Podcast
Questions and Answers
What is the primary defense against eavesdropping in electronic communication?
What is the primary defense against eavesdropping in electronic communication?
- Using passwords for access control
- Implementing encryption for data transmission (correct)
- Conducting regular security audits
- Implementing physical barriers to conversations
Which of the following best describes the goal of integrity protection?
Which of the following best describes the goal of integrity protection?
- Maximizing the speed of data access
- Reducing data storage costs
- Ensuring only authorized changes to data are made (correct)
- Preventing data theft at all costs
What is the best defense against impersonation attacks?
What is the best defense against impersonation attacks?
- Installing firewalls at all network entry points
- Utilizing complex passwords
- Conducting user training and education (correct)
- Implementing biometric authentication systems
What attack involves capturing a legitimate user's session information to gain unauthorized access later?
What attack involves capturing a legitimate user's session information to gain unauthorized access later?
Which principle is crucial for preventing unauthorized modifications by outsiders?
Which principle is crucial for preventing unauthorized modifications by outsiders?
What must be satisfied in addition to proving identity to gain access to a system?
What must be satisfied in addition to proving identity to gain access to a system?
What does accounting in an access control system enable administrators to do?
What does accounting in an access control system enable administrators to do?
Which of the following correctly outlines the electronic access control process?
Which of the following correctly outlines the electronic access control process?
What form does authentication often take in the context of electronic access control?
What form does authentication often take in the context of electronic access control?
Which of the following is included in the mechanisms for setting a password policy?
Which of the following is included in the mechanisms for setting a password policy?
What is one potential concern when tracking user activity within an organization?
What is one potential concern when tracking user activity within an organization?
In the identification stage of access control, what information does a user typically provide?
In the identification stage of access control, what information does a user typically provide?
What is a key characteristic of digital access control systems compared to physical ones?
What is a key characteristic of digital access control systems compared to physical ones?
Which of the following best describes the role of availability in an organization?
Which of the following best describes the role of availability in an organization?
What is a common defense against Denial of Service (DoS) attacks?
What is a common defense against Denial of Service (DoS) attacks?
Which of the following contributes to service outages?
Which of the following contributes to service outages?
What defense can be used against power outages?
What defense can be used against power outages?
What is a consequence of hardware failures?
What is a consequence of hardware failures?
What is the best defense against destruction of equipment due to large-scale disasters?
What is the best defense against destruction of equipment due to large-scale disasters?
Under what circumstance might an organization experience denial?
Under what circumstance might an organization experience denial?
What does the term non-repudiation refer to in security?
What does the term non-repudiation refer to in security?
Which of the following best describes the alteration risk in the DAD triad?
Which of the following best describes the alteration risk in the DAD triad?
What is recommended to increase resilience against system failures?
What is recommended to increase resilience against system failures?
What is the primary function of signatures in transactions?
What is the primary function of signatures in transactions?
What does the term 'non-repudiation' refer to in e-commerce transactions?
What does the term 'non-repudiation' refer to in e-commerce transactions?
Which of the following is considered a biometric security control?
Which of the following is considered a biometric security control?
In the context of access control, what does 'AAA' stand for?
In the context of access control, what does 'AAA' stand for?
During which step of the access control process is a claim about identity made?
During which step of the access control process is a claim about identity made?
What is the role of authentication in an access control system?
What is the role of authentication in an access control system?
What does the 'accounting' step in the AAA process refer to?
What does the 'accounting' step in the AAA process refer to?
Why is strong evidence important in authentication?
Why is strong evidence important in authentication?
Which of these options is a characteristic of multi-factor authentication?
Which of these options is a characteristic of multi-factor authentication?
What is a digital signature's primary purpose?
What is a digital signature's primary purpose?
Which of the following describes the primary aim of Disaster Recovery (DR)?
Which of the following describes the primary aim of Disaster Recovery (DR)?
What is NOT a potential trigger for a Disaster Recovery Plan (DRP)?
What is NOT a potential trigger for a Disaster Recovery Plan (DRP)?
During the initial response to a disaster, what is the main focus?
During the initial response to a disaster, what is the main focus?
Which metric indicates the maximum acceptable amount of data loss in time during a DR event?
Which metric indicates the maximum acceptable amount of data loss in time during a DR event?
Why is flexibility key during a disaster response?
Why is flexibility key during a disaster response?
In the assessment phase after a disaster, what is primarily evaluated?
In the assessment phase after a disaster, what is primarily evaluated?
What aspect of communication is vital for responders during disaster recovery?
What aspect of communication is vital for responders during disaster recovery?
Which of the following tasks occurs first after initiating a Disaster Recovery Plan?
Which of the following tasks occurs first after initiating a Disaster Recovery Plan?
What role do temporary jobs play during a Disaster Recovery process?
What role do temporary jobs play during a Disaster Recovery process?
Which of the following is an essential component of a Disaster Recovery Plan?
Which of the following is an essential component of a Disaster Recovery Plan?
Flashcards
Authorization
Authorization
Proving your identity is not enough to access a system. You must also have the right permissions.
Accounting
Accounting
Tracking user activity and actions within a system.
Authentication
Authentication
The process of verifying a user's identity.
Identification
Identification
Signup and view all the flashcards
Password Policy
Password Policy
Signup and view all the flashcards
Password Length
Password Length
Signup and view all the flashcards
Password Complexity
Password Complexity
Signup and view all the flashcards
Password Expiration
Password Expiration
Signup and view all the flashcards
Data Integrity
Data Integrity
Signup and view all the flashcards
Unauthorized Modification
Unauthorized Modification
Signup and view all the flashcards
Impersonation
Impersonation
Signup and view all the flashcards
Man-in-the-Middle (MITM) Attack
Man-in-the-Middle (MITM) Attack
Signup and view all the flashcards
Replay Attack
Replay Attack
Signup and view all the flashcards
Disaster Recovery
Disaster Recovery
Signup and view all the flashcards
Disaster Recovery Plans (DRPs)
Disaster Recovery Plans (DRPs)
Signup and view all the flashcards
Initial Response
Initial Response
Signup and view all the flashcards
Assessment Phase
Assessment Phase
Signup and view all the flashcards
DR Metrics
DR Metrics
Signup and view all the flashcards
Recovery Point Objective (RPO)
Recovery Point Objective (RPO)
Signup and view all the flashcards
Recovery Time Objective (RTO)
Recovery Time Objective (RTO)
Signup and view all the flashcards
Staffing Flexibility
Staffing Flexibility
Signup and view all the flashcards
Communication
Communication
Signup and view all the flashcards
Functional Recovery
Functional Recovery
Signup and view all the flashcards
Digital Signature
Digital Signature
Signup and view all the flashcards
Access Control System
Access Control System
Signup and view all the flashcards
Signature Verification
Signature Verification
Signup and view all the flashcards
Biometric Authentication
Biometric Authentication
Signup and view all the flashcards
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA)
Signup and view all the flashcards
Non-Repudiation
Non-Repudiation
Signup and view all the flashcards
Denial of Service (DoS) Attack
Denial of Service (DoS) Attack
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Power Outage
Power Outage
Signup and view all the flashcards
Backup Generator
Backup Generator
Signup and view all the flashcards
Alteration
Alteration
Signup and view all the flashcards
Destruction/Denial
Destruction/Denial
Signup and view all the flashcards
Redundancy
Redundancy
Signup and view all the flashcards
Hardware Failure Resilience
Hardware Failure Resilience
Signup and view all the flashcards
Study Notes
Domain 1: Security Principles
- Security Principles provides foundational knowledge for cybersecurity careers.
- Five objectives: information assurance concepts, risk management, security controls, ISC2 Code of Ethics, and governance.
- The average weight of this domain is 26%.
- Key concepts covered include Confidentiality, Integrity, and Availability (CIA Triad).
- Also covers Non-Repudiation, Authentication and Authorization.
- Information security involves protecting information systems from unauthorized access, use, disclosure, modification, or destruction to maintain Confidentiality, Integrity, and Availability.
Security Trio Explained
- Information security encompasses all forms of data protection.
- IT Security is focused on the technical aspects like hardware and software.
- Cybersecurity is the overall protection for systems, networks, and programs against all types of digital attacks.
Confidentiality
- Confidentiality is the secrecy of protected information.
- Cybercriminals often target confidentiality as it is the most common form of protection they want to compromise.
- Data breaches often stem from unauthorized access without proper authorization.
- Risks and defenses include snooping (enforcing clean desk policy), dumpster diving (using a paper shredder), eavesdropping (using encryption and rules regarding sensitive conversations), and social engineering (user training/education).
Integrity
- Integrity is the reliability and correctness of data.
- Data protection safeguards against unauthorized alterations.
- Cybercriminal activities could involve altering data to disrupt target operations.
- Integrity considerations include preventing modifications by outsiders, preventing unintended changes by authorized users, and maintaining data consistency.
- Risks and defenses include unauthorized modifications (following the principle of least privilege), impersonation (improving user training and education), man-in-the-middle attacks (implementing encryption, like TLS), and replay attacks (using similar techniques as for MITM).
Availability
- Availability focuses on timely and continuous access rights for authorized users.
- Business operations depend on system and data availability.
- Security measures must guarantee continuous access.
- Risks and defenses include Denial of Service (DoS) attacks (deploying firewalls, and partnering with ISPs), power outages (using redundant power sources and backup generators), hardware failures (implementing system redundancy), destruction of equipment (implementing backup data centers or remote locations), and service outages (designing resilient systems against errors and hardware failures).
DAD Triad
- When the goals of the CIA triad are not met, there is disclosure, alteration, or destruction.
- Disclosure is unauthorized access to information, often called a data breach.
- Alteration is changing data or information from its original form (encrypting/deleting).
- Destruction/Denial is causing a system to be unreachable by any user.
Non-Repudiation
- Non-repudiation is a security goal preventing someone from denying an action/truth.
- E-commerce transactions involve signatures and additional information for security to protect from denial of claims.
- Physical signatures and digital signatures are used to provide non-repudiation, along with biometric security (fingerprint, facial recognition) and video surveillance (CCTV).
Authentication and Authorization
- Authentication verifies user identity.
- Authorization determines user access rights/permissions.
- Accounting (or Accountability) tracks user activities.
- AAA (Authentication, Authorization, Accounting) often referred to.
- Access Control Systems (digital and password policies), Authentication Factors (knowledge, possession, and inheritance), and Multi-Factor Authentication are critical components of authentication and authorization.
Digital Access Control
- User identity primarily established through usernames.
- Password securely tied to usernames for authentication.
- Access Control Lists (ACLs) grant specific file system permissions based on user identity.
- Accounting involves user activity and web browsing to maintain a record of actions within the set boundaries.
Password Policies
- Password security requirements are created from different technical controls.
- Mechanisms include password length, complexity (upper/lowercase, numbers, and special characters), expiration, history (to prevent reuse), resets (quickly and privately), and reuse (limiting the reuse to enhance security across multiple networks).
Authentication Factors
- Three main types: Something you know (e.g. passwords, PINs), Something you have (e.g. tokens, smart cards), Something you are (e.g. biometrics like fingerprints).
- False Rejection Rate (FRR), and False Acceptance Rate (FAR) are crucial in biometric authentication to avoid misidentification.
- Crossover Error Rate (CER) is a good measure to optimize balance.
Privacy
- Privacy is a human right.
- Organizations are responsible for educating users and supporting privacy officials.
- Types of private information include PII (Personally Identifiable Information), PHI (Protected Health Information), and PCI (Payment Card Industry) information.
- Key areas of privacy concern include: Types of private information, Expectation of privacy, General Data Protection Regulation (GDPR), and Privacy Management Frameworks.
Security Governance Process
- Security governance defines strategies to oversee the organization.
- Security governance elements include plans, policies, standards, and procedures.
- Laws and regulations form the basis for the organization's security governance policies and practices.
- Examples discussed include GDPR and others.
Domain 2: Business Continuity Management
- BCM is the second domain of the ISC2 CC exam.
- Students learn the purpose, importance, and aspects of business continuity, disaster recovery, and incident response.
Business Continuity Planning
- BCP (business continuity planning) is a core responsibility of information security professionals.
- It involves activities to keep operations running during a crisis.
- BCP can be triggered by various hazards, including technological failure, human error, attacks (terrorism, hacking), and natural disasters like earthquakes and typhoons.
- This function supports the availability security objective.
Scope Definitions
- A concise scope is essential for managing BCM initiatives.
- It's critical upfront to clearly define which business processes will be covered by the plan, what types of systems need to be covered, and what risk controls should be considered.
Business Impact Analysis
- BIA assesses the potential impacts of risks to define mission-critical functions and supporting systems.
- Results help determine which controls to use and how much is appropriate based on tolerance.
Business Continuity Controls
- Security experts use tools and strategies for availability issues.
- Redundancy (and fault tolerance) is critical, ensuring a system can function despite failures in individual parts.
- Single Point of Failure (SPOF) analysis helps identify and remove SPOFs to enable system/process functionality despite a single part's failure.
- Another important control for BC is Personnel Succession Planning.
High Availability
- HA uses multiple systems to protect against failures.
- It’s crucial to have system redundancy to sustain operation. This could involve different locations or geographically redundant backups.
- Load balancing is a similar but different concept and involves distributing load among systems.
Fault Tolerance
- Fault Tolerance helps to avoid system failures from the start.
- Components such as power supply, storage media, and networking components are common failure points.
- FT controls help maintain operation even with simultaneous component failures.
Disaster Recovery Planning
- Disaster recovery (DR) is a subset of business continuity aiming for rapid return to normal/operational capacity and procedures.
- DR plans contain quick measures for temporary restoration of operations, and comprehensive actions to return to normal operation.
- Disruptions can be caused by natural disasters, technological failures, health emergencies and actions from other people or malicious actors.
Disaster Recovery Metrics
- Key metrics include Recovery Point Objective (RPO), Recovery Time Objective (RTO), Work Recovery Time (WRT), and Maximum Tolerable Downtime (MTD).
- RPO measures acceptable data loss; RTO measures acceptable downtime and WRT and MTD (defined by leadership) assess the maximal tolerable downtime.
- Recovery Service Levels (RSLs) provide an estimated percentage of availability during a disaster.
DR Testing
- Different types of DR testing ensure the effectiveness and preparedness to respond to disruptions.
- These include (but are not limited to) read-through, walk-through, simulation (theoretical exercises), parallel tests, and full interruption tests.
Incident Response Program
- Incident response (IR), involves all the activities leading up to establishing an incident response plan, creating/staffing an incident management team, creating an incident communications plan, and incident identification and response.
Incident Response Team
- The incident response team should include essential personnel and may involve experts outside the organization to address specific areas of needed expertise.
- Individuals are trained and assigned roles to engage in handling an incident.
- Procedures are put in place for incident notification and escalation, along with contact processes and designated protocols for communication.
Incident Communications Plan
- An effective incident communications plan is vital for all organizations and covers internal and external communications.
- Internal teams require efficient notification, while external communications often involve sensitive data and may need to be restricted to prevent unnecessary exposure.
Incident Identification
- Procedures help identify incidents, which could be via monitoring, employee reports, customer reports or reports from other organizations.
- Security data sources (IDS/IPS systems, Firewalls, and authentication systems) provide evidence of actions.
- SIEM (security information and event management system) technology facilitates these assessments, and systems can generate alerts for possible events.
Incident Response
- Incident response begins when a security professional recognizes an incident.
- The team immediately isolates the compromised system and/or systems involved.
- A wide range of activities are conducted to stop the incident and return to normal operation to minimize the damage or impacts of such an incident.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.