Thor's Study Guide - CISM Domain 2
Thor's Study Guide - CISM Domain 2
2 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● We identify all our assets, identify the risks, then we assess the risks with qualitative and
quantitative risk analysis, we respond to the risk, mitigation, and then we monitor controls.
● We talk about attackers, and he attacks in OWASP top 10 (2021).
● We will cover how we secure our communication, software, and systems, by securing our
networking, networking devices.
● We will discuss many networking basics like IP, NAT, PAT, protocols, hardware, and software,
wireless and much more from networking.
● Finally, we will talk about what cloud computing is and what is our responsibility to secure and
IOT.
● This should be what you are tested on for Domain 2 until the next planned CISM curriculum
change in 2027.
3 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
Risk Analysis
Qualitative vs. Quantitative Risk Analysis
For any Risk analysis we need to identify our assets. What are we protecting?
● Qualitative Risk Analysis – How likely is it to happen and how bad is it if it happens? This is a
vague guess or a feeling, and relatively quick to do. Most often done to know where to focus the
Quantitative Risk Analysis.
● Quantitative Risk Analysis – What will it actually cost us in $? This is fact-based analysis, Total $
value of asset, math is involved.
● Threat – A potentially harmful incident (Tsunami, Earthquake, Virus, ...)
● Vulnerability – A weakness that can allow the Threat to do harm. Having a data center in the
tsunami flood area, not earthquake resistant, not applying patches and antivirus, …
● Risk = Threat x Vulnerability.
● Impact - Can at times be added to give a fuller picture. Risk = Threat x Vulnerability x Impact (How
bad is it?).
● Total Risk = Threat x Vulnerability x Asset Value.
● Residual Risk = Total Risk – Countermeasures.
4 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
It is normal to move high and extreme on to quantitative risk analysis. If mitigation is implemented, we
can maybe move the risk level to “Low” or “Medium”.
Risk Registers
● A risk category to group similar risks.
● The risk breakdown structure identification
number
● A brief description or name of the risk to make
the risk easy to discuss.
● The impact (or consequence) if event actually
occurs rated on an integer scale.
● The probability or likelihood of its occurrence rated on an integer scale.
● The Risk Score (or Risk Rating) is the multiplication of Probability and Impact and is often used to
rank the risks.
● Common mitigation steps (e.g., within IT projects) are Identify, Analyze, Plan Response, Monitor
and Control.
5 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Remote wipe capabilities for the laptop = $20,000 initial and $4,000 per year.
● Staff for encryption and help desk = $25,000 per year
Doing nothing costs us $1,000,000 per tech refresh cycle ($250,000 per year).
Implementing full disk encryption and remote wipe will cost $231,000 per tech refresh cycle
($57,750 per year)
The laptop hardware is a 100% loss, regardless. What we are mitigating is the 25 x $9,000 =
$225,000 by spending $57,750.
This is our ROI (Return on Investment): TCO ($57,750) < ALE ($250,000). This makes fiscal sense,
we should implement.
This is area very testable, learn the formula, the risk responses to differentiate Qualitative and
Quantitative Risk.
Qualitative = Think “quality.” This concept is semi-vague, e.g., “pretty good quality. “
Quantitative = Think “quantity.” How many; a specific number.
NIST 800-30
NIST 800-30 - United States National Institute of Standards and Technology Special Publication
o A 9-step process for Risk Management.
1. System Characterization (Risk Management scope, boundaries, system, and data
sensitivity).
2. Threat Identification (What are the threats to our systems?).
3. Vulnerability Identification (What are the vulnerabilities of our systems?).
4. Control Analysis (Analysis of the current and planned safeguards, controls, and
mitigations).
5. Likelihood Determination (Qualitative – How likely is it to happen)?
6. Impact Analysis (Qualitative – How bad is it if it happens? Loss of CIA).
7. Risk Determination (Look at 5-6 and determine Risk and Associate Risk Levels).
8. Control Recommendations (What can we do to Mitigate, Transfer, … the risk).
9. Results Documentation (Documentation with all the facts and recommendations).
6 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
Risk Management
Risk Response and Mitigation
● Risk mitigation, transference, acceptance, or avoidance.
● We act on senior managements choices, which they made based on
our recommendations from the assessment phase.
● Do we stop issuing laptops, or do we add full-disk encryption and
remote wipe capabilities?
● We update the risk register, with the mitigations, the risk responses
we chose and see if the new risk level is acceptable.
Types of Attackers
● Hackers:
o Now: Anyone trying to get access to or disrupt any leg of the CIA Triad (Confidentiality,
Integrity, Availability).
o Original use: Someone using something in a way not intended.
o White Hat hackers: Professional pen testers trying to find flaws so we can fix it (Ethical
hackers).
o Black Hat hackers: Malicious hackers, trying to find flaws to exploit them (Crackers – they
crack the code).
o Gray/Grey Hat hackers: They are somewhere between the white and black hats, they go
looking for vulnerable code, systems, or products. They often just publicize the
vulnerability (which can lead to black hats using it before a patch is developed). Gray hats
sometimes also approach the company with the vulnerability and ask them to fix it and if
nothing happens, they publish.
o Script Kiddies: They have little or no coding knowledge, but many sophisticated hacking
tools are available and easy to use. They pose a very real threat. They are just as
dangerous as skilled hackers; they often have no clue what they are doing.
7 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Outsiders:
o Unauthorized individuals - Trying to gain access; they launch the majority of attacks but
are often mitigated if the organization has good Defense in Depth.
o Interception, malicious code (e.g., virus, logic bomb, trojan horse), sale of personal
information, system bugs, system intrusion, system sabotage or unauthorized system
access.
o 48-62% of risks are from outsiders.
● Insiders:
o Authorized individuals - Not necessarily to the compromised system, who intentionally or
unintentionally compromise the system or data.
o This could be Assault on an employee, blackmail, browsing of proprietary information,
computer abuse, fraud and theft, information bribery, input of falsified or corrupted data.
o 38-52% of risks are from insiders, another reason good Authentication and Authorization
controls are needed.
● Hacktivism/Hacktivist (hacker activist):
o Hacking for political or socially motivated purposes.
o Often aimed at ensuring free speech, human rights, freedom of information movement.
8 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Governments:
o State sponsored hacking is common; often you see the attacks happening between the
hours of 9 and 5 in that time zone; this is a day job.
o Approximately 120 countries have been developing ways to use the internet as a weapon
to target financial markets, government computer systems and utilities.
o Famous attacks: US elections (Russia), Sony websites (N. Korea), Stuxnet (US/Israel), US
Office of Personnel Management (China), …
● Bots and botnets (short for robot):
o Bots are a system with malware controlled by a botnet.
o The system is compromised by an attack or the user
installing a remote access Trojan (game or application
with a hidden payload).
o They often use IRC, HTTP or HTTPS.
o Some are dormant until activated.
o Others are actively sending data from the system
(Credit card/bank information for instance).
o Active bots can also be used to send spam emails.
● Botnets is a C&C (Command and Control) network, controlled
by people (bot-herders).
o There can often be 1,000’s or even 100,000’s of bots in
a botnet.
● Phishing, spear phishing and whale phishing (Fishing spelled in
hacker speak with Ph not F).
o Phishing (Social engineering email attack):
▪ Click to win, send information to get your
inheritance, …
▪ Sent to hundreds of thousands of people; if just 0.02% follow the instructions they
have 200 victims.
o Spear Phishing: Targeted phishing, not just random spam, but targeted at specific
individuals.
▪ Sent with knowledge about the target (person or company); familiarity increases
success.
o Whale Phishing (Whaling): Spear phishing targeted at senior leadership of an
organization.
▪ This could be: “Your company is being sued if you don’t fill out the attached
documents (with trojan in them) and return them to us within 2 weeks”.
o Vishing (Voice Phishing): Attacks over automated VOIP (Voice over IP) systems, bulk spam
similar to phishing.
▪ These are: “Your taxes are due”, “Your account is locked” or “Enter your PII to
prevent this” types of calls.
9 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
https://owasp.org/www-project-top-ten/
● A01:2021 - Broken Access Control:
o It is not implemented consistently across an entire application.
o It can be done correctly in one location but incorrectly in another.
o We need a centralized access control mechanism, and we write the tricky logic once and
reuse it everywhere.
o This is essential both for writing the code correctly and for making it easy to audit later.
o Many access control schemes were not deliberately designed but have simply evolved
along with the website.
o Inconsistent access control rules are often inserted in various locations all over the code,
making it near impossible to manage.
o One especially dangerous type of access control vulnerability arises from web-accessible
administrative interfaces, frequently used to allow site administrators to efficiently
manage users, data, and content on their site.
10 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● A03:2021 – Injection:
o Can be any code injected into user forms. Often seen is SQL/NoSQL/OS command/LDAP.
o Attackers can do this because our software does not use:
▪ Strong enough input validation and data type limitations input fields.
▪ Input length limitations.
o CGI (Common Gateway Interface):
▪ Standard protocol for web servers to execute programs running on a server that
generates web pages dynamically. We use the interface to ensure only proper
input makes it to the database.
▪ The CGI separates the untrusted (user) from the trusted (database).
11 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
12 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
13 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
14 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
15 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
16 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
17 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
18 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● The higher you go up the layers the slower it is, speed is traded for intelligence.
● Threats to level 5-7: Virus, worms, trojans, buffer overflow, application, or OS vulnerabilities.
● The link and physical layer have the networking scope of the local network connection to which a
host is attached.
19 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Used to move packets between the Internet layer interfaces of two different hosts on the
same network.
o The process of transmitting and receiving packets on a given link can be controlled both in
the software device driver for the network card, as well as on firmware or specialized
chipsets.
o These perform functions such as adding a packet header to prepare it for transmission,
then transmits the frame over a physical medium.
o The TCP/IP model includes specifications of translating the network addressing methods
used in the Internet Protocol to link layer addresses, such as Media Access Control (MAC)
addresses.
o The link and physical layer = OSI layer 1-2.
● The transport layer establishes basic data channels that applications use for task-specific data
exchange.
o Its responsibility includes end-to-end message transfer independent of the underlying
network, along with error control, segmentation, flow control, congestion control, and
application addressing (port numbers).
o Data is sent connection-oriented (TCP) or connectionless (UDP).
o The transport layer = OSI layer 4.
● The application layer includes the protocols used by applications for providing user services or
exchanging application data over the network (HTTP, FTP, SMTP, DHCP, IMAP).
o Data coded according to application layer protocols are encapsulated into transport layer
protocol units, which then use lower layer protocols for data transfer.
o The transport layer and the lower-level layers are unconcerned with the specifics of
application layer protocols.
o Routers and switches do not typically examine the encapsulated traffic, rather they just
provide a conduit for it. However, some firewall and bandwidth throttling applications
must interpret application data.
20 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o The TCP/IP reference model distinguishes between user protocols and support protocols.
o The application layer = OSI layer 5, 6 and 7.
Protocols
● IP Addresses:
o First deployed for production in the ARPANet in 1983, ARPANet later became the
internet.
o IP was developed in the 1970’s for secure closed networks (DARPA - Defense Advanced
Research Projects Agency). Security was not built in but was bolted on later.
o IPv4 is a connectionless protocol for use on packet-switched networks.
21 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o It operates on a best effort delivery model, it does not guarantee delivery, it also does not
assure proper sequencing or avoidance of duplicate delivery. We have added protocols on
top of IP to ensure those.
o IPv4 is the IT route's most Internet traffic today, but we are slowly moving towards IPv6.
▪ The move towards IPv6 is mainly dictated by IPv4 Addresses being depleted years
ago.
o IPv4 has around 4.2 billion IP addresses and of those ~4 billion are usable internet
addresses.
▪ There are currently over 35 billion mobile devices on the internet, 75 billion is
predicted by 2025.
▪ All major cellphone carriers in the US use IPv6 for all cell phones.
▪ IPv4 has 4,294,967,296 addresses where IPv6 has
340,282,366,920,938,463,463,374,607,431,768,211,456.
● Common Ports:
o 20 TCP FTP data transfer.
o 21 TCP FTP control.
o 22 TCP/UDP Secure Shell (SSH).
o 23 TCP Telnet unencrypted text communications.
o 25 TCP Simple Mail Transfer Protocol (SMTP) can also use port 2525.
o 80 TCP/UDP Hypertext Transfer Protocol (HTTP) can also use port 8008 and 8080.
o 110 TCP Post Office Protocol, version 3 (POP3).
o 137 UDP NetBIOS Name Service, used for name registration and resolution.
o 138 TCP/UDP NetBIOS Datagram Service.
o 143 TCP Internet Message Access Protocol (IMAP).
o 443 TCP Hypertext Transfer Protocol over TLS/SSL (HTTPS).
o 3389 TCP/UDP Microsoft Terminal Server (RDP).
22 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
23 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o As a Band-Aid solution to extend the depletion of IPv4 Addresses NAT and PAT were
added:
o NAT (Network Address Translation):
▪ Static NAT Translates 1-1, we need 1 Public IP per
Private IP we use, not practical and not sustainable.
▪ Pool NAT: Also, still 1-1, but a pool was available to all
clients not assigned to specific clients.
o PAT (Port Address Translation):
▪ PAT was introduced to solve that issue; it uses IP AND
Port number.
▪ Also called One-to-Many or NAT Overload since it
translates one public IP to many private IPs.
24 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o IP Headers contain:
▪ Version: IP version 4.
▪ IHL: Length of the IP header.
▪ QoS (Quality of Service).
▪ Identification, Flags, Offset: used for IP
fragmentation.
▪ TTL (Time To Live): to prevent routing
loops.
▪ Protocol: Protocol number for TCP, UDP, ...
▪ Source and Destination IP addresses.
▪ Optional: Options and padding.
▪ MTU (Maximum Transmission Unit) - normally 1500 bytes in Ethernet usage.
▪ If a packet exceeds that size, a router along the path may fragment into
smaller packets.
● IPv6
o IPv6 is 128bit in hexadecimal numbers (uses 0-9 and a-f).
o 8 groups of 4 hexadecimals, making addresses look like
this:
▪ fd01:fe91:aa32:342d:74bb:234c:ce19:123b
o The IPv6 address space is huge compared to IPv4.
340,282,366,920,938,463,463,374,607,431,768,211,456
addresses.
▪ 34 with 37 0’s total or 79 with 27 0’s as many addresses as IPv4.
▪ Every square foot on the planet can have 65000 IP addresses.
o IPSec is built in, not bolted on like with IPv4.
25 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Mostly switched behind the scenes today, many organizations do not have Dual Stack
equipment in place.
o Used by major US ISPs for cell phones (and to some extent the connection to your
modem).
o To make the address more manageable 1 set of
0’s can be shortened with:: above you see the
last 16 0’s being shortened to
2001:0DB8:AC10:FE01::
o Our MAC address is 00:fa:22:52:88:8a
o It is a EUI-48 address we add “fffe” (for EUI-64)
00:fa:22:ff:fe:52:88:8a
o Set the U/L bit 20:fa:22:ff:fe:52:88:8a
▪ (The use of the universal/local bit in the
Modified EUI-64 format identifier is to
allow development of future technology
that can take advantage of interface identifiers with universal scope).
o Add our network prefix (2001:0000:0000:00b8)
2001:0000:0000:00b8:20fa:22ff:fe52:888a
▪ Remove largest group of 0’s 2001::b8:20fa:22ff:fe52:888a
▪ Link Local address (only for local) fe80::b8:20fa:22ff:fe52:888a
o IP Headers contain:
▪ Version: IP version 6 (4 bits)
▪ Traffic Class/Priority (8bits).
▪ Flow Label/QoS management
(20 bits).
▪ Payload length in bytes (16
bits).
▪ Next Header (8 bits).
▪ Time To Live (TTL)/Hop Limit (8
bits).
▪ Source IP address (128 bits).
▪ Destination IP address (128 bits).
▪ MTU (Maximum Transmission Unit) - normally 1500 bytes in Ethernet usage.
▪ If a packet exceeds that size, a
router along the path may
fragment into smaller packets.
● ARP (Address Resolution Protocol):
o Translates MAC Addresses into IP Addresses.
▪ OSI Data/Network Layer or
Network/Internet Layer.
o ARP is a simple and trusting protocol, anyone can
respond to an ARP request.
o ARP (cache) Poisoning: An attacker sends fake
responses to ARP requests, often done repeatedly
for critical ARP entries (Default Gateway).
26 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Traceroute:
o Uses ICMP to trace a network route.
o Traceroute uses the TTL value in somewhat
reverse.
o We send a message with TTL 1.
▪ The first router decrements the TTL to
0 and sends an ICMP Time Exceed
message back, First Hop is now
identified.
o We send message 2 with TTL 2, 2nd router Traceroute to isc2.org (tracert on windows command line):
does the same, it is identified. My local network > ISP > A few Hawaii hops > a few LA hops > 2x Santa Clara >
2x San Jose > Most likely ISC2 Firewall >
o We do that over and over till the destination is and finally the actual webserver.
reached (maximum 30 hops).
● Telnet:
o Remote access over a network.
o Uses TCP port 23, all data is plaintext including usernames and passwords, should not be
used.
o Attackers with network access can easily sniff credentials and alter data and take control
of telnet sessions.
27 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o On July 6th, 2017, WikiLeaks confirmed the CIA (ONLY this one time it is the Central
Intelligence Agency) has developed a tool to crack the SSH protocol.
▪ BothanSpy is an implant that targets the SSH client program Xshell on the
Microsoft Windows platform.
▪ Gyrfalcon is an implant that targets the OpenSSH client on Linux platforms centos,
debian, rhel, suse, ubuntu.
● Email Protocols:
1. The MUA (Mail User Agent) formats the
message and using SMTP sends the message to
the MSA (Mail Submission Agent).
2. The MSA determines the destination address
provided in the SMTP protocol, in this case
[email protected]. The MSA resolves the fully qualified
domain name of the mail server in the DNS.
3. The DNS server for the domain b.org (ns.b.org)
responds with any MX (Mail eXchange) records
listing for that domain, in this case mx.b.org, an
MTA (Message Transfer Agent) server run by the recipient's ISP.
4. smtp.a.org sends the message to mx.b.org using SMTP. This server may need to forward
the message to other MTAs before the message reaches the final MDA.
5. The MDA delivers it to the mailbox of user Jane.
6. Jane's MUA picks up the message using either the Post Office Protocol (POP3) or the
Internet Message Access Protocol (IMAP).
28 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
the internet.
o HTTPS (HTTP Secure):
▪ Uses TCP Port 443 (8443), encrypted
data sent over the internet.
o HTML (Hypertext Markup Language):
▪ The actual language webpages are
written in.
HTML: The basic building block of webpages.
▪ Not to be confused with HTTP/HTTPS.
29 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
Cables
● Networking Cables:
o When it comes to networking cables, most people think of
RJ45 Copper Ethernet cables; many more types are used
though.
o Networking cables all come with pro's and con's, some are
cheap, some more secure, some faster, ...
o They can also pose different security vulnerabilities
depending on the cable type and the environment.
o EMI (Electromagnetic Interference):
▪ Magnetism that can disrupt data availability and integrity.
o Crosstalk is the signal crossing from one cable to another, this can be a confidentiality
issue.
o Attenuation is the signal getting weaker the farther it travels.
▪ Copper lines have attenuation, with DSL the farther you are from the DSLAM
(Digital Subscriber Line Access Multiplexer) the lower the speed you get.
30 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Fiber Optic Cables Use light to carry data (vs. electricity for copper
cables):
o Pros: Speed 1 Petabit per second, 35miles/50 km over a single
fiber.
▪ It has no attenuation like copper; a single uninterrupted
cable can be 150 miles+ (240km+) long.
▪ Not susceptible to EMI.
▪ More secure than copper since it can't be sniffed as easily
as copper.
o Cons: Price, more difficult to use, you can break the glass in the
Single-Mode fiber.
cable if you are not careful.
o Single-Mode fiber - A Single strand of fiber carries a single mode of
light (down the center), used for long distance cables (Often used in
IP-Backbones).
o Multi-Mode fiber - Uses multiple modes (light colors) to carry
multiple data streams simultaneously, this is done with WDM
(Wavelength Division Multiplexing).
● All cable measurements are in metric (m/km). Light through fiber strands.
● Only 3 countries in the world do not use metric (Burma, Liberia, and the
United States).
o 1Kbps - Kilobits per second
▪ 1,000 bps (103)
o 1Mbps - Megabit per second
▪ 1,000,000 bps (106)
o 1Gbps - Gigabit per second
▪ 1,000,000,000 bps (109)
o 1Tbps - Terabit per second
▪ 1,000,000,000,000 bps (1012)
o 1Pbps - Petabit per second
▪ 1,000,000,000,000,000 bps (1015)
31 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
32 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Faulty NIC's (Network Interface Card) can also break the chain.
Tree Topology
● Tree (Hierarchical):
o The base of the Tree topology controls the traffic, this was often
the mainframe.
● Ring:
o All nodes are connected in a ring. Ring Topology
● Star:
o All nodes are connected to a central device.
o This is what we normally use for ethernet, our nodes are
connected to a switch.
33 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Mesh:
o Nodes are connected to each other in either a partial mesh Full Mesh Topology
or a full mesh.
o Partial Mesh:
▪ Nodes are directly connected to some other nodes.
o Full Mesh:
▪ All nodes are directly connected to all other nodes.
o More redundant but requires a lot more cables and NIC’s.
o Often used in HA (High Availability) environments, with cluster servers
for keepalives.
Secure Network Devices and Protocols Partial Mesh Topology
● We have different network devices through the OSI and TCP/IP models and many have protocols
specific to that device.
● Layer 1 devices:
o Repeaters receive a signal and retransmit it.
▪ They are used to extend transmissions so that the signal
can cover longer distances.
o Hubs are repeaters with more than 2 ports.
▪ All traffic is sent out all ports, no Confidentiality or
Integrity, half-duplex and not secure at all.
● Layer 2 devices:
o Bridges are 2 port switches used to separate collision domains,
which send traffic across the 2 domains, but traffic from one
domain is not seen on the other unless sent there.
o Switches are bridges with more than 2 ports.
▪ Each port is its own collision domain, fixing some of
the issues with collisions.
▪ Can range from 4 to 500+ ports.
▪ Use MAC addresses to direct traffic.
▪ Good switch security includes:
34 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Layer 2 Protocols:
o VLAN (Virtual LAN) is a broadcast domain that is
partitioned and isolated at layer 2.
▪ Specific ports on a switch are assigned to a
certain VLAN.
▪ The Payroll VLAN is in 2 different buildings and
spans multiple switches.
▪ VLANs uses tags within network packets and tag
handling in networking systems, replicating the
appearance and functionality of network traffic
that is physically on a single network but acts as
if it is split between separate networks.
▪ It allows networks and devices that must be kept
separate to share the same physical devices
without interacting, for simplicity, security,
traffic management, and/or cost reduction.
▪ VLAN Trunks - Ports connecting two switches to
span VLANs across them.
▪ VLANs share bandwidth, a VLAN trunk can use
link aggregation, quality-of-service prioritization,
or both to route data efficiently.
35 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Layer 3 devices:
o Routers:
▪ Normally have a few ports vs. a lot on switches.
▪ For our organizations they are in the data centers.
▪ In your home they are often combined with a switch, and
wireless in one box.
▪ Forwards traffic based on source and destination IPs and
ports.
▪ Connecting our LANs to the WAN.
▪ Routers send traffic to the most specific route in their routing table.
▪ Static route, a preconfigured route, always sends traffic there for a certain
subnet.
▪ Default gateway sends all non-local traffic to an ISP for instance.
▪ Dynamic route is learned from another routing via a routing protocol (OSPF,
EIGRP, BGP, IS-IS).
▪ Metric is used to determine the best route to a destination.
o Routers have two operation planes:
▪ Control plane:
▪ A router maintains a routing table that lists which route should be used to
forward a data packet, and through which physical interface connection.
▪ It uses internal pre-configured static routes, or by learning routes using a
dynamic routing protocol.
▪ Static and dynamic routes are stored in the RIB (Routing Information
Base).
▪ The control-plane logic then strips non-essential directives from the RIB
and builds a FIB (Forwarding Information Base) to be used by the
forwarding-plane.
▪ Forwarding plane:
▪ The router forwards data packets between incoming and outgoing
interface connections.
▪ It routes them to the correct network type using information that the
packet header contains.
▪ It uses data recorded in the routing table control plane.
36 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
Firewalls
● Firewalls: A firewall typically establishes a barrier between a trusted,
secure internal network and another outside network, like the Internet.
o Packet filtering firewalls, OSI Layer 1-3.
▪ Packet filters act by inspecting the "packets" which are
transferred between clients.
▪ If a packet does not match the packet filter's set of
filtering rules, the packet filter will drop the packet or
reject it and send error responses to the source.
▪ Any packet that matches one of the Permits is allowed to
pass.
▪ Rules are checked in order; the attacker's traffic is
dropped on the 3rd filter rule. Drop anything trying to
access 100.1.1.100.
▪ The internal machines can access the server since their IPs are whitelisted in the
first rule.
o Stateful filtering firewalls, OSI Layer 1-4.
▪ Records all connections passing through and
determines whether a packet is the start of a
new connection, a part of an existing
connection, or not part of any connection.
▪ Static rules are still used; these rules can now
contain connection state as one of their
criteria.
▪ Some DOS attacks bombard the firewall with
thousands of fake connection packets trying to
overwhelm the firewall by filling its connection
state memory.
37 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Network firewalls filter traffic between two or more networks, either software appliances
running on general purpose hardware, or hardware-based firewall.
o Host-based firewalls provide a layer of software security on one host that controls
network traffic in and out of that single machine.
o Next-generation firewall (NGFW)
▪ NGFW combines traditional firewall technologies with deep packet inspection
(DPI) and network security systems (IDS/IPS, malware filtering and antivirus).
▪ Packet inspection in traditional firewalls only looks at the protocol header of the
packet DPI also looks at the actual data the packet is carrying.
▪ Next-generation firewalls tries to include more layers of the OSI model, improving
filtering of network traffic that is dependent on the packet contents.
▪ DPI firewalls track the progress of web browsing sessions and can tell if a packet
payload, when assembled with other packets in an HTTP server reply, is actually a
legitimate HTML-formatted response.
● Firewalls Design:
o A bastion host is a special purpose host designed and configured to withstand attacks.
▪ Normally hosts a single application, all other services are
removed or limited to reduce the threat to the host.
▪ It is hardened in this manner because of its location and
purpose, which is either on the outside of a firewall or in a
DMZ (demilitarized zone) and usually involves access from
untrusted networks or computers.
o A dual-homed host has two network interfaces, one connected to
a trusted network, and the other connected to an untrusted
network (Internet).
▪ The dual-homed host doesn't route.
▪ Any user wanting to access the trusted network from the
outside, needs to log into the dual-homed host and then
access the trusted network from there.
▪ No longer really used, mostly used premodern firewalls.
o Screened host architecture:
▪ An older flat network design using one router to filter external traffic to and from
a bastion host via ACLs.
▪ The bastion host can reach other internal resources, but
the router's ACL denies direct internal/external
connectivity.
▪ The difference between dual-homed host and screened
host design is screened host uses a screening router,
which filters Internet traffic to other internal systems.
▪ Screened host network design does not use defense-in-
depth: a failure of the bastion host puts the entire
trusted network at risk.
▪ Screened subnet architecture evolved as a result, using
network defense in depth by using DMZs.
38 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
39 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Just like firewalls, routers, servers, switches, and everything else in our environment they
just see part of the larger picture, for full picture views and data correlation we use a SIEM
(Security Information and Event Management) system or even better a SOAR (Security
Orchestration, Automation, and Response) system.
● IDS/IPS:
o Part of our layered defense.
o Basically, they are packet sniffers with analysis engines.
● Signature-based:
o Looks for known malware signatures.
o Faster since they just check traffic against malicious signatures.
o Easier to set up and manage, someone else does the signatures for us.
o They are completely vulnerable to 0-day attacks and have to be updated constantly to
keep up with new vulnerability patterns.
40 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Heuristic-based (Behavioral):
o Looks for abnormal behavior - can produce a lot of false positives.
o We build a baseline of what normal network traffic looks like and all traffic is matched to
that baseline.
o Traffic not matching the baseline is handled depending on settings, they can take a lot of
tweaking.
o Can detect 'out of the ordinary' activity, not just attacks.
o Takes much more work and skills.
● Hybrid based systems combining both are more used now and check for both signatures and
abnormalities.
● Intrusion Events and Masking:
o IDS/IPS obviously then prompt attackers to develop attacks that try to avoid detection.
▪ Fragmentation: Sending fragmented packets, the attack can avoid the detection
system's ability to detect the attack signature.
▪ Avoiding Defaults: The TCP port utilized by a protocol does not always provide an
indication to the protocol which is being transported. Attackers can send malware
over an unexpected port.
▪ Low-Bandwidth Coordinated Attacks: A number of attackers (or agents) allocate
different ports or hosts to different attackers making it difficult for the IDS to
correlate the captured packets and deduce that a network scan is in progress.
▪ Address spoofing/proxying: attackers can use poorly secured or incorrectly
configured proxy servers to bounce an attack. If the source is spoofed and
bounced by a server then it makes it very difficult for IDS to detect the origin of
the attack.
▪ Pattern Change Evasion: The attacker changes the data used slightly, which may
avoid detection.
41 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
Secure Communications
● Securing our data-in-motion is one of the most difficult tasks we have.
● The internet and IPv4 was never built to be secure and just like anywhere else we need to find the
right balance of Confidentiality, Integrity, and Availability.
● Authentication Protocols:
o Communications or cryptographic protocols designed to transfer authentication data
between two entities.
o They authenticate to the connecting entity (often a server) as well as authenticate
themselves (often a server or desktop) by declaring the type of information needed for
authentication as well as syntax.
o It is the most important layer of protection needed for secure communication between
networks.
o PAP (Password Authentication Protocol):
▪ Authentication is initialized by the client/user by sending a packet with credentials
(username and password) at the beginning of the connection.
▪ One of the oldest authentication protocols, no longer secure. The credentials are
being transmitted over the network in plain text making it vulnerable to simple
attacks like Eavesdropping and man-in-the-middle attacks.
42 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o EAP-MD5:
▪ Very weak forms of EAP. It offers client-to-server authentication only, where most
others provide mutual authentication.
▪ Vulnerable to man in the middle attacks and password attacks.
o LEAP (Lightweight Extensible Authentication Protocol):
▪ Cisco distributed the protocol through the CCX (Cisco Certified Extensions) as part
of getting 802.1X and dynamic WEP adoption into the industry in the absence of a
standard.
▪ No native support of LEAP in the Windows OS.
o EAP-TLS (EAP-Transport Layer Security):
▪ Uses PKI, requiring both server and client-side certificates.
▪ Establishes a secure TLS tunnel used for authentication.
▪ This makes it very secure, but also complex and expensive.
o EAP-TTLS (EAP Tunneled Transport Layer Security):
▪ Simpler than EAP-TLS by dropping the client-side certificate requirement, allowing
other authentication methods for client-side authentication.
▪ This makes it easier to deploy, but also less secure.
o PANA (Protocol for Carrying Authentication for Network Access):
▪ Allows a device to authenticate itself with a network to be granted access.
▪ EAP will be used for authentication protocol, key distribution, key agreement, and
key derivation protocols.
o SLIP (Serial Line Internet Protocol):
▪ An encapsulation of IP designed to work over serial ports and modem
connections.
▪ On PCs it has been replaced by PPP, which is better engineered, has more
features, and does not require its IP address configuration to be set before it is
established.
▪ On microcontrollers, SLIP is still the preferred way of encapsulating IP packets
because of the very small overhead.
o PPP (Point-to-Point Protocol):
▪ Used over many types of physical networks including serial cable, phone line,
trunk line, cellular telephone, ...
▪ PPP is also used over Internet access connections.
43 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
▪ ISPs (Internet Service Providers) have used PPP for customer dial-up access to the
Internet, since IP packets cannot be transmitted over a modem line on their own,
without some data link protocol.
o VPN (Virtual Private Network):
▪ Extends a private network across a public network, and
users can send and receive data across shared or public
networks as if they were on the private network.
▪ VPNs may allow employees and satellite offices to
securely access the organization's intranet.
▪ They are used to securely connect.
▪ Can also be used to get around geo-restrictions and
censorship, or to connect to proxy servers for the
purpose of protecting personal identity and location.
▪ Created by establishing a virtual point-to-point
connection using dedicated connections, virtual tunneling
protocols, or traffic encryption.
o PPTP (Point-to-Point Tunneling Protocol):
▪ Obsolete method for implementing virtual private networks because of many
known security issues.
▪ PPTP uses a TCP control channel and a GRE tunnel to encapsulate PPP packets.
▪ No built-in encryption or authentication and PPP being tunneled to implement
security.
o L2TP (Layer 2 Tunneling Protocol):
▪ Tunneling protocol used to support VPNs or as part of the delivery of services by
ISPs.
▪ No built-in encryption or confidentiality, it relies on an encryption protocol that it
passes within the tunnel to provide privacy.
44 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Wi-Fi Attacks:
o Rogue Access Points:
▪ An unauthorized access point that has been added to our
network without our knowledge.
▪ This can be malicious by an attacker or just an employee
wanting Wi-Fi somewhere with bad coverage.
▪ Without our security posture they are a very big concern.
▪ Can be somewhat mitigated with Port security on the switches,
and by scanning for Rogue access points.
▪ Can compromise confidentiality and integrity.
o Jamming/Interference:
▪ This can be a lot of traffic on the Wi-Fi frequencies or done
by attackers to disrupt our network (DOS).
▪ If interference is an issue we can change to other channels, if
any less crowded channels are available, or to different
frequencies if our equipment supports it.
▪ The 2.4 GHz band is used by Bluetooth, microwaves, cordless
phones, baby monitors, Wi-Fi, …
▪ Can compromise integrity and availability.
o Evil Twin:
▪ An evil twin is used when attackers are trying to create rogue
access points so as to gain access to the network or access to
information that is being put through a network.
▪ Can be done on your network or not, the attacker simply
names their access point the same as ours, but with no
security and user devices automatically connect to them.
▪ Can compromise confidentiality and integrity.
● 802.11 Standards:
o The 802.11 is a set of media
access control (MAC) and
physical layer (PHY)
specifications for
implementing WLAN
computer communication in
the 2.4, 3.7, 5, and 6 GHz
frequency bands.
o There are more 802.11
protocols but for the exam
know these.
45 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o The 2.4 GHz frequency can be very crowded, wireless, Bluetooth, microwaves, cordless
phones, and baby monitors, ... use that frequency.
o The 5 GHz frequency is normally less crowded and has less
interference than 2.4 GHz.
o Now with the 6 GHz being available, one of its largest selling points is a
completely non-crowded frequency.
o 5 and 6 GHz is a higher frequency with shorter waves, it does not
penetrate walls, floors, and other obstructions as well as the longer 2.4
GHz waves.
o It is easy to change the channel of your Wi-Fi to a less crowded one.
o Some access points management software can dynamically change the
channels on individual access points, to find better channels and
provide less overlap.
● SS (Service Set) is a set consisting of all the devices associated with an organization's WLAN
(Wireless Local Area Network).
46 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● SSID (Service Set Identifier) is the name of the wireless access point you see
when you connect.
o Clients must know the SSID before joining that WLAN.
o The SSID is a configuration parameter.
o SSIDs are normally broadcasted, but we can disable the broadcast in
the access point configuration.
o It is a security measure we want to use, but it is easy to bypass.
o We can also use MAC address filtering on our wireless access points,
this is another limited security feature.
o MAC addresses are sent in plaintext on 802.11 WLANs, it is easy to sniff and spoof.
● WEP (Wired Equivalent Privacy) protocol, early 802.11 wireless security (1997).
o No longer secure, should not be used.
o Attackers can break any WEP key in a few minutes.
o It was designed to not conflict with the Wassenaar Arrangement’s 40-bit limit on
encryption and because of that, it was designed weaker than it should have been.
o Many access points still have the WEP option today, but most are preconfigured with
WPA2/PSK.
o WEP uses 10 or 26 hexadecimal digits (40 or 104 bits).
o It was years back used widely and was often the first security choice presented to users by
router configuration tools.
o WEP frames do not use timestamps and have no replay protection; attackers can inject
traffic by replaying previously sniffed WEP frames.
● WPA2 (Wi-Fi Protected Access II), also called RSN (Robust Security Network) (2004):
o Most commonly used but a slow move towards WPA3; the most secure form of WPA2 is
WPA2-PSK (Pre-Shared Key) using AES.
o AES provides confidentiality and CCMP (Counter Mode CBC MAC Protocol), a Message
Integrity Check (MIC), which provides integrity. It can be configured to use older less
secure protocols (TKIP)
47 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Bluetooth:
o A wireless technology standard for exchanging data over short
distances using 2.4 GHz from fixed and mobile devices and building
personal area networks (PANs).
o Bluetooth has three classes of devices, while designed for short-
distance networking, Class 1 can reach up to 100 meters.
o Class 1: 100 meters, 2: 10 meters, 3: under 10 meters.
o Bluetooth implements confidentiality, authentication and key
derivation with custom algorithms based on the SAFER+ block cipher.
o The E0 stream cipher is used for encrypting packets, granting
confidentiality, and is based on a shared cryptographic secret, namely
a previously generated link key or master key.
o Cryptanalysis of E0 has proven it to be weak, attacks show the true strength to be 38 bits
or even less.
o Bluetooth key generation is generally based on a Bluetooth PIN, which must be entered
on one or both devices.
o Bluetooth security is to some extent security through obscurity, it assumes the 48-bit MAC
address of the Bluetooth adapter is not known.
o Even when disabled, Bluetooth devices may be discovered by guessing the MAC address.
o The first 24 bits are the OUI, which can be easily guessed, the last 24 bits can be
discovered with brute-force attacks.
o Attacks:
▪ Bluejacking: Sending unsolicited messages over Bluetooth, most often harmless
but annoying.
▪ Bluesnarfing: Unauthorized access of information from a Bluetooth device
phones, desktops, laptops, ...
▪ Bluebugging: The attacker gains total access and control of your device; it can
happen when your device is left in the discoverable state.
▪ Only possible on older phones with outdated OSs, newer smartphones constantly
update their OS.
o Countermeasures:
▪ Enable Bluetooth only when you need it.
▪ Enable Bluetooth discovery only when necessary and disable discovery when your
devices are paired.
▪ Do not enter link keys or PINs when unexpectedly prompted to do so.
▪ Remove paired devices when you do not use them.
▪ Regularly update firmware on all Bluetooth enabled devices.
48 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Honeynets:
▪ A network (real or simulated) of honeypots, can be a full
server farm simulated with applications, OSs, and fake data.
▪ Best practice segments the honeynet from our actual network
by a DMZ/firewall.
▪ The SIEM/SOAR systems collect the data from our internal
systems as well as the honeynet.
Secure Communications
● IPSEC (Internet Protocol Security):
o SA (Security Association): Simplex one-way communication, can be used to negotiate ESP
(Encapsulation Security Payload) or AH (Authentication Header) parameters.
▪ If 2 systems use ESP to communicate, they need 1 SA for each direction (2 total); if
AH and ESP, 4 total.
▪ A unique 32bit SPI (Security Parameter Index) is used to identify each SA
connection.
o ISAKMP (Internet Security and Key Management Protocol):
▪ Manages the SA creation process.
o Tunnel mode encrypts and authenticates the entire package (including headers).
o Transport mode only encrypts and authenticates the payload, used for systems that speak
IPSEC.
49 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
50 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Caller ID does the same, but the user has to be calling from the right number.
o It can easily be faked; many phones or phone companies allow the end user to pick their
caller ID.
● Remote Administration is controlling a computer from a remote location, we do this through
software.
o A remote location may refer to a computer in the next room or to one across the world.
o Any computer with an Internet connection can be remotely administered.
● RDP (Remote Desktop Protocol) - A Microsoft proprietary protocol.
o The user uses RDP client software for this, and the other computer must run RDP server
software.
o Providing a user with a GUI (Graphical User Interface) by default, the server listens on TCP
and UDP 3389.
● VNC (Virtual Network Computing) - Non-MS proprietary and can run on most OSs (Using screen
scraping).
o It was at first used for remote administration of computers but is also being used more
and more now for Remote Desktop Protocol for multi-user environments and helpdesk
RDP access.
● Newer versions use HTTPS (TCP port 443) and has the GUI contained in a browser.
o You install the software on the system you want to access and the one you want to access
from, set up username/password and you can control that system from anywhere.
o Commonly used include: Chrome Remote Desktop, LogMeIn, GoToMyPC, support.me, …
● VDI (Virtualized Desktop Infrastructure/Interface):
o Thin Clients:
▪ Diskless Workstation (Diskless node) has all the normal hardware/firmware except
the disk, it has the lower-level OS (the BIOS) which performs the POST, and it then
downloads the kernel and OS.
▪ Thin Client Applications - We use a Web Browser to connect to the application on
a server on port 80 (HTTP) or port 443 (HTTPS), the full application is housed and
executed on the server vs. on your PC.
▪ Often stripped of non-essentials like CD drives, most ports, ...
o Zero Clients:
▪ Getting more popular for VDI because they are even slimmer and more cost-
effective than thin clients.
▪ These are client devices that require no configuration and have nothing stored on
them.
▪ They are sold by Dell, Fujitsu, HP, Pano Logic, ...
● IM (Instant Messaging):
o Short messages are typically sent between two parties (one-to-one) or many to many
(group IMs).
o Some IM applications can use push technology to provide real-time text which transmits
messages character by character as they are typed, others send when you hit enter.
o More advanced instant messaging can add file transfer, clickable hyperlinks, Voice over IP,
and video chat.
51 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Commonly used chat protocols today include IRC, Jabber, Lync, and still used but very
limited ICQ and AIM.
o Today most IM’ing is done embedded in other applications like Facebook, LinkedIn,
Twitter, or WhatsApp.
o Many IM applications and protocols are not designed with security in mind, they are
designed for usability.
▪ A report on the level of safety offered by instant messengers, only 2 out of 18
instant IM apps they looked got “nothing of concern” on sending sensitive
attachments and mining/selling customer data, the rest got “not recommended”.
The most popular messenger has 25 “not recommended” and only 6 “nothing of
concern” when looking at privacy and security
▪ IM connections are often sent in plain text, making them vulnerable to
eavesdropping.
▪ Software often requires the user to open UDP ports, increasing the threat posed
by potential security vulnerabilities.
● Web Conferencing:
o An umbrella term for different types of online collaborative services including webinars,
webcasts, and peer-level web meetings.
o Commonly used ones are WebEx, Zoom, GoToMeeting, Google Meet, TeamViewer, ...
o Done over TCP/IP connections, services often use real-time point-to-point
communications as well as multicast communications from one sender to many receivers.
o It offers data streams of text-based messages, voice, and video chat to be shared
simultaneously across geographically dispersed locations.
o Applications where web conferencing is used: Meetings, training events, lectures, or
presentations one-to-one or many-to-many like IMs.
o The use of web conferencing should align with your organizations policies, some may, if
not implemented right be a security vulnerability.
o They can bypass some security by using SSL/TLS tunnels and acceptable products should
be hardened.
● CDN (Content Distribution Network):
o A geographically dispersed network of proxy servers and data centers.
o The client is sent to the server node with the lowest latency in MS.
o The client's webpages, software download, and video streaming are
faster.
o The provider saves on cost, sending traffic short distances vs. long
distance and it provides redundancy and some DDOS protection.
o The idea is to distribute service spatially relative to end-users to
provide high availability and high performance.
o Many different services can be provided over CDNs: video streaming,
software downloads, web, and mobile content acceleration,
licensed/managed CDN, transparent caching, and services to measure
CDN performance, load balancing, multi-CDN switching and analytics,
and cloud intelligence.
● Third-party Connectivity:
52 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Medium size enterprises typically have 20 or more third-party providers. I believe the
hospital where I worked in Hawaii had more than 200 third-party providers.
o How do we ensure they are secure enough and conform to our policies and procedures?
o Many never have direct contact with IT or IT-Security.
o We must conduct a thorough risk assessment to ensure that whatever they provide does
not jeopardize our security posture, or we must accept the risk.
o We should have MOUs/MOAs and ISAs (Interconnection Security Agreement).
● Network Access Control (NAC):
o Automatic detection and response to ensure our systems are in adherence with our
security policies.
o Can helps us with the prevention or reduction of 0-day and known attacks.
o Along with ensuring that security policies are adhered to at all times.
Mobile Security
● The more external devices we connect, the more complex policies, procedures, and standards we
need.
● Mobile devices are really anything “mobile” – External hard disks, USB drives, CDs, laptops, cell
phones, ...
● Most internal threats are not malicious people. They just do not know any better, did not think
about it or figured they would not get found out.
● Good security policies should lock down USB ports, CD drives, network ports, wireless networks,
disable autorun on media, use full disk encryption, have remote wipe capabilities, raise user
awareness training on where (if anywhere) mobile devices are allowed. (Defense in Depth)
● Cell phones are the mobile devices most often lost – Current Android and iOS phones all have full
disk encryption.
o We can add a lot more features to our company cell phones to make them more secure.
o Remote wipe, find my device, lock after x minutes, number of failed passwords, disable
removable storage, …
o We can also use a centralized management system: MDM (Mobile Device Management)
controls a lot of settings.
▪ App negative/positive list, Storage Segmentation, Remote Access Revocation,
Configuration Pushes, Backups.
▪ More controversial: Track the location of employees, monitor their data traffic
and calls.
o Laptops, Smartphones and Tablets are great productivity tools, but they (just like anything
else) have to be secured properly or they are a liability.
▪ BYOD (Bring Your Own Device) - There should be clear corporate
policies/procedures/guidelines.
▪ On/off boarding - How is the return of mobile devices handled and enforced?
▪ It is much harder to standardize on BYOD. Is support staff ready for that many
devices, OSs, applications?
▪ Should we use MDM?
▪ How do we handle patch and virus management?
53 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
54 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
55 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
As with any other outsourcing make sure you have the right to audit, pen test (clearly agreed upon
criteria), conduct vulnerability assessment, and check that the vendor is compliant with your
industry and the standards you adhere to.
● Grid Computing – can make use of resources not currently in use from 100 or 100,000's of
computers to perform very complex tasks.
o Each node has a smaller subtask but leveraging the entire Grid can make it be very
powerful and fast.
o Often used in problems so complex that they need that many nodes to be solved.
o BOINC (Berkeley Open Infrastructure for Network Computing) has over 4,000,000
machines enrolled, used for a wide variety of scientific research.
o Peer to Peer (P2P) - Any system can be a client and/or a server.
▪ Most commonly used on torrent networks to
share music, movies, programs, pictures and
more (The majority without the copyright
holder’s consent).
▪ Older versions had centralized index servers
making it easier to disrupt a sharing network,
but the current versions use no centralized
infrastructure.
▪ Each client is often also a server and has the
index. Taking down 10,000 in a network of
100,000 will just result in a network of 90,000,
with no other discernible impact.
● Thin Clients (Boot sequence - BIOS > POST > TCP/IP > BOOTP or DHCP)
o Diskless Workstation (Diskless node) has all the normal hardware/firmware except the
disk, and the low-level OS (BIOS), which performs the POST. It then downloads the kernel
and higher-level OS.
56 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Thin Client Applications - We use a Web Browser to connect to the application on a server
on port 80 (HTTP) or port 443 (HTTPS). The full application is housed and executed on the
server vs. on your PC.
● Distributed Systems:
o Can also be referred to as:
▪ Distributed computing environment (DCE), concurrent
computing, parallel computing, and distributed computing.
o A collection of individual systems that work together to support a
resource or provide a service.
o Most end-users see the DCE as a single entity and not as multiple
systems.
o Why do we use DCEs?
▪ They can give us horizontal scaling (size, geography, and
administration), modular growth, fault tolerance, cost-
effectiveness, low latency (users connect to the closest node).
o Where do we use DCEs?
▪ All over the place (The internet, websites, cell networks, research,
P2P networks, blockchain, …).
● High-Performance Computing (HPC) Systems:
o Most often aggregates of compute nodes in a system designed
to solve complex calculations or manipulate data at very high
speeds.
o HPCs have 3 components. Compute, network, and storage.
▪ All 3 must have enough resources to not become a
bottleneck.
o Most well-known versions are super computers.
● Edge Computing Systems:
o The processing of data is done as close as possible to where it
is needed, we do that by moving the data and compute
resources.
o This will optimize bandwidth use and lower latency.
o CDN’s are one of the most common types of edge computing.
o 80%+ of large enterprises have already implemented or are in
the process of implementing an edge computing strategy.
57 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o Buffer overflows can often be triggered by malformed inputs, if one assumes all inputs will
be smaller than a certain size and the buffer is created to be that size, if an anomalous
transaction produces more data, it could cause it to write past the end of the buffer.
o If this overwrites adjacent data or executable code, this may result in erratic program
behavior, including memory access errors, incorrect results, and crashes.
o By sending in data designed to cause a buffer overflow, it is possible to write into areas
known to hold executable code and replace it with malicious code.
● Race condition (race hazard):
o Two or more programs may collide in their attempts to modify or access a file.
o This can be an attacker with access, altering files which can then result in data corruption
or privilege escalation.
o TOCTOU (time of check to time of use):
▪ A software bug caused by changes in a system between the checking of a
condition (such as a security credential) and the use of the results of that check.
● Privilege escalation:
o Exploiting a bug, design flaw or configuration oversight in an OS or application to gain
access to resources that are normally protected from an application or user.
o Attacker often use this to elevate the user account they have gained access to, in order to
get administrator access.
o The result is that an application with more privileges than intended by the application
developer or system administrator can perform unauthorized actions.
● Backdoors:
o Often installed by attackers during an attack to allow them access to the systems after the
initial attack is over, to exfiltrating data over time or to come back and compromise other
systems.
o Bypassing normal authentication or encryption in a computer system, a product, or an
embedded device, ...
o Backdoors are often used for securing remote access to a computer or obtaining access to
plaintext in cryptographic systems.
● Ethical Disclosure:
o What do you do when you discover a vulnerability? we covered some of this in the white,
gray, black hat hacker section.
o Full disclosure: Tell everyone, make it public, assuming attackers already know and are
using it.
o Responsible/Partial disclosure: Telling the vendor, they have time to develop a patch and
then disclose it.
▪ If they do nothing, we can revert to the full disclosure forcing them to act.
o No disclosure: Attackers finding a vulnerability would try to exploit it and keep it secret as
long as possible.
58 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
59 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
o The term, runtime, is most often used in software development. Commonly used with
"runtime error," an error that occurs while a program is running. This error is used to
differentiate from other types of errors, like syntax errors and compilation errors, which
happen before a program is run.
60 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Zigbee:
o Mesh wireless network with low power, low data rate, and close proximity.
o Simple and less complex compared to other WPANs (Wireless Personal Area Networks)
such as Bluetooth or Wi-Fi.
o It has a range of 10 to 100 meters, but it requires line-of-sight. Data rates vary between 20
kbit/s (868 MHz band) and 250 kbit/s (2.4 GHz band).
61 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● Satellite:
o For many years, satellite internet was a relatively slow and
expensive option.
o You have a modem, as with any other internet connection, as well
as a satellite dish (2-3 ft. or 60-90 cm).
o Typical satellite connections have had a latency of 500 ms and
speeds ranging from 10 to 50 Mbps.
o Starlink is currently testing speeds ranging from 20-200 Mbps down
to 15-50 Mbps up, with latencies ranging from 15-40 ms.
Cellular Networks
● Cellular networks/mobile networks are communication networks where the last leg is wireless.
● The network is divided into cells and distributed across areas, with each cell containing at least
one fixed-location transceiver, if not more.
● These base stations provide network coverage to the cell, allowing it to transmit voice, data, and
other types of content.
● To avoid interference and provide guaranteed service quality within each cell, a cell typically uses
a different set of frequencies than neighboring cells.
● 3G:
o Bandwidth: 2 Mbps, latency: 100-500 ms, average speed 144 kbps.
● 4G:
o Bandwidth: 200 Mbps, latency: 20-30 ms, average speed 25 Mbps, 16km (10 miles).
● 5G:
o Bandwidth: 5-20 Gbps, latency: <10 ms, average speed 200-400 Mbps, 500m (1500 ft).
o High frequency, short-range, and can be blocked by anything metal and even just solid
objects.
o A lot more 5G towers are needed to get coverage.
62 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
● We identify all of our assets, identify the risks, then we assess the risks with qualitative and
quantitative risk analysis, we respond to the risk, mitigation, and then we monitor controls.
● We talked about attackers, and he attacks in OWASP top 10 (2021).
● We covered how we secure our communication, software, and systems, by securing our
networking, networking devices.
● Many networking basics like IP, NAT, PAT, protocols, hardware, and software, wireless and much
more from networking.
● Finally, we talked about what cloud computing is and what is our responsibility to secure and IOT.
● This should be what you are tested on for Domain 2 until the next planned CISM curriculum
change in 2027.
63 | Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 2
64 | Page
https://thorteaches.com/