter, just behind or as part of a gateway router.

Chemical hazards

disinfecting agents, waste anesthetic gases, and vapors and fumes from chemical agents

Sender policy framework(SPF)

e-mail protocol used to validate the legitimacy of the e-mail address

Potential Damage Assessment

estimate the cost of the best, worst, and most likely cases.

Occupational Safety and Health Administration (OSHA)

federal organization that is dedicated to protecting the health of workers by establishing standards that address issues related to safety in the work place

NIST Special Publication 800-14

generally Accepted Principles and Practices for Securing Information Technology Systems provides best practices and security principles that can direct the security team in the development of a security blueprint.

Standard Precautions

guidelines established by the Occupational Safety and Health Administration and the Centers for Disease Control and Prevention to reduce the risk of disease transmission from blood and body fluids

Damage assessment

immediate determination of the scope of the breach

Static electricity

is prevented by keeping the humidity above 50%; humidity below this is conductive to spark transmission

Disaster Recovery Planning

is the process of preparing an organization to handle and recover from a disaster, whether natural or man-made.

Biological hazards

laster and/or electrosurgical plume, pathogens found in body fluids, latex sensitivity, and injuries from sharps

Laser

light amplification by the stimulated emission of radiation

electrosurgical unit

mechanical device which produces an electric current that is converted into thermal energy(heat) for the purpose of cutting or coagulating tissue

firewall subnet

multiple firewalls creating a buffer between the outside and inside networks

ET tube for laser surgery

must be inflated with sterile water instead of air with wet sponges around the tube and cuff

Fiberoptic beam

must not be focused on the drapes

Physical hazards

noise, ionizing radiation, electricity, injury to the body, fire, and explosion

Ebonized instrumentation

nonreflective instrumentation that must be used in the vicinity of the laser site

Database shadowing

not only processes duplicate, real-time data storage, but also duplicates the databases at the remote site to multiple servers.

triboelectrification

one of two processes by which static electricity can build; occurs by friction between two surfaces

Business continuity planning

prepares an organization to reestablish critical business operations during a disaster that affects operations at the primary site.

Grounding

prevents the passage of the electrical current through the patient by directing the current to the ground, therefore bypassing the patient

Managerial controls

set the direction and scope of the security process and provide detailed instructions for its conduct

security education, training, and awareness

seta

Plume

smoke produced by laser or electrocautery that has been shown to contain biological material

Subordinate Plan Classification

subordinate plans take into account the identification of, reaction to, and recovery from each attack scenario.

Jersey walls

tee-shaped walls usually made of concrete to prevent vehicles from passing

Environmental Services

the ancillary department charged with cleaning the surgery department

Incident response (IR)

the set of activities taken to plan for, detect, and correct the impact of an incident on information assets.

ISO 27000 Series

xxxx "give recommendations for information security management for use by those who are responsible for initiating, implementing, or maintaining security in their organization.

Security Area Working Group

xxxxx acts as an advisory board for the protocols and areas developed. (Internet Engineering Task Force) - IETF security architecture

Technical controls

xxxxx are the components put in place to protect an organization's information assets. designing and implementing

Security Perimeter

xxxxx defines the boundary between the outer limit of an organization's security and the beginning of the outside world.

Spheres of Security

xxxxxxx illustrate how information is under attack from a variety of sources.


Ensembles d'études connexes

Understanding the Federal Reserve

View Set

Abnormal Psy 3, Abnormal Psychology, Abnormal Psychology 2

View Set

Investment Analysis Midterm Agapova Fall 2019

View Set

MGT 3830 Chapter 1 Gur Test Bank

View Set

Adult Health Tutoring - Fluids & Electrolytes

View Set

SOC 170 Reading Quizzes Part 2: Population Health

View Set