Podcast
Questions and Answers
What is the primary defense against eavesdropping in electronic communication?
What is the primary defense against eavesdropping in electronic communication?
Which of the following best describes the goal of integrity protection?
Which of the following best describes the goal of integrity protection?
What is the best defense against impersonation attacks?
What is the best defense against impersonation attacks?
What attack involves capturing a legitimate user's session information to gain unauthorized access later?
What attack involves capturing a legitimate user's session information to gain unauthorized access later?
Signup and view all the answers
Which principle is crucial for preventing unauthorized modifications by outsiders?
Which principle is crucial for preventing unauthorized modifications by outsiders?
Signup and view all the answers
What must be satisfied in addition to proving identity to gain access to a system?
What must be satisfied in addition to proving identity to gain access to a system?
Signup and view all the answers
What does accounting in an access control system enable administrators to do?
What does accounting in an access control system enable administrators to do?
Signup and view all the answers
Which of the following correctly outlines the electronic access control process?
Which of the following correctly outlines the electronic access control process?
Signup and view all the answers
What form does authentication often take in the context of electronic access control?
What form does authentication often take in the context of electronic access control?
Signup and view all the answers
Which of the following is included in the mechanisms for setting a password policy?
Which of the following is included in the mechanisms for setting a password policy?
Signup and view all the answers
What is one potential concern when tracking user activity within an organization?
What is one potential concern when tracking user activity within an organization?
Signup and view all the answers
In the identification stage of access control, what information does a user typically provide?
In the identification stage of access control, what information does a user typically provide?
Signup and view all the answers
What is a key characteristic of digital access control systems compared to physical ones?
What is a key characteristic of digital access control systems compared to physical ones?
Signup and view all the answers
Which of the following best describes the role of availability in an organization?
Which of the following best describes the role of availability in an organization?
Signup and view all the answers
What is a common defense against Denial of Service (DoS) attacks?
What is a common defense against Denial of Service (DoS) attacks?
Signup and view all the answers
Which of the following contributes to service outages?
Which of the following contributes to service outages?
Signup and view all the answers
What defense can be used against power outages?
What defense can be used against power outages?
Signup and view all the answers
What is a consequence of hardware failures?
What is a consequence of hardware failures?
Signup and view all the answers
What is the best defense against destruction of equipment due to large-scale disasters?
What is the best defense against destruction of equipment due to large-scale disasters?
Signup and view all the answers
Under what circumstance might an organization experience denial?
Under what circumstance might an organization experience denial?
Signup and view all the answers
What does the term non-repudiation refer to in security?
What does the term non-repudiation refer to in security?
Signup and view all the answers
Which of the following best describes the alteration risk in the DAD triad?
Which of the following best describes the alteration risk in the DAD triad?
Signup and view all the answers
What is recommended to increase resilience against system failures?
What is recommended to increase resilience against system failures?
Signup and view all the answers
What is the primary function of signatures in transactions?
What is the primary function of signatures in transactions?
Signup and view all the answers
What does the term 'non-repudiation' refer to in e-commerce transactions?
What does the term 'non-repudiation' refer to in e-commerce transactions?
Signup and view all the answers
Which of the following is considered a biometric security control?
Which of the following is considered a biometric security control?
Signup and view all the answers
In the context of access control, what does 'AAA' stand for?
In the context of access control, what does 'AAA' stand for?
Signup and view all the answers
During which step of the access control process is a claim about identity made?
During which step of the access control process is a claim about identity made?
Signup and view all the answers
What is the role of authentication in an access control system?
What is the role of authentication in an access control system?
Signup and view all the answers
What does the 'accounting' step in the AAA process refer to?
What does the 'accounting' step in the AAA process refer to?
Signup and view all the answers
Why is strong evidence important in authentication?
Why is strong evidence important in authentication?
Signup and view all the answers
Which of these options is a characteristic of multi-factor authentication?
Which of these options is a characteristic of multi-factor authentication?
Signup and view all the answers
What is a digital signature's primary purpose?
What is a digital signature's primary purpose?
Signup and view all the answers
Which of the following describes the primary aim of Disaster Recovery (DR)?
Which of the following describes the primary aim of Disaster Recovery (DR)?
Signup and view all the answers
What is NOT a potential trigger for a Disaster Recovery Plan (DRP)?
What is NOT a potential trigger for a Disaster Recovery Plan (DRP)?
Signup and view all the answers
During the initial response to a disaster, what is the main focus?
During the initial response to a disaster, what is the main focus?
Signup and view all the answers
Which metric indicates the maximum acceptable amount of data loss in time during a DR event?
Which metric indicates the maximum acceptable amount of data loss in time during a DR event?
Signup and view all the answers
Why is flexibility key during a disaster response?
Why is flexibility key during a disaster response?
Signup and view all the answers
In the assessment phase after a disaster, what is primarily evaluated?
In the assessment phase after a disaster, what is primarily evaluated?
Signup and view all the answers
What aspect of communication is vital for responders during disaster recovery?
What aspect of communication is vital for responders during disaster recovery?
Signup and view all the answers
Which of the following tasks occurs first after initiating a Disaster Recovery Plan?
Which of the following tasks occurs first after initiating a Disaster Recovery Plan?
Signup and view all the answers
What role do temporary jobs play during a Disaster Recovery process?
What role do temporary jobs play during a Disaster Recovery process?
Signup and view all the answers
Which of the following is an essential component of a Disaster Recovery Plan?
Which of the following is an essential component of a Disaster Recovery Plan?
Signup and view all the answers
Study Notes
Domain 1: Security Principles
- Security Principles provides foundational knowledge for cybersecurity careers.
- Five objectives: information assurance concepts, risk management, security controls, ISC2 Code of Ethics, and governance.
- The average weight of this domain is 26%.
- Key concepts covered include Confidentiality, Integrity, and Availability (CIA Triad).
- Also covers Non-Repudiation, Authentication and Authorization.
- Information security involves protecting information systems from unauthorized access, use, disclosure, modification, or destruction to maintain Confidentiality, Integrity, and Availability.
Security Trio Explained
- Information security encompasses all forms of data protection.
- IT Security is focused on the technical aspects like hardware and software.
- Cybersecurity is the overall protection for systems, networks, and programs against all types of digital attacks.
Confidentiality
- Confidentiality is the secrecy of protected information.
- Cybercriminals often target confidentiality as it is the most common form of protection they want to compromise.
- Data breaches often stem from unauthorized access without proper authorization.
- Risks and defenses include snooping (enforcing clean desk policy), dumpster diving (using a paper shredder), eavesdropping (using encryption and rules regarding sensitive conversations), and social engineering (user training/education).
Integrity
- Integrity is the reliability and correctness of data.
- Data protection safeguards against unauthorized alterations.
- Cybercriminal activities could involve altering data to disrupt target operations.
- Integrity considerations include preventing modifications by outsiders, preventing unintended changes by authorized users, and maintaining data consistency.
- Risks and defenses include unauthorized modifications (following the principle of least privilege), impersonation (improving user training and education), man-in-the-middle attacks (implementing encryption, like TLS), and replay attacks (using similar techniques as for MITM).
Availability
- Availability focuses on timely and continuous access rights for authorized users.
- Business operations depend on system and data availability.
- Security measures must guarantee continuous access.
- Risks and defenses include Denial of Service (DoS) attacks (deploying firewalls, and partnering with ISPs), power outages (using redundant power sources and backup generators), hardware failures (implementing system redundancy), destruction of equipment (implementing backup data centers or remote locations), and service outages (designing resilient systems against errors and hardware failures).
DAD Triad
- When the goals of the CIA triad are not met, there is disclosure, alteration, or destruction.
- Disclosure is unauthorized access to information, often called a data breach.
- Alteration is changing data or information from its original form (encrypting/deleting).
- Destruction/Denial is causing a system to be unreachable by any user.
Non-Repudiation
- Non-repudiation is a security goal preventing someone from denying an action/truth.
- E-commerce transactions involve signatures and additional information for security to protect from denial of claims.
- Physical signatures and digital signatures are used to provide non-repudiation, along with biometric security (fingerprint, facial recognition) and video surveillance (CCTV).
Authentication and Authorization
- Authentication verifies user identity.
- Authorization determines user access rights/permissions.
- Accounting (or Accountability) tracks user activities.
- AAA (Authentication, Authorization, Accounting) often referred to.
- Access Control Systems (digital and password policies), Authentication Factors (knowledge, possession, and inheritance), and Multi-Factor Authentication are critical components of authentication and authorization.
Digital Access Control
- User identity primarily established through usernames.
- Password securely tied to usernames for authentication.
- Access Control Lists (ACLs) grant specific file system permissions based on user identity.
- Accounting involves user activity and web browsing to maintain a record of actions within the set boundaries.
Password Policies
- Password security requirements are created from different technical controls.
- Mechanisms include password length, complexity (upper/lowercase, numbers, and special characters), expiration, history (to prevent reuse), resets (quickly and privately), and reuse (limiting the reuse to enhance security across multiple networks).
Authentication Factors
- Three main types: Something you know (e.g. passwords, PINs), Something you have (e.g. tokens, smart cards), Something you are (e.g. biometrics like fingerprints).
- False Rejection Rate (FRR), and False Acceptance Rate (FAR) are crucial in biometric authentication to avoid misidentification.
- Crossover Error Rate (CER) is a good measure to optimize balance.
Privacy
- Privacy is a human right.
- Organizations are responsible for educating users and supporting privacy officials.
- Types of private information include PII (Personally Identifiable Information), PHI (Protected Health Information), and PCI (Payment Card Industry) information.
- Key areas of privacy concern include: Types of private information, Expectation of privacy, General Data Protection Regulation (GDPR), and Privacy Management Frameworks.
Security Governance Process
- Security governance defines strategies to oversee the organization.
- Security governance elements include plans, policies, standards, and procedures.
- Laws and regulations form the basis for the organization's security governance policies and practices.
- Examples discussed include GDPR and others.
Domain 2: Business Continuity Management
- BCM is the second domain of the ISC2 CC exam.
- Students learn the purpose, importance, and aspects of business continuity, disaster recovery, and incident response.
Business Continuity Planning
- BCP (business continuity planning) is a core responsibility of information security professionals.
- It involves activities to keep operations running during a crisis.
- BCP can be triggered by various hazards, including technological failure, human error, attacks (terrorism, hacking), and natural disasters like earthquakes and typhoons.
- This function supports the availability security objective.
Scope Definitions
- A concise scope is essential for managing BCM initiatives.
- It's critical upfront to clearly define which business processes will be covered by the plan, what types of systems need to be covered, and what risk controls should be considered.
Business Impact Analysis
- BIA assesses the potential impacts of risks to define mission-critical functions and supporting systems.
- Results help determine which controls to use and how much is appropriate based on tolerance.
Business Continuity Controls
- Security experts use tools and strategies for availability issues.
- Redundancy (and fault tolerance) is critical, ensuring a system can function despite failures in individual parts.
- Single Point of Failure (SPOF) analysis helps identify and remove SPOFs to enable system/process functionality despite a single part's failure.
- Another important control for BC is Personnel Succession Planning.
High Availability
- HA uses multiple systems to protect against failures.
- It’s crucial to have system redundancy to sustain operation. This could involve different locations or geographically redundant backups.
- Load balancing is a similar but different concept and involves distributing load among systems.
Fault Tolerance
- Fault Tolerance helps to avoid system failures from the start.
- Components such as power supply, storage media, and networking components are common failure points.
- FT controls help maintain operation even with simultaneous component failures.
Disaster Recovery Planning
- Disaster recovery (DR) is a subset of business continuity aiming for rapid return to normal/operational capacity and procedures.
- DR plans contain quick measures for temporary restoration of operations, and comprehensive actions to return to normal operation.
- Disruptions can be caused by natural disasters, technological failures, health emergencies and actions from other people or malicious actors.
Disaster Recovery Metrics
- Key metrics include Recovery Point Objective (RPO), Recovery Time Objective (RTO), Work Recovery Time (WRT), and Maximum Tolerable Downtime (MTD).
- RPO measures acceptable data loss; RTO measures acceptable downtime and WRT and MTD (defined by leadership) assess the maximal tolerable downtime.
- Recovery Service Levels (RSLs) provide an estimated percentage of availability during a disaster.
DR Testing
- Different types of DR testing ensure the effectiveness and preparedness to respond to disruptions.
- These include (but are not limited to) read-through, walk-through, simulation (theoretical exercises), parallel tests, and full interruption tests.
Incident Response Program
- Incident response (IR), involves all the activities leading up to establishing an incident response plan, creating/staffing an incident management team, creating an incident communications plan, and incident identification and response.
Incident Response Team
- The incident response team should include essential personnel and may involve experts outside the organization to address specific areas of needed expertise.
- Individuals are trained and assigned roles to engage in handling an incident.
- Procedures are put in place for incident notification and escalation, along with contact processes and designated protocols for communication.
Incident Communications Plan
- An effective incident communications plan is vital for all organizations and covers internal and external communications.
- Internal teams require efficient notification, while external communications often involve sensitive data and may need to be restricted to prevent unnecessary exposure.
Incident Identification
- Procedures help identify incidents, which could be via monitoring, employee reports, customer reports or reports from other organizations.
- Security data sources (IDS/IPS systems, Firewalls, and authentication systems) provide evidence of actions.
- SIEM (security information and event management system) technology facilitates these assessments, and systems can generate alerts for possible events.
Incident Response
- Incident response begins when a security professional recognizes an incident.
- The team immediately isolates the compromised system and/or systems involved.
- A wide range of activities are conducted to stop the incident and return to normal operation to minimize the damage or impacts of such an incident.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on electronic access control mechanisms and security principles. This quiz covers topics such as eavesdropping defenses, integrity protection, impersonation attacks, and more. Challenge yourself to understand the critical components of access control systems.