click below
click below
Normal Size Small Size show me how
SSCP Exam
Question | Answer |
---|---|
DMZ stands for | demilitarized zone |
Internet | large publicly accessible network |
Intranet | small internal network, requires authentication |
Extranet | secure externally accessible network, allows remote access, authentication required. |
DMZ | semi secure environment network sitting in front of the intranet |
This is the gateway before you enter the DMZ | Firewalls |
a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. | Internet |
is a network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization’s members, employees, or others with authorization. | Intranet |
a computer network that allows controlled access from the outside for specific business or educational purposes. | extranet |
computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network. It prevents outside users from getting direct access to a server that has company data | DMZ |
A series of trust relationships that authentication requests must follow between domains | trust path |
Trust path is only available to | authenticated users |
The trust type and its assigned direction affect the trust path that is used for authentication. True or false? | True |
a unidirectional authentication path that is created between two domains | A one-way trust |
Domain A and Domain B, users in Domain A can access resources in Domain B. However, users in Domain B cannot access resources in Domain A. | one-way trust |
Transitive trust is | trust the is transferred to a third party based on the trust already established by two other parties |
Domain A trusts Domain B, and Domain B trusts Domain A. This means that authentication requests can be passed between the two domains in both directions. | two-way trust |
This determines whether a trust can be extended outside two domains between which the trust was formed | transitive trust |
You can use the non-transitive trust to | deny trust relationships with other domains |
a channel of communication within a computer system, or network that is not designed or intended to transfer information | Covert Channel |
communicate by modifying a stored object | Storage channels |
transmit information by affecting the relative timing of events | Timing channels |
the task of controlling information about users on computers | identity management |
determines whether a user is permitted to access a particular resource | authorization |
verifying identities before credentials are issued | proofing |
There are five areas that make up the identity management life cycle | ■■ Authorization ■■ Proofing ■■ Provisioning ■■ Maintenance ■■ Entitlement |
creation of the users account | provisioning |
Access control maintenance includes | user management, delegated administration, self-password reset |
These are items or things that can be people, devices, organizations, code, agents( things we ascribe access control to) | entities |
All procedures and tools to manage the life cycle of an identity includes: | ■■ Creation of the identifier for the identity ■■ Linkage to the authentication providers ■■ Setting and changing attributes and privileges ■■ Decommissioning of the identity |
There are five types of “entity” that require digital identity | ■■ People ■■ Devices ■■ Organizations ■■ Code ■■ Agents |
a set of rules, defined by the resource owner for managing access to a resource and for whatever purpose that access is granted | entitlement |
Mandatory access control(MAC) | applies the need to know element, the system that patriciates in applying a mandatory access policy set through central control |
means that a central authority, not by the individual owner of an object, makes access control policy decisions and the owner cannot change access rights. | Mandatory access control (MAC) policy |
establish controls that cannot be changed by users but only through administrative action. | Non-discretionary policies |
assigning access rights based on rules specified by the owner. | Discretionary Access Control (DAC) |
Systems typically store the information from this matrix either by columns or by rows. An implementation that stores by columns is commonly known as an | access control list (ACL) |
An implementation that stores by rows is commonly known as a | capability list |
True of False? DACs are not very scalable; they rely on the decisions made by each individual access control object owner, and it can be difficult to find the source of access control issues when problems occur. | True |
are discretionary controls giving data owners the discretion to determine the rules necessary to facilitate access. | Rule Set-Based Access Controls (RSBAC) |
users are granted membership into roles based on their competencies and responsibilities in the organization. The operations that a user is permitted to perform are based on the user’s role. | Role-Based Access Control (RBAC) |
are a natural way of organizing roles to reflect authority, responsibility, and competency. The role in which the user is gaining membership is not mutually exclusive with another role for which the user already possesses membership. | Role hierarchies |
) is a methodology that restricts the user’s actions to specific functions by not allowing the user to request functions that are outside of his/her respective level of privilege or role. | Constrained User Interface (CUI) |
Subject is | user |
Object is | system or data you are trying to access |
When menu and shell restrictions are used, the options users are given are the commands they can | execute |
are mechanisms used to restrict user access to data contained in databases. | Database views |
Physically constraining a user interface can be implemented by providing only certain keys on a keypad or certain touch buttons on a screen. | Physically constraining a user interface |
restricts or limits an access control subject’s ability to view or perhaps act on “components” of an access control object based on the access control subject’s assigned level of authority. | View-Based Access Control |
works by permitting or denying the access control subjects access to access control objects based on the explicit content within the access control object. | Content-Dependent Access Control (CDAC) |
is used in firewall applications to extend the firewall’s decision-making process beyond basic ACL decisions to decisions based on state as well as application-layer protocol session information. | Context-Based Access Control (CBAC) |
effectively applies a time limitation to “when” a given role can be activated for a given access control subject | Temporal Isolation (Time-Based) Access Control |
is an access control method where subject requests to perform operations on objects are granted or denied based on assigned attributes of the subject, assigned attributes of the object, environment conditions, and a set of policies | Attribute-Based Access Control (ABAC) |
are characteristics of the subject, object, or environment conditions and contain information given by a name-value pair. | Attributes |
is the execution of a function at the request of a subject upon an object. Operations include read, write, edit, delete, copy, execute, and modify. | An operation |
is the representation of rules or relationships that makes it possible determine if a requested access should be allowed, given the values of the attributes of the subject, object, and possibly environment conditions. | Policy |
Environment characteristics are independent of subject or object and may include the | current time, day of the week, location of a user, or the current threat level. |
conditions represent the operational or situational context in which access requests occur and conditions are detectable environmental characteristics | Environment conditions |
are limited only by the computational language and the richness of the available attributes. | Attribute-Based Access Control (ABAC) |
This establishes guidelines that require that no single person should perform a task from beginning to end and that the task should be accomplished by two or more people to mitigate the potential for fraud in one person performing the task alone. | Separation of Duties |
was designed as an architectural reference for controlling access to sensitive data in government and military applications. The components of the model are subjects, objects, and an access control matrix. | Bell–LaPadula Confidentiality Model |
True or false? | The basic tenet of Bell–LaPadula is that a given subject can read objects at the same or lower sensitivity level, but not those at a higher sensitivity level; this is called the simple security property and can be remembered as “no read up.” |
it focuses on ensuring that the integrity of information is being maintained by preventing corruption. At the core of the model is a multilevel approach to integrity designed to prevent unauthorized subjects from modifying objects. | Biba Integrity Model |
Biba integrity model can | write up but not down |
model addresses this risk using the idea of a well-formed transaction operating on the data. a triple: ■■ Authenticated principals (users) ■■ Programs acting on data (transaction processes) ■■ The data items themselves | Clark–Wilson Integrity Model |
focuses on preventing subjects from access to objects with sensitive information associated with two competing parties. The principle is that users should not access the confidential information of both a client organization and its competitors. | Brewer–Nash (The Chinese Wall) Model |
it is primarily concerned with how a model system controls subjects and objects at a very basic level, where other models simply assumed such control. | Graham–Denning Model |
concerned with situations in which a subject should be restricted from gaining particular privileges. | Harrison–Ruzzo–Ullman Mode |
View Based Access Controls are an example of: | Constrained User Interface |
Which of the following is an example of a network device that uses Context-Based Access Control? | Stateful inspection firewall |
Which of the following are behavioral traits in a biometric device? | Voice pattern and Keystroke dynamics |
What is the difference between a synchronous and asynchronous password token? | Synchronous tokens are generated with the use of a timer while asynchronous tokens do not use a clock for generation |
What is an authorization table? | A matrix of access control objects, access control subjects and their respective rights |
Access control subject is passive entity that typically receives or contains some of data. | True |
Disconnected tokens are not linked to the network or computer. Connected tokens automatically transmit information to the network as soon as connected. | True |
A popular network authentication protocol for indirect (third-party) authentication services. | Kerberos |
An authentication mechanism that allows a single identity to be shared across multiple applications. | Single sign on |
If a record contains information about an HIV test, the health-care worker may be denied access to the existence of the HIV test and the results of the HIV test. Only specific hospital staff would have the necessary access control rights to view | Content-Dependent Access Control |
In the measurement of biometric accuracy, which of the following is commonly referred to as a “Type 2 error”? | Rate of false acceptance—False Acceptance Rate (FAR) |
There are four mandatory tenets of the Code of Ethics: | ■■ Protect society, the commonwealth, and the infrastructure ■■ Act honorably, honestly, justly, responsibly, and legally ■■ Provide diligent and competent service to principals ■■ Advance and protect the profession |
refers to the property of information in which it is only made available to those who have a legitimate need to know. | Confidentiality |
may include legal and regulatory fines and sanctions, loss of customer and investor confidence, loss of competitive advantage, and civil litigation | consequences of a breach in confidentiality |
An important measure to ensure confidentiality of information is _______This helps to determine who should have access to the information (public, internal use only, or confidential). | data classification |
is the property of information whereby it is recorded, used, and maintained in a way that ensures its completeness, accuracy, internal consistency, and usefulness for a stated purpose. | Integrity |
refers to the maintenance of a known good configuration and expected operational function | Systems integrity |
include an inability to read or access critical files, errors, and failures in information processing, calculation errors, and uninformed decision making by business leaders. | Consequences of integrity failure |
may also result in inaccuracies in reporting, resulting in the levying of fines and sanctions, and in inadmissibility of evidence when making certain legal claims or prosecuting crime. | Integrity failures |
refers to the ability to access and use information systems when and as needed to support an organization’s operations. | Availability |
include interruption in services and revenue streams, fines and sanctions for failure to provide timely information to regulatory bodies or those to whom an organization is obliged under contract, and errors in transaction processing and decision making. | Consequences of availability failures |
A service that is used to provide assurance of the integrity and origin of data in such a way that the integrity and origin can be verified by a third party as having originated from a specific entity in possession of the private key. | nonrepudiation |
is a service that ensures that the sender cannot deny a message was sent and the integrity of the message is intact | Non-repudiation |
“the rights and obligations of individuals and organizations with respect to the collection, use, retention, and disclosure of personal information.” | Privacy |
The Organization for Economic Cooperation and Development (OECD) has broadly classified these principles into | collection limitation, data quality, purpose specification, use limitation, security safeguards, openness, individual participation, and accountability. |
Data should collection ability should be limited to only what is needed to fulfill the needs of the organization.(only collect minimum needed ) | collection limitation |
Data should be high quality, valid and correct | data quality |
It needs to be clearly specified how data is being used another words the purpose of use | purpose specification |
Only use the data for intended usage and not other things | use limitation |
Keeps CIA of the data intact when embedded in the system. | security safeguards |
Data should be available and made available to all authorized parties in order for them to use it. | Openness |
Having the right to opt in and decide whether you want to participate and be held accountable for data | Individual participation |
Being held accountable for the data | accountability |
access rights are permissions granted based on the need of a user or process to access and use information and resources. Only those rights and privileges needed to perform a specific function are granted | least privilege |
Unfortunately, many COTS (commercial, off-the-shelf) applications are developed in environments that have not | adopted least privilege principles and, as a result, these products often require elevated privilege to run |
is similar to a separation of duties in that it requires two or more people operating at the same time to perform a single function. | Dual control |
By placing safeguards at two or more points along the access path to the asset, failure of one safeguard can be counteracted by the function of another safeguard further along the access path. This concept is | defense-in-depth |
are designed to inform security practitioners when a preventive control fails or is bypassed. | Detective controls |
seek to minimize extent or impact of damage from an attack and return compromised systems and data to a known good state. | Corrective controls |
THREAT + VULNERABILITY + IMPACT = | RISK |
states that the total costs to implement and maintain a security measure should be commensurate with the degree to which risks to the confidentiality, integrity, and availability of the assets protected by the security measure | The concept of risk-based controls |
may be qualitative or quantitative in nature; whenever possible, use quantitative data to document incident probability and impact. | A risk assessment |
should be kept to support access control system validation testing, in which actual access is compared with authorized access to determine whether the process of assigning access entitlements is working as intended and is aligned with the stated policy. | A record of authorizations |
is a principle that ties authorized users to their actions | Accountability |
is enforced through assigning individual access accounts and by generating audit trails and activity logs that link identifying information about the actor (person, system, or application) with specific events. | Accountability |
Directive control | specify rules of behavior |
Deterrent control | discourage violations |
Compensating control | substitute for a primary control or loss |
Recovery control | restore normal operations |
are safeguards and countermeasures that are implemented to mitigate, lessen, or avoid a risk. | Controls |
Controls based on the management of risk and the management of information systems security. These are generally policies and procedures | Management |
Controls that are primarily implemented and executed through mechanisms contained in the hardware, software, and firmware of the components of the system. | Technical |
Controls that are primarily implemented and executed by people (as opposed to systems | Operational |
are introduced when the existing capabilities of a system do not support the requirements of a policy. | Compensating controls |
True or false? Compensating controls designated as temporary should be removed after they have served their purpose and another, more permanent control should be established | True |
consists of a linear sequence of six steps. Steps are taken in order, and as each step in the process is completed, the development team moves on to the next step. | The waterfall model |
Steps in the waterfall model are: | Requirement Gathering and Analysis, System Design, Implementation, Integration and Testing, Deployment of System, Maintenance |
All possible requirements of the system to be developed are captured in this phase and documented in a requirement specification document. | Requirement Gathering and Analysis |
The requirement specifications from first phase are studied in this phase and system design is prepared. System Design helps in specifying hardware and system requirements and also helps in defining overall system architecture | System Design |
With inputs from system design, the system is first developed in small programs called units, which are integrated in the next phase. Each unit is developed and tested for its functionality, which is referred to as Unit Testing. | Implementation |
All the units developed in the implementation phase are integrated into a system after testing of each unit. Post integration, the entire system is tested for any faults and failures. | Integration and Testing |
Once the functional and non-functional testing is done, the product is deployed in the customer environment or released into the market. | Deployment of System |
There are some issues that come up in the client environment. To fix those issues, patches are released. Also, to enhance the product, some better versions are released. Maintenance is done to deliver these changes in the customer environment. | Maintenance |
Major benefits of using the waterfall method | are its ease of use and management (even with large teams), and the broad scope and detailed specificity of systems documentation that is available to certification, accreditation, and application maintenance and enhancement teams. |
A major drawback of the waterfall model is that | it assumes a static set of requirements captured before design and coding phases begin. Thus, errors may not be noticed until later testing phases, where they are more costly to address. |
Security requirements may be incorporated within the | nonfunctional requirements specification |
Functional security requirements | such as how an application responds to incorrect passwords, malformed input, or unauthorized access attempts, can be documented in the form of “abuse” or “misuse” case diagrams. |
Functional requirements specify | user interactions and system processing steps and are often documented in the form of sequences of action called use cases, documented using Unified Modeling Language (UML) |
Nonfunctional requirements, such as those for performance | and quality or those imposed by design or environmental constraints, are documented using narratives and diagrams |
The spiral model | is based on the waterfall development life cycle, but adds a repeated Plan–Do–Check–Act (PDCA) sequence at each stage of the waterfall progression. |
was designed to fully leverage modern development environments that make it possible to quickly build user interface components as requirements are gathered | Rapid Application Development (RAD |
ethods rely on feedback from application users and development teams as their primary control mechanism. Software development is seen as a continuous evolution, where results from continuous release testing are evaluated | Agile development |
idea of component-based development is based on the reuse of proven design solutions to address new problems. | Component Development and Reuse |
provides a freely available listing of the top vulnerabilities found in web applications; in reality, the list contains a mix of vulnerabilities and exploits that frequently occur as a result of compromised web browsers and, in some cases, web servers. | Open Web Application Security Project (OWASP |
Perform authorization checks to requested objects such as files, URLs, and database entries. Secure objects from unauthorized access. | Authorization |
Most web application platforms include session management functions that link individual requests to an authenticated user account so that the user does not need to manually re-authenticate to each web page. | Session management |
Encryption of sensitive data | Encryption of data at rest may not be feasible for your organization, with the exception of authentication credentials, which should always be encrypted. |
User input should be validated using an “accepted known good” approach wherever possible (matching input to a set or range of acceptable values). String length or field size limits, data types, syntax, and business rules should be enforced input fields. | Input validation |
Dynamic queries and direct database access should not be allowed within web applications. Stored procedures (routines precompiled in the database or callable as program code) should be used wherever possible. | Disallow dynamic queries |
Consider sending confirmations out of band when there has been a password change or significant business transaction performed via the website. | Out-of-band confirmations |
Avoid exposing references to private application objects in URL strings, cookies, or user messages. | Avoid exposing system information |
Avoid exposing information about the system or process, such as path information, stack trace and debugging information, and standard platform error messages in response to errors and consider setting a low debug level for general use. | Error handling |
ITAM entails collecting inventory and financial and contractual data to manage the IT asset throughout its life cycle. | True |
addresses whether someone is assigned to manage the machine and whether the machine is authorized; it does not address how well the machine is managed | The Hardware Asset Management capability |
Quality of management is covered by | Software Asset Management (SWAM), Configuration Setting Management (CSM), and Vulnerability Management (VUL) |
that is addressable (i.e., has an IP address) and is connected to your organization’s network(s). These devices and their peripherals are remotely attackable. | Any hardware asset |
The list of desired state hardware assets should: | ■■ Be created through a repeatable process ■■ Include only authorized devices ■■ Assign each authorized device for technical management of settings, software, patching, etc. |
Because it is important to find unauthorized devices quickly, the list of authorized devices should be stored in a data format that is easy to compare to actual inventory via automation, so unauthorized devices can be easily identified. | True |
Hardware Asset Management | (HAM) |
Software Asset Management | (SAM) |
Align the organization’s Hardware Asset Management strategy with operational goals | True |
Identify best practices to maximize hardware asset ROI while offering adequate risk protection | True |
Construct the supporting documents you need to make the case | True |
Full disk encryption protects the entire contents of a laptop’s hard drive, including the boot sector, operating system, swap files, and user data. | True |
Devices containing a TPM (Trusted Platform Module) chip | chip contain a unique, secret RSA key burned into the chip during manufacture to securely generate derivative keys. Using hardware encryption in conjunction with software-based encryption products is a more secure approach to protecting data. |
it is detrimental to encrypt an entire database when only one data element is confidential. | True |
Encryption may increase the size of data elements in your database by padding smaller chunks of data to produce fixed block sizes. If the database is not sized to accommodate these changes, it may need to be altered. | Database size |
Performance degradation, particularly when encrypting indexed or frequently accessed fields, may be noticeable. If application performance is a concern, databases may need to be reorganized and reindexed to accommodate the additional decrypting fields. | Performance |
While some newer, integrated encryption solutions provide transparent decryption services to applications, most communicate through APIs, which must be compiled into business applications that access encrypted data. | Application compatibility |
o sanitize the data, that is, to mask, scramble, or overwrite sensitive data values with meaningless data, which nonetheless conform to data format and size restrictions. Data sanitization is also known as | scrubbing or de-identification. |
is a process that scans the entire collection of information looking for similar chunks of data that can be consolidated. | Deduplication |
Key management refers to the set of systems and procedures used to securely generate, store, distribute, use, archive, revoke, and delete keys. | True |
Encryption keys are assigned a cryptoperiod, or time span in which they are authorized for use. | Expiration |
The key distribution center or facility should be capable of authenticating and checking authorization for key requests. | Distribution |
The key management system should support timely revocation of expired and compromised keys, and secure destruction of key material that is no longer valid. | Revocation and destruction |
All key management operations should be fully audited, and event logs or audit records should be protected from unauthorized access and modification. | Audit and tracking |
The key management policy should specify the requirements for emergency replacement and revocation of encryption keys. Availability should be protected by storing backup or archive copies of keys in a separate location. | Emergency managemen |
functions to assign specific properties to an object such as how long the object may exist, what users or systems may access it, and if any notifications need to occur when the file is opened, modified, or printed. | Information Rights Management (IRM) |
Many print processing functions send output to printers in the form of print spooler files, which contain human-readable copies of data to be printed. Securing spooled files is necessary to preserving confidentiality. | True |
(list of records, owners, retention periods, and destruction methods) is an important component of an organization’s information handling procedures. | A record retention policy and schedule |
are responsible for designating retention periods and assigning custodial duties, typically in IT, to ensure that record integrity is preserved for the specified retention period. | Information owners |
Handling procedures for confidential information must include provisions for secure destruction of records containing sensitive information. | True |
include burning, shredding, disk cleaning or reformatting, and tape degaussing. | Secure destruction methods |
Strip-cut shredders | Cut paper in long, thin strips |
Preferable to strip-cut, these cut paper into small rectangular fragments | Cross-cut shredders |
Similar to cross-cut; creates tiny square or circular fragments | Particle-cut shredders |
Pound paper through a screen | Hammermills |
Repeatedly cut paper into fine, mesh-size particles | Granulators (or disintegrators) |
Government and certain private applications may require use of shredders certified and labeled at a specific maximum security level for paper documents containing classified information. | Secerety level 1-6 smaller the level the least secure and least small of cuts |
to any operation that removes or obscures stored data such that it cannot be reconstructed using operating system or third-party utilities. | Clearing |
removes data in such a way that it cannot be reconstructed at all. | Sanitizing or purging |
or overwriting, is a method of writing over existing data — typically with a stream of zeroes, ones, or a random pattern of both | Disk wiping |
is a technique of erasing data on disk or tape (including video tapes) that, when performed properly, ensures that there is insufficient magnetic remanence to reconstruct data. | Degaussing |
DLP | Data Leakage Prevention |
distributed files and databases to locate sensitive data is the first step in implementing data leakage prevention tools. | The process of “crawling |
Data may be labeled or “tagged” with an identifier that can be used to subsequently monitor movement of that data across the network. This is particularly useful in identifying documents and files containing sensitive information. | Labeling |
Content monitoring and usage policies specify which data are sensitive and define rules for copying or transmitting that data, typically using a combination of predefined labels, keywords, and regular expressions | Policy Creation |
Data communications over local and wide area networks, data ata traversing perimeter gateway devices, and data leaving host computers via USB or serial connections are monitored by inspecting the contents of the communication | Content Detection/Monitoring |
When policy violations are detected, user actions may be prevented or network traffic may be dropped, depending on the location of the violation. | Prevention or Blocking |
Violations of data disclosure policies are reported, typically showing the policy that was violated, the source IP address, and the login account under which the violation occurred. | Reporting |
Waterfall model is development method that follows a linear sequence of steps Waterfall model is development method that follows a linear sequence of steps Waterfall model is development method that follows a linear sequence of steps The met | True |
A technique of erasing data on disk or tape A technique of erasing data on disk or tape | Degaussing |
Assigns specific properties to an object such as how long the object may exist, what users or systems may access it, and if any notifications need to occur when the file is opened, modified, or printed. | Information Rights Management (IRM) |
Waterfall Model is easy to use and manage. | True |
Entails collecting inventory and financial and contractual data to manage the IT asset throughout its life cycle. | IT Asset Management (ITAM) |
Security requirements should be considered along with functional requirements? | True |
Burning paper records or disks is an appropriate way of data disposal | FALSE |
One of the most important security considerations for application security is data input ____ | validation |
The method of writing over existing data. | Data wiping |
Overwriting sensitive data value with meaningless data. | Data scrubbing |
are security controls that the computer system executes. The controls can provide automated protection from unauthorized access or misuse, facilitate detection of security violations, and support security requirements for applications and data. | Technical controls |
address process-based security controls implemented and executed by people. These controls rely on management controls to identify the appropriate processes or actions, and often rely on the technical controls for enforcement. | Operational Control policies |
These are accidental in nature and are by far the most frequent type of operational issues. Mistyping a value (such as the route target in MPLS VPNs) is one example, or forgetting statements in a firewall is another example | Accidental misconfigurations |
These are deliberate in nature but vary in their degree of maliciousness. For example, violation of the security policy to allow an operator’s home system access through the corporate firewall is not as likely to be as severe as acts of sabotage | Deliberate misconfigurations |
written documents that set the expectations for how security will be implemented and managed in an organization | Security policies are formal |
address security topics that can be characterized as managerial. They are techniques and concerns that are normally addressed by management in the organization’s computer security program. | Management Controls |
typically address a limited area of risk related to a particular class of assets, type of technology, or business function. | Subject-specific security policies |
■■ E-Mail and Internet Usage Policies ■■ Antivirus Policy ■■ Remote Access Policy ■■ Information Classification Policy ■■ Encryption Policies ■■ Policy Document Format | Examples of specific security policies include |
This statement provides the policy’s context. It gives background information and states the purpose for writing the policy, including the risk or threats the policy addresses and the benefits to be achieved by policy adherence. | Objective |
A succinct statement of management’s expectations for what must be done to meet policy objectives | Policy Statement |
This lists the positions to whom the policy applies, the situations in which it applies, and any specific conditions under which the policy is to be in effect | Applicability |
How compliance with the policy will be enforced using technical and administrative means. This includes consequences for noncompliance. | Enforcement |
States who is responsible for reviewing and approving, monitoring compliance, enforcing, and adhering to the policy. | Roles and Responsibilities |
Specifies a frequency of review or the next review date on which the policy will be assessed for currency and updated if needed | Review |
are living documents that communicate management expectations for behavior | Security policies |
A clear statement of policy objectives answers the question, “Why are we developing this policy?” The statement of objective will guide development of the specific points in the policy statement and will help keep team discussions in scope and focused. | State the objective |
The policy statement should be drafted in simple, clear language that will be easily understood by those who must comply with the policy. | Draft the policy specifics |
Policy enforcement mechanisms may include technical controls, such as access management systems, content blocking, and other preventive measures, as well as administrative controls, such as management oversight and supervision. | Identify methods for measurement and enforcement |
can be measured through audit trails, automated monitoring systems, random or routine audits, or management supervision. | Compliance with policy expectations |
The timing, frequency, and mechanism by which the policy will be communicated to employees and others should be established before final policy approval. | Communication |
olicies should be reviewed at least annually to ensure that they continue to reflect management’s expectations, current legal and regulatory obligations, and any changes to the organization’s operations. | Periodic review |
is a formal, documented requirement that sets uniform criteria for a specific technology, configuration, nomenclature, or method. | A standard |
are recommended practices to be followed to achieve a desired result. They are not mandatory and provide room for flexibility in how they are interpreted and implemented | Guidelines |
is a special type of standard that specifies the minimum set of security controls that must be applied to a particular system or practice area in order to achieve an acceptable level of assurance. | A baseline |
are step-by-step instructions for performing a specific task or set of tasks. Like standards, procedures are often implemented to enforce policies or meet quality goals. | Procedures |
The reason for performing the procedure, usually the desired outcome | Purpose |
Who is responsible for following the procedure, and in what circumstances the procedure is followed | Applicability |
The detailed steps taken to perform the procedure | Steps |
Illustrations, diagrams, or tables used to depict a workflow, values to enter in specific fields, or display screen shots to show formats and to enhance ease of use | Figures |
Yes–no questions whose answer results in branching to a different step in the procedure; these may be written as steps in the procedure or included in a workflow diagram or decision tree | Decision points |
Typical components of a procedure are | purpose, applicability, steps, figures, decision points |
Components of a security policy | objective, draft, methods of measurement and enforcement, compliance expectations, communications, periodic review |
The goal of release management is to provide assurance that only tested and approved application code is promoted to production or distributed for use. | True |
is a software engineering discipline that controls the release of applications, updates, and patches to the production environment | Release management |
is responsible for planning, coordination, implementation, and communication of all application releases. | The release manager |
Release management policy specifies | ■■ The conditions that must be met for an application or component to be released to production ■■ Roles and responsibilities for packaging, approving, moving, and testing code releases ■■ Approval and documentation requirements |
Release management tools | ■■ Role-based access control to enforce separation of duties ■■ Approval checking and rejection of unapproved packages ■■ Component verification tools to ensure that all required application ■■ Auditing and reporting tools |
is the process of validating that existing security controls are configured and functioning as expected, both during initial implementation and on an ongoing basis. | Systems assurance |
is a discipline that seeks to manage configuration changes so that they are appropriately approved and documented, so that the integrity of the security state is maintained, and so that disruptions to performance and availability are minimized. | Configuration management (CM) |
Typical steps in the configuration management process are: | Change request Approval Documentation Testing Implementation Reporting |
CM System Goals The system should identify and maintain: | Baseline hardware, software, and firmware configurations ■■ Design, installation, and operational documentation ■■ Changes to the system since the last baseline ■■ Software test plans and results |
The configuration management system implements the four operational aspects of CM: | Identification Control Accounting Auditing |
s a process of identifying and documenting hardware components, software, and the associated settings. | Configuration management |
All devices and systems connected to the network should be in the | hardware list. |
At a minimum, configuration documentation should include the following information about each device and system: | ■■ Make ■■ Model ■■ MAC addresses ■■ Serial number ■■ Operating system or firmware version ■■ Location ■■ BIOS and other hardware-related passwords ■■ Assigned IP address if applicable |
Software is a similar concern and a software inventory should minimally include: | Software name ■■ Software vendor (and reseller if appropriate) ■■ Keys or activation codes (note if there are hardware keys) ■■ Type of license and for what version ■■ Number of licenses ■■ License expiration |
System and application configuration should be standardized to the greatest extent possible to reduce the number of issues that may be encountered during integration testing. | True |
Software configurations and their changes should be documented and tracked with the assistance of the security practitioner. It is possible that server and workstation configuration guides will change frequently due to changes in the software baseline. | True |
Each component of the system configuration should be separately identified and maintained as a configuration item (CI) within | configuration management database (CMDB) |
Within the _______changes are tracked by comparing the differences between a CI before and after the change in a change set or delta | CMDB |
implemented to govern change requests, approvals, change propagation, impact analysis, bug tracking, and propagation of changes. | Control mechanisms |
captures, tracks, and reports on the status of CIs, change requests, configurations, and change history. | Accounting |
is a process of logging, reviewing, and validating the state of CIs in the CMDB | Auditing |
CMDB Auditing ensures that | changes are appropriately documented ■■ A clear history of changes is retained in such a way that they can be traced ■ Auditing also compares the information in the CMDB with the actual system configuration |
is the analysis conducted by qualified staff within an organization to determine the extent to which changes to the information system affect the security posture of the system. | Security impact assessment |
describes the extent to which systems and devices can exchange data and interpret that shared data | Interoperability |
is the ability to automatically interpret the information exchanged meaningfully and accurately in order to produce useful results as defined by the end users of both systems. | semantic interoperability |
If two or more systems are capable of communicating and exchanging data, they are exhibiting | syntactic interoperability |
The application of software and firmware patches to correct vulnerabilities is a critical component of vulnerability and configuration management practices | Patch Management |
The patch management process includes the following steps: | Acquisition, Testing, Approval, packaging, deployment, verification |
Automated patch management tools should be able to verify correct application of patches and report all successful and unsuccessful deployments back to a centralized console or reporting engine. | Verification |
Having an accurate inventory of machines and their current patch levels is critical to successful deployment of patches. | Deployment |
Patches must be packaged or configured for distribution and installation on target systems. Depending on how patches are deployed, packaging can take several forms | Packaging |
Not all patches will be immediately approved for deployment. | Approval |
Patches must be tested to ensure that they can be correctly distributed and installed, and that they do not interfere with normal system or application functioning | Testing |
Patches are most often supplied via download from the vendor’s website. | Acquisition |
Policies are often a collection of data. | False |
Baselines are: | Minimum levels of security |
There are usually three types of controls managerial , technical, and physical. | True |
Code signing ensures the integrity of source code | True |
Question 5 Release manager is responsible for planning, coordination, implementation, and communication of all application releases. | True |
Question 6 A software engineering discipline that controls the release of applications, updates, and patches to the production environment. | Release management |
Which of the following is the last step in any change control process? Configuration management should be based on a foundation of policies, standards, and procedures | True |
Configuration management and patch management should be part of any organization’s change control process? | True |
A repository that contains a collection of IT assets that are referred to as configuration items. | Configuration management database |
This device uses a magnetic field or mechanical contact to determine if an alarm signal is initiated. One magnet will be attached to the door and the other to the frame; when the door is opened, the field is broken. | Balanced Magnetic Switch (BMS) |
A fixed camera with a video motion feature can be used as an interior intrusion point sensor | Motion Activated Cameras |
This device uses passive listening devices to monitor building spaces. | Acoustic Sensors |
Many think of this device from spy movies, where the enduring image of secret agents and bank robbers donning their special goggles to avoid triggering an active infrared beam is recalled. | Infrared Linear Beam Sensors |
A PIR sensor is one of the most common interior volumetric intrusion detection sensors. Because there is no beam, it is called passive. A PIR picks up heat signatures (infrared emissions) from intruders by comparing infrared receptions | Passive Infrared (PIR) Sensors |
These provide a common-sense approach for the reduction of false alarm rates. | Dual-Technology Sensors |
All visitors entering the facility should: | Sign in and sign out on a visitor’s log to maintain accountability of who is in the facility, Be greeted by a knowledgeable receptionist who in turn will promptly contact the employee with whom the visitor is there to meet. |
All visitors entering the facility should: | Be given a temporary badge that does not double as an access card.Present a form of photo identification, such as a driver’s license to the receptionist for verification. |
Perimeter Doors | Perimeter doors should consist of hollow steel doors or steel-clad doors with steel frames. ■■ Ensure the strength of the latch and frame anchor equals that of the door and frame. ■■ Permit normal egress through a limited number of doors, |
The electric lock is a secure method to control a door. An electric lock actuates the door bolt. For secure applications, dual locks can be used. | Electric Locks |
The difference between an electric strike and an electric lock is in the mechanism that is activated at the door. In an electric-strike door, the bolt remains stationary and the strike is retracted. | Electric Strikes |
is surface-mounted to the door and doorframe. Power is applied to magnets continuously to hold the door closed | The magnetic lock |
is a strategy where a person must present a credential to enter an area or facility, and then again use the credential to “badge out.” | Anti-passback |
A correctly constructed mantrap or portal will provide for tailgate detection while it allows roller luggage, briefcases, and other large packages to pass without causing nuisance alarms. People atte overhead sensing | True |
which is designed to provide a secure access control in the lobby of a busy building. This system is designed as a set of parallel pedestals that form lanes, which allow entry or exit. | optical turnstile |
According to UL standard 437, door locks and locking cylinders must resist attack | through the following testing procedures: the picking test, impression test (a lock is surreptitiously opened by making an impression of the key with a key blank of some malleable material forcing test, and salt spray corrosion test |
Key locks are one of the basic safeguards in protecting buildings, personnel, and property and are generally used to secure doors and windows. | True |
A rim lock is a lock or latch typically mounted on the surface of a door. It is typically associated with a dead bolt type of lock. | Rim lock |
is a lock or latch that is recessed into the edge of a door, rather than being mounted to its surface. | Mortise lock |
The pin tumbler cylinder is a locking cylinder that is composed of circular pin tumblers that fit into matching circular holes on two internal parts of the lock. | Locking cylinders |
A cipher lock is controlled by a mechanical keypad, typically five digits, that when pushed in the right combination the lock will release and allow entry. | Cipher lock |
are keys with a built-in microprocessor, which is unique to the individual key holder and identifies the key holder specifically. | “Intelligent keys” |
provide a quick way to disable a key by permitting one turn of the master key to change a lock. | “Instant keys” |
are often the last bastion of defense between an attacker and an asset. | Safes |
It must be resistant to entry (by opening the door or making a six-inch hand hole through the door) for a net working time of 15 minutes using any combination of the following tools: mechanical or portable electric hand drills ,carbide drill | Tool-Resistant Safe Class TL-15 |
is defined as a room or compartment designed for the storage and safekeeping of valuables and has a size and shape that permits entrance and movement within by one or more persons. | A vault |
The standards are intended to establish the burglary-resistant rating of vault doors and modular vault panels according to the length of time they withstand attack by common mechanical tools, electric tools, cutting torches, or any combination thereof. | ■■ Class M: one-quarter hour ■■ Class 1: one-half hour ■■ Class 2: one hour ■■ Class 3: two hours |
is a reinforced filing cabinet that can be used to store proprietary and sensitive information. The standards for classified containers are typically from a government. | A container |
all keys need to be tightly controlled from the day of purchase by designated personnel responsible for the lock system. | True |
needs a higher level of security than the rest of the facility. This should encompass a protected room with no windows and only one controlled entry into the area. | A server room |
rack locks can ensure that only the correct people have access to servers and only telecommunications people have access to telecommunications gear. “ | Rack Security |
Personnel within the organization need to be segregated from access areas where they have no | “need to know” for that area. |
rule is a strategy where two people must be in an area together, making it impossible for a person to be in the area alone. It prevents an individual cardholder from entering a selected empty security area unless accompanied by at least one other person. | The “two-person” rule |
This is a battery backup system, which maintains a continuous supply of electric power to connected equipment by supplying power from a separate source when utility power is not available | Uninterruptible Power Supply (UPS) |
Generator power should be activated automatically in the event of a utility failure by the transfer switch. | True |
stands for heating, ventilation, and air-conditioning. | HVAC |
Excessive heat degrades _______and causes downtime. Data centers and server rooms need an uninterrupted cooling system. | network performance |
is the ability of the air-conditioning system to remove moisture. This is important in typical comfort-cooling applications, such as office buildings, retail stores, and other facilities with high human occupancy and use. | Latent cooling |
is the ability of the air-conditioning system to remove heat that can be measured by a thermometer. Data centers generate much higher heat per square foot than typical comfort-cooling building environments | Sensible cooling |
Restrict access to main air intake points to people who have a work-related reason to be there and that air intake points are adequately secured with locking devices | True |
Maintain access rosters of pre-approved maintenance personnel authorized to work on the system | True |
Escort all contractors with access to the system while on site | True |
To protect your server room from fire, the organization needs to have smoke detectors installed and linked to a panel with enunciators that will warn people that there is smoke in the room. Also, it should be linked to a fire suppression | True |
Optical detection (photoelectric): | Classified as either beam or refraction |
operate on the principle of light and a receiver. Once enough smoke enters the room and breaks the beam of light, the alarm is sounded. | Beam detectors |
has a blocker between the light and the receiver. Once enough smoke enters the room, the light is deflected around the beam to the signal. | The refraction type |
Primarily detect a large mass of hot gases that emit a specific spectral pattern in the location of the detector; these patterns are sensed with a thermographic camera and an alarm is sounded. | Infrared (IR |
Detect flames at speeds of 3 – 4 milliseconds due to the high-energy radiation emitted by fires and explosions at the instant of their ignition. Some of the false alarms of this system include random UV sources such as lightning, radiation, | Ultraviolet (UV) detectors |
Include fixed temperature or rate of rise detectors. The user will set a predetermined temperature level for the alarm to sound. If the room temperature rises to that setting, the alarm will sound. | Heat detectors |
All buildings should be equipped with an effective _________, providing the building with around-the-clock protection. Traditionally, fire suppression systems employed arrays of water sprinklers that would douse a fire and surrounding areas. | fire supression system |
have a constant supply of water in them at all times; these sprinklers once activated will not shut off until the water source is shut off. | Wet systems |
do not have water in them. The valve will not release until the electric valve is stimulated by excess heat. | Dry systems |
incorporate a detection system, which can eliminate concerns of water damage due to false activations. Water is held back until detectors in the area are activated. | Pre-action systems |
operate in the same function as the pre-action system except all sprinkler heads are in the open position. | Deluge systems |
systems operate to starve the fire of oxygen. | Gas suppression |
uses an aerosol of microscopic potassium compounds in a carrier gas released from small canisters mounted on walls near the ceiling. | Aero-K |
is a colorless, liquefied compressed gas. It is stored as a liquid and dispensed into the hazard as a colorless, electrically non-conductive vapor that is clear and does not obscure vision. | FM-200 |
seeks to reduce the risk related to human error, misjudgment, and ignorance by educating people about the risks and threats to confidentiality, integrity, and availability, and how they can help the organization be more resistant to threats | Security awareness |
General security awareness differs from awareness training in that awareness is designed to get people’s attention while training instructs people on practices they can adopt to identify, respond to, and protect against security threats. | True |
Some specific vehicles for delivering general security awareness include: | Threat alerts distributed by e-mail ■■ Security-specific newsletters or articles in your company’s newsletter ■■ Security awareness intranet sites ■■ Screensavers and computer wallpaper ■■ Posters and notices ■■ Brochures or pamphlets |
is typically more formal in nature and produces more directly measurable results. | Training |
Potential Training Topics | ■ Labeling and handling of sensitive information ■■ Appropriate use policies for e-mail, Internet, and other services ■■ Customer privacy laws, policies, and procedures ■■ Protecting intellectual property and copyright |
Security awareness is an example of a very effective way of dealing with the risk of social engineering? | True |
A security awareness program should be re-enforced by policy? | True |
All buildings are required to be equipped with an effective fire suppression system to provide protection. | True |
True | |
Which of the following describes best the capabilities of camera systems in physical security? | Cameras provide surveillance, incident detection and response capabilities |
A security technique in which a person opens one door and waits for it to close before the next door opens. | Mantrap |
Air contamination is a security issue. | True |
A fire suppression system that does not have water in the pipes until the electric valve is stimulated by excess heat. | Dry system |
Risks related to human error, misjudgement, and ignorance can be reduced by _________ | Security awareness training |
A strategy where two people must be in an area together, making it impossible for a person to be in the area alone. | Two- person rule |
Physical security is an integral part of information security. | True |
Senior management is ultimately accountable for the protection of valuable information | True |
Security strategy needs to be aligned with the strategy of the business. | True |
Which of the following is NOT true of policies? | Policies are often a collection of ideas |
Question 5 A fire suppression system that contains water in the pipes but will not release the water until detectors in the area have been activated. | Pre-action System |
Question 6 It is important to understand that each layer of security should have preventive, detective and corrective capabilities? | True |
CCTV is an example of __________ | Detective control |
Lighting is an example of ______ | Deterrent control |
Fence in an example of _________ | Preventive control |
Accountability for protecting information rest with the ____. | Owner |
Securing our systems, networks, and applications requires an integrated solution that is interoperable, easy to maintain, and easy to _____. | Monitor |
A process that scans the entire collection of information looking for similar chunks of data that can be consolidated. | Deduplication |
Controls that prescribe some sort of punishment, randing from embarrassment to job termination or jail time for noncompliance. Their intent is to dissuade people from performing unwanted acts. | Deterrent control |
These controls remedy the circumstances that enabled unwarranted activity, and/or return conditions to where they were prior to the unwanted activity. | Corrective control |
A security principle in which any user/process is given only the necessary,minimum level of access rights explicitly, for the minimum amount of time, in order for it to complete its operation. | Least privilege |
When different encryption keys generate the same ciphertext from the same plaintext message. | Key clustering |
Each encryption or decryption request is performed immediately. | Synchronous |
Encrypt/Decrypt requests are processed in queues. A key benefit of asynchronous cryptography is utilization of hardware devices and multiprocessor systems for cryptographic acceleration. | Asynchronous |
is a one-way mathematical operation that reduces a message or data file into a smaller fixed length output, or hash value. | A hash function |
provide authentication of a sender and integrity of a sender’s message. A message is input into a hash function. Then, the hash value is encrypted using the private key of the sender. The result of these two steps yields a digital signature. | Digital signatures |
is a term used in cryptography in which a secret key is applied to a message to change the content in a particular way. An example is shifting the letter by a specified number in the alphabet, A turns into D. | Symmetric |
is a term used in cryptography in which two different but mathematically related keys are used where one key is used to encrypt and another is used to decrypt. This term is most commonly used in reference to Public Key Infrastructure (PKI). | Asymmetric |
is an electronic document that contains the name of an organization or individual, the business address, the digital signature of the certificate authority issuing the certificate, the certificate holder’s public key, a serial number, | digital certificate |
an entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates. | Certificate authority (CA) |
performs certificate registration services on behalf of a CA.The RA is also expected to perform user validation before issuing a certificate request. | Registration authority(RA) |
is the message in its natural format. Plaintext is readable to anyone and is extremely vulnerable from a confidentiality perspective. | Plaintext or cleartext |
is the altered form of a plaintext message, so as to be unreadable for anyone except the intended recipients | Ciphertext or cryptogram |
is the process of converting the message from its plaintext to ciphertext. | Encryption |
is the reverse process from encryption. | Decryption |
is the input that controls the operation of the cryptographic algorithm. It determines the behavior of the algorithm and permits the reliable encryption and decryption of the message. | The key or cryptovariable |
is a security service by which evidence is maintained so that the sender and the recipient of data cannot deny having participated in the communication. | Non-repudiation |
is a mathematical function that is used in the encryption and decryption processes. | An algorithm |
is the study of techniques for attempting to defeat cryptographic techniques and, more generally, information security services. | Cryptanalysis |
is the science that deals with hidden, disguised, or encrypted communications. It embraces communications security and communications intelligence. | Cryptology |
occurs when a hash function generates the same output for different inputs. | Collision |
represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password. | Key space |
represents the time and effort required to break a protective measure. | Work factor |
is a non-secret binary vector used as the initializing input algorithm for the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance and to synchronize cryptographic equipment. | An initialization vector (IV) |
is the action of changing a message into another format through the use of a code. | Encoding |
is the reverse process from encoding — converting the encoded message back into its plaintext format. | Decoding |
or permutation is the process of reordering the plaintext to hide the message. | Transposition |
Substitution | is the process of exchanging one letter or byte for another. |
SP stands for substitution and permutation (transposition), and most block ciphers do a series of repeated substitutions and permutations to add confusion and diffusion to the encryption process. | The SP-network |
is provided by mixing (changing) the key values used during the repeated rounds of encryption. | Confusion |
is provided by mixing up the location of the plaintext throughout the ciphertext. Through transposition, the location of the first character of the plaintext may change several times during the encryption process, | Diffusion |
is an important consideration in all cryptography used to design algorithms where a minor change in either the key or the plaintex will have a significant change in the resulting ciphertext. This is also a feature of a strong-hashing algorithm. | The avalanche effect |
If the work factor is sufficiently high, the encryption system is considered to be practically or economically unbreakable, and is sometimes referred to as “economically infeasible” to break | |
The cryptographic key cannot be sent in the same channel (or transmission medium) as the data, so out-of-band distribution must be considered. Out of band means using a different channel to transmit the keys, such as courier, fax, phone, orother methods. | True |
Separate the key and the message | Out-of-Band Key Distribution |
is an encryption protocol that forms part of the 802.11i standard for wireless local area networks. The CCMP protocol is based on AES encryption using the CTR with CBC-MAC (CCM) mode of operation. | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) |
was developed in 1996 by Carlisle Adams and Stafford Tavares. CAST-128 can use keys between 40 and 128 bits in length and will do between 12 and 16 rounds of operation, depending on key length. | CAST |
was developed as a replacement for DES by Xuejai Lai and James Massey in 1991. IDEA uses a 128-bit key and operates on 64-bit blocks. IDEA does eight rounds of transposition and substitution using modular addition and multiplication | International Data Encryption Algorithm (IDEA) |
. The algorithms were developed by James Massey and work on either 64-bit input blocks (SAFER-SK64) or 128- bit blocks (SAFER-SK128). A variation of SAFER is used as a block cipher in Bluetooth. | Secure and Fast Encryption Routine (SAFER) |
is a symmetrical algorithm developed by Bruce Schneier. It is an extremely fast cipher and can be implemented in as little as 5K of memory | Blowfish |
by Ron Rivest of RSA and is deployed in many of RSA’s products. It is a very adaptable product useful for many applications, ranging from software to hardware implementations. | RC5 |
a stream-based cipher, was developed in 1987 by Ron Rivest for RSA Data Security and has become the most widely used stream cipher, being deployed, for example, in WEP and SSL/TLS. | RC4, |
Symmetric algorithms are very fast and secure methods of providing confidentiality and some integrity and authentication for messages being stored or transmitted | True |
However, there are serious disadvantages to symmetric algorithms — key management is very difficult, especially in large organizations. | True |
the attacker has access to both the ciphertext and the plaintext versions of the same message. The goal of this type of attack is to find the link — the cryptographic key that was used to encrypt the message. | known plaintext attack |
This attack works closely with several other types of attacks. It is especially useful when attacking a substitution cipher where the statistics of the plaintext language are known. | Frequency Analysis |
the attacker has access to the decryption device or software and is attempting to defeat the cryptographic protection by decrypting chosen pieces of ciphertext to discover the key. | Chosen Cipher-Text |
that it is easier to find two messages that hash to the same message digest than to match a specific message and its specific message digest. | birthday attack |
merely encrypts all of the words in a dictionary and then checks whether the resulting hash matches an encrypted password stored in the SAM file or other password file. | The dictionary attack |
This attack is meant to disrupt and damage processing by the attacker sending repeated files to the host. | Replay Attack |
This attack is aimed at the RSA algorithm. Because that algorithm uses the product of large prime numbers to generate the public and private keys, this attack attempts to find the keys through solving the factoring of these numbers. | Factoring Attack |
This attack is one of the most common. A competing firm buys a crypto product from another firm and then tries to reverse engineer the product. Through reverse engineering, it may be able to find weaknesses in the system or gain crucial information | Reverse Engineering |
Most cryptosystems will use temporary files to perform their calculations. If these files are not deleted and overwritten, they may be compromised and lead an attacker to the message in plaintext. | True |
Implementation attacks are some of the most common and popular attacks against cryptographic systems due to their ease and reliance on system elements outside of the algorithm. | True |
The main types of implementation attacks include: | ■■ Side-channel analysis ■■ Fault analysis ■■ Probing attacks |
are passive attacks that rely on a physical attribute of the implementation such as power consumption/emanation. These attributes are studied to determine the secret key and the algorithm function | Side-channel attacks |
force the system into an error state to gain erroneous results. By forcing an error, gaining the results, and comparing it with known good results, an attacker may learn about the secret key and the algorithm | Fault analysis attempts |
watch the circuitry surrounding the cryptographic module in hopes that the complementary components will disclose information about the key or the algorithm. | Probing attacks |
the European Data Protection Directive only allows for the processing of personal data under specific circumstances, such as: | When processing is necessary for compliance with a legal action ■■ When processing is required to protect the life of the subject ■■ When consent is provided ■■ When the processing is performed within “public interest” |
is the knowledge and attitude members of an organization possess regarding the protection of the physical and especially information assets of that organization. | Security awareness |
is a set of system, software, and communication protocols required to use, manage, and control public key cryptography. It has three primary purposes | A PKI |
A PKI has three primary purposes: | ■■ Publish public keys/certificates ■■ Certify that a key is tied to an individual or entity ■■ Provide verification of the validity of a public key |
“signs” an entity’s digital certificate to certify that the certificate content accurately represents the certificate owner. | The CA |
The CA can revoke certificates and provide an update service to the other members of the PKI via a | Certificate Revocation List (CRL) |
is a list of non-valid certificates that should not be accepted by any member of the PKI | Certificate Revocation List (CRL) |
The use of public key (asymmetric) cryptography has enabled more effective use of symmetric cryptography as well as several other important features, such as greater access control, non-repudiation, and digital signatures. | True |
was developed to address the need of financial institutions to transmit securities and funds securely using an electronic medium. Specifically, it describes the means to ensure the secrecy of keys. | ANSI X9.17 |
approach is based on a hierarchy of keys. At the bottom are data keys (DKs). Data keys are used to encrypt and decrypt messages. They are given short lifespans, such as one message or one connection. At the top are master key-encrypting keys | The ANSI X9.17 |
Two mechanisms necessary to implement high integrity cryptographic operations environments where separation of duties is paramount are | Dual Control and Split knowledge |
is the unique “what each must bring” and joined together when implementing dual control. | Split Knowledge |
is implemented as a security procedure that requires two or more persons to come together and collude to complete a process. In a cryptographic system, the two (or more) people would each supply a unique key that together performs a cryptographic process. | Dual Control |
Computers are so thoroughly deterministic that they have a hard time generating high-quality randomness. Therefore, special purpose built hardware and software called | “random number generators,” or RNGs, are needed for cryptography applications. |
Key length is another important aspect of key management to consider when generating cryptographic keys. Key length is the size of a key, usually measured in bits or bytes, which a cryptographic algorithm used in ciphering or deciphering pi | True |
The process of using a KEK(Key Encrypting Keys) to protect session keys is called | key wrapping. |
Keys can be distributed in a number of ways. For example, two people who wish to perform key exchange can use a medium other than that through which secure messages will be sent. This is | “out-of-band” key exchange. |
A more scalable method of exchanging keys is through the use of a | PKI key server |
is a central repository of public keys of members of a group of users interested in exchanging keys to facilitate electronic transactions. | A key server |
Recall the formula used before to calculate the number of symmetric keys needed for users: | n (n −1)/2 |
Methods for protecting stored keying material, passphrase-protected smart cards, key wrapping session keys using long-term storage KEKs, splitting cipher keys and storing in physically separate storage locations, strong passwords/passphrases, key expiry, | True |
In order to guard against a long-term cryptanalytic attack, every key must have an | expiration date |
Additional guidance for storage of cipher keys include: | All centrally stored data that is related to user keys should be signed or have a MAC applied to it, Backup copies should be made of central/root keys, Provide key recovery capabilities, Archive user keys for a sufficiently long crypto period |
Among the factors affecting the risk of exposure are: | The strength of the cryptographic mechanisms, the embodiment of the mechanisms, the operating environment, The security life of the data, The key update or key derivation process |
is the process of ensuring a third party maintains a copy of a private key or key needed to decrypt information. | Key escrow |
is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner. | a web of trust |
is a suite of protocols for communicating securely with IP by providing mechanisms for authenticating and encryption. | IP Security (IPSec) |
Further, IPSec can be implemented in two modes | ■■ One that is appropriate for end-to-end protection ■■ One that safeguards traffic between networks |
is used to prove the identity of the sender and ensure that the transmitted data has not been tampered with. | The authentication header |
The encapsulating security payload encrypts IP packets and ensures their integrity | True |
Encapsulating Security Payload (ESP) contains four sections | ■■ ESP header: ■■ ESP payload: ■■ ESP trailer: ■■ Authentication: |
A Security Association (SA) defines the mechanisms that an endpoint will use to communicate with its partner. | Mechanisms that are defined in the SA include the encryption and authentication algorithms, and whether to use the AH or ESP protocol. |
Endpoints communicate with IPSec using either transport or tunnel mode. | True |
the IP payload is protected. This mode is mostly used for end-to-end protection, for example, between client and server. | In transport mode |
the IP payload and its IP header are protected. The entire protected IP packet becomes a payload of a new IP packet and header. Tunnel mode is often used between networks, such as with firewall-tofirewall VPNs. | In tunnel mode |
Internet key exchange allows communicating partners to prove their identity to each other and establish a secure communication channel, and is applied as an authentication component of IPSec. | True |
IKE uses two phases: | ■■ Phase 1: In this phase, the partners authenticate with each other, using one of the following: ■■ Phase 2: The peers’ security associations are established, using the secure tunnel and temporary SA created at the end of phase 1. |
is a widely accepted method, or more precisely a protocol, for sending digitally signed and encrypted messages. S/MIME allows you to encrypt e-mails and digitally sign them. | Secure/Multipurpose Internet Mail Extensions (S/MIME) |
S/MIME provides two security services: | ■■ Digital signatures ■■ Message encryption |
digital signatures provide the following security capabilities: | ■■ Authentication ■■ Non-repudiation ■■ Data integrity |
Process for Digitally Signing an E-Mail | 1. Message is captured. 2. Information uniquely identifying the sender is retrieved. 3. Signing operation is performed on the message using the sender’s unique information to produce a digital signature. 4. Digital signature appended to the ,messag |
Process for Verifying a Digital Signature of an E-Mail Message | 1. Message is received. 2. Digital signature is retrieved from the message. 3. Message is retrieved. 4. Information identifying the sender is retrieved. 5. Signing operation is performed on the message. 6. Digital signature included wi |
Message encryption provides two specific security services: | ■■ Confidentiality ■■ Data integrity |
message is one that is signed, encrypted, and then signed again. | A triple-wrapped S/MIME |
Key distribution is a key problem associated with asymmetric key cryptography. | False |
Steganography is defined as hiding a message within something else? | True |
Cryptography addresses integrity through hashing and digital signatures. | True |
The ‘web of trust’ is just as effective as a hierarchical trust model in providing trust. | False |
Which of the following does a digital signature NOT provide? | Confidentiality |
Question 7 A security service by which evidence is maintained so that the sender and the recipient of data cannot deny having participated in the communication. | Non-repudiation |
Secure email requires the implementations of cryptography solutions? | True |
In symmetric key cryptography, each party should use a? | Previously exchanged secret key |
Nonrepudiation of a message ensures that a message? | Can be attributed to a particular author. |
In Electronic Code Book (ECB) mode, data are encrypted using? | The same cipher for every block of a message |
Stream ciphers are normally selected over block ciphers because of? | The high degree of speed behind the encryption algorithms |
Question 6 The correct choice for encrypting the entire original data packet in a tunneled mode for an IPSec solution is? | Encapsulating Security Payload (ESP) |
Question 7 When implementing a password-based access control solution, what function should be used to help avoid rainbow table collisions? | Salt |
Asymmetric key cryptography is used for the following: | Encryption of Data, Nonrepudiation, Access Control |
Which of the following algorithms supports asymmetric key cryptography? | Diffie-Hellman |
A Certificate Authority (CA) provides which benefit to a user? | Validation that a public key is associated with a particular user |
What is the input that controls the operation of the cryptographic algorithm? | Cryptovariable |
AES is a block cipher with variable key lengths of? | 128, 192 or 256 bits |
Question 14 A Hashed Message Authentication Code (HMAC) works by? | Adding a secret key value to the input function along with the source message. |
What is the process of using a Key Encrypting Key (KEK) to protect session keys called? | Key generation |
A function of the likelihood of a given threat source exercising a potential vulnerability, and the resulting impact of that adverse event on the organization. | Risk |
The probability that a potential vulnerability may be exercised within the construct of the associated threat environment. | Likelihood |
Either intent and method targeted at the intentional exploitation of a vulnerability or a situation or method that may accidentally trigger a vulnerability. | Threat Source |
The potential for a threat source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability. | Threat |
A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy. | Vulnerability |
The magnitude of harm that could be caused by a threat’s exercise of a vulnerability. | Impact |
Anything of value that is owned by an organization. Assets include both tangible items, such as information systems and physical property, and intangible assets, such as intellectual property. | Asset |
evaluate threats to information systems, system vulnerabilities and weaknesses, and the likelihood that threats will exploit these vulnerabilities and weaknesses to cause adverse effects. | Risk assessments |
Impact can be assessed in either quantitative or qualitative terms. | True |
Annual Loss Expectancy | Single Loss Expectancy X Annualized Rate of Occurrence |
impact analysis assesses impact in relative terms such as high impact, medium impact, and low impact without assigning a dollar value to the impact. | A qualitative |
transfers risk from an organization to a third party. | Risk transference |
These audits are performed before a merger/ acquisition to give the purchasing company an idea of where the company they are trying to acquire stands on security in relation to its own security framework. | Merger/acquisition audit |
Although rare, there are times when a company is ordered by the courts to have a security audit performed. | Ordered audit |
The six-step RMF includes: | ■■ Security categorization ■■ Security control selection ■■ Security control implementation ■■ Security control assessment ■■ Information system authorization ■■ Security control monitoring |
Note that vulnerability-testing software is often placed into two broad categories: | ■■ General vulnerability ■■ Application-specific vulnerability |
is simply the process of checking a system for weaknesses. | Vulnerability scanning |
Problems that may arise when using vulnerability analysis tools include | False positives, Weeding out false positives,Crash exposure,Temporal information |
These systems monitor for viruses contained within communications of major application types, such as web traffic, e-mail, and FTP | Antivirus gateways |
These systems screen communications for these components and block or limit their transmission | Java/ActiveX filters |
These systems block web traffic to and from specific sites or sites of a specific type (gambling, pornography, games, travel and leisure, etc.) | Web traffic screening |
attempts to locate unauthorized, also called rogue, modems connected to computers that are connected to networks. | War dialing |
is the wireless equivalent of war dialing. While war dialing involves checking banks of numbers for a modem, war driving involves traveling around with a wireless scanner looking for wireless access points. | War driving |
enetration testing consists of five different phases: | ■■ Phase 1: Preparation ■■ Phase 2: Information gathering ■■ Phase 3: Information evaluation and risk analysis ■■ Phase 4: Active penetration ■■ Phase 5: Analysis and reporting |
Tester has complete knowledge of the systems and infrastructure being tested | White box / hat |
: A hybrid between white and black box; this mode can vary greatly | ■■ Gray box / hat |
Assumes no prior knowledge of the systems or infrastructure being tested | ■ Black box / hat |
Collecting information about the organization from publicly available sources, social engineering, and low-tech methods. This information forms the test attack basis by providing useful information to the tester. | Reconnaissance |
Collecting information about the organization’s Internet connectivity and available hosts by (usually) using automated mapping software tools. | Network mapping |
a system that records Internet registration information, including the company that owns the domain, administrative contacts, technical contacts, when the record of domain ownership expires, and DNS servers authoritative for maintaining host IP addresses | |
is an activity that involves the manipulation of people or physical reconnaissance to get information for use in exploitation or testing activities. | Social engineering |
a system that records Internet registration information, including the company that owns the domain, administrative contacts, technical contacts, when the record of domain ownership expires, and DNS servers authoritative for maintaining host IP addresses | Whois is |
is a special type of query directed at a DNS server that asks the server for the entire contents of its zone (the domain that it serves). | A zone transfer |
is a process that “paints the picture” of which hosts are up and running externally or internally and what services are available on the system. | Network mapping |
If you ping a host and it replies, it is alive (i.e., up and running). This test does not show what individual services are running. | ICMP echo requests (ping) |
A connect scan can be used to discover TCP services running on a host even if ICMP is blocked. This type of scan is considered “noisy” (noticeable to logging and intrusion detection systems) because it goes all the way through the connection process. | TCP Connect scan |
SYN scanning can be used to discover TCP services running on a host even if ICMP is blocked. SYN scanning is considered less noisy than connect scans. | TCP SYN scan: |
FIN scanning can be used to discover TCP services running on a host even if ICMP is blocked. FIN scanning is considered a stealthy way to discover if a service is running. | TCP FIN scan |
: XMAS scans are similar to a FIN scan (and similarly stealthy), but they additionally turn on the URG (urgent) and PSH (push) flags. | TCP XMAS scan |
are similar to a FIN scan but they turn off all flags. The NULL scan is similar to the others noted above; however, by turning off all TCP flags , the packet might be handled differently and you may see a different result. | TCP NULL scan |
A UDP scan determines which UDP service ports are opened on a host. The test machine sends a UDP packet on a port to the target. | UDP scans |
uses traceroute techniques to discover which services a filtering device such as a router or firewall will allow through. | firewalking |
Uses ICMP or TCP depending on the implementation of a path to a host or network. | Traceroute (Windows calls this tracert) |
See if a host is alive using ICMP echo request messages. | Ping |
Telnetting to a particular port is a quick way to find out if the host is servicing that port in some way. | Telnet |
refers to testing techniques used by port scanners and vulnerability analysis software that attempt to identify the operating system in use on a network device and the versions of services running on the host. | System Fingerprinting |
A string of characters or activities found within processes or data communications that describes a known system attack. Some monitoring systems identify attacks by means of a signature. | Signature |
Monitoring triggered an event but nothing was actually wrong, and in doing so the monitoring has incorrectly identified benign communications as a danger. | False positive |
The monitoring system missed reporting an exploit event by not firing an alarm. This is bad | False negative |
The monitoring system recognized an exploit event correctly. | True positive |
The monitoring system has not recognized benign traffic as cause for concern. In other words, it does nothing when nothing needs to be done. This is good. | True negative |
Customizing a monitoring system to your environment. | Tuning |
A network interface that collects and processes all of the packets sent to it regardless of the destination MAC address. | Promiscuous interface |
Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. | IP |
NetFlow is an embedded instrumentation within Cisco IOS Software to characterize network operation. | NetFlow |
It provides a means for exporting truncated packets, together with interface counters. | sFlow |
SIEM | Security, Information, and Event Management (SIEM) |
These devices capture every single information packet that flows across the border, making them indispensable tools as they capture the raw packet data, which can be analyzed later should an incident occur. | Full packet |
defines a set of basic security objectives that must be met by any given service or system. | A Security Baseline |
SIEM (Security Information and Event Management) systems collect data from multiple sources and bring it together for meaningful analysis. | True |
Countermeasure is an added-on reactive security controls. | True |
False positive is the monitoring system missed reporting an exploit event by not firing an alarm. | False |
Tuning is customizing a monitoring system to your environment | True |
A passive system that detects security events but has limited ability to intervene on the event. | Intrusion Detection System (IDS) |
An effort to help people understand the significance of data by placing it in a visual context. | Data visualization |
The process for generating, transmitting, storing, analyzing, and disposing of computer security log data. | Log management |
The monitoring system recognizing an exploit event correctly. | True positive |
Log filtering takes place before log files have been written. | False |
A particular attack that exploit system vulnerabilities. | Exploit |
is the process of responding in an organized manner to a compromise or attempted compromise of organizational information technology assets. | Incident response |
is any observable occurrence in a system or network. | An event |
are events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page, and execution of malicious code that destroys data.” | Adverse events |
as a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.” | Computer Security Incident |
Effective incident management in any organization first requires a well-written and communicated policy. | True |
Communication Planning is an essential part of ________. | Incident response planning |
Question 4 Using available information to determine if an attack is underway, send alerts, and provide limited response capabilities is _______. | Intrusion Detection System (IDS) |
The correct order by which incident response should be conducted is: | Detection, containment, analysis, restoration, feedback |
Which of the following statements is the most correct in incident response? | The goal of incident response is to minimize the damage and learn from the incident as to prevent it from happening again |
Because of the need to respond quickly in incident response, the most important phase in incident management is _______________. | Detection |
Question 9 The process of responding in an organized manner to a compromise or attempted compromise of organizational information technology assets is called ___________. | Incident response |
Question 10 Using available information to determine if an attack is underway, send alerts but also block the attack from reaching its intended target is _______. | Intrusion Prevention Systems (IPS) |
is focused on recovery of information technology infrastructure, applications, communications equipment, and data after a disaster | Disaster recovery planning |
focuses on the continuity and recovery of critical business functions during and after a disaster Both disaster recovery planning and business continuity planning will be discussed in detail. | Business continuity planning |
is performed to assess the financial and nonfinancial impacts to an organization that would result from a business disruption. | BIA |
is the maximum amount of time that a business function can be unavailable before the organization is harmed to a degree that puts the survivability of the organization at risk. | maximum tolerable downtime (MTD) |
the entire system is copied to backup media. This is the slowest type of backup to perform as more data is copied to backup media | ful backup |
record differences in data since the most recent full backup. | Differential backups |
record changes that are made to the system on a daily basis. | Incremental backups |
refers to a method of configuring multiple computers so that they effectively operate as a single system. | Clustering |
is a clustering method that uses multiple systems to reduce the risk associated with a single point of failure. | High-availability clustering |
Redundant Array of Independent Disks | (RAID) |
is a method that may be used to provide data redundancy. In a RAID implementation, data are written across a series of disks. | RAID |
data are striped across multiple disks but no parity information is included. As a result, although performance is improved, RAID 0 provides no data redundancy. | RAID 0 |
configuration, data mirroring is used. Identical copies of data are stored on two separate drives. In the event that one disk fails, an exact duplicate of the data resides on the other disk. | RAID 1 |
configuration, striping is performed at the bit level. | RAID 2 |
configuration, striping is performed at the byte level and uses a dedicated parity disk. | RAID 3 |
configurations implement striping at the block level and use a dedicated parity disk | RAID 4 |
uses block-level striping with parity information that is distributed across multiple disks. | RAID 5 |
each participant reviews his or her section of the plan to validate that it still contains accurate information. | checklist test |
representatives from each business unit gather together to review the BCP. Each team presents its section of the BCP to the group. | a structured walkthrough test |
an actual disaster situation is simulated. The disaster is simulated so that business operations are not actually interrupted. | simulation test |
is an operational test and generally does not include representatives from departments that do not have direct involvement in operations such as human resources, public relations, or marketing. | Parallel testing |
testing is performed when business operations are actually interrupted at the primary processing facility. Processing is performed at the alternate site, | Full interruption |