Thor's+Study+Guide+ +CC+Domain+1
Thor's+Study+Guide+ +CC+Domain+1
Introduction to Domain 1
➢ Domain 1: What we will be covering.
This chapter is VERY important because:
▪ Every other knowledge domain build on top of this chapter.
▪ This is the foundation.
We will cover:
▪ The differences between Information security, IT Security, and Cybersecurity.
▪ The CIA triad and IAAA.
▪ Privacy.
▪ Risk and incident management.
▪ Access control.
▪ Governance, management, laws, and regulations.
▪ The ISC2 ethics.
2|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
▪ Threats:
Malicious attacks (DDOS, physical, system compromise, staff).
Application failures (errors in the code).
Component failure (Hardware).
3|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
4|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
⬧ Passwords:
▫ It is always easier to guess or steal passwords than it is to break
the encryption.
▫ We have password policies to ensure they are as secure as
possible.
→ They should contain minimum length, upper/lower case
letters, numbers, and symbols, they should not contain
full words or other easy to guess phrases.
→ They have an expiration date, password reuse policy
and minimum use before users can change it again.
→ Common and less secure passwords often contain:
• The name of a pet, child, family member,
significant other, anniversary dates, birthdays,
birthplace, favorite holiday, something related
to a favorite sports team, or the word
"password".
• Winter2023 is not a good password, even if it
does fulfil the password requirements.
▫ Key Stretching – Adding 1-2 seconds to password verification.
▫ If an attacker is brute forcing a password and needs millions of
tries it will become an unfeasible attack.
▫ Brute Force Attacks (Limit number of wrong logins):
▫ Uses the entire key space (every possible key), with enough
time any ciphertext can be decrypted.
▫ Effective against all key based ciphers except the one-time pad,
it would eventually decrypt it, but it would also generate so
many false positives the data would be useless.
▫ Clipping Levels: Clipping levels are in place to prevent
administrative overhead.
→ It allows authorized users who forget or mistype their
password to still have a couple of extra tries.
→ It prevents password guessing by locking the user
account for a certain timeframe (an hour), or until
unlocked by an administrator.
⬧ Password Management:
▫ We covered some password requirements, here are the official
recommendations by the U.S. Department of Defense and
Microsoft.
5|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
6|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
7|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
8|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
Authorization
▪ What are you allowed to access?
▪ We use Access Control models. What and
how we implement depends on the
organization and what our security goals
are.
▪ More on this in later when we cover DAC,
MAC, RBAC, ABAC, and RUBAC.
9|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
⬧ A role is assigned permissions, and subjects in that role are added to the
group, if they move to another position they are moved to the
permissions group for that position.
⬧ It makes administration of 1,000's of users and 10,000's of permissions
much easier to manage.
⬧ The most commonly used form of access control.
⬧ If implemented right, it can also enforce separation of duties and
prevent authorization/privilege creep.
▫ We move employees transferring within the organization from
one role to another and we do not just add the new role to the
old one.
10 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
11 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
▪ Non-repudiation.
A user cannot deny having performed a
certain action. This uses both
Authentication and Integrity.
▪ Subject and Object.
Subject – (Active) Most often users but
can also be programs – Subject
manipulates Object.
Object – (Passive) Any passive data (both
physical paper and data) – Object is
manipulated by Subject.
Some can be both at different times, an
active program is a subject; when closed,
the data in program can be object.
Privacy
• Privacy is a human right.
▪ A definition of Privacy:
1. The state or condition of being free from being observed or disturbed by
other people.
2. Freedom from unauthorized intrusion.
• You as a citizen and consumer have the right that your Personally Identifiable
Information (PII) is being kept securely.
• US privacy regulation is a patchwork of laws, some overlapping and some areas with no
real protection.
• EU Law – Strict protection on what is gathered, how it is used and stored.
Risk Management
Risk Management - Identification:
Risk = Threat * Vulnerability (or likelihood).
We can also use Risk = Threat * Vulnerability *
Impact.
12 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
Risk Assessment.
▪ Quantitative and Qualitative Risk
Analysis.
▪ Uncertainty analysis.
▪ Everything is done using cost-benefit
analysis.
▪ Risk Mitigation/Risk Transference/Risk
Acceptance/Risk Avoidance.
▪ Risk Rejection is NEVER acceptable.
▪ We assess the current countermeasures.
Are they good enough?
Do we need to improve on them?
Do we need to implement
entirely new countermeasures?
13 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
▪ Let’s say it is likely and a minor issue, that puts the loss the high-risk category.
▪ It is normal to move high and extreme on the quantitative risk analysis. If
mitigation is implemented, we can maybe move the risk level to “Low” or
“Medium”.
▪ A risk category to group similar risks.
▪ The risk breakdown structure identification number.
▪ A brief description or name of the risk to make the risk easy to discuss.
▪ The impact (or consequence) if event actually
occurs rated on an integer scale.
▪ The probability or likelihood of
its occurrence rated
on an integer scale.
▪ The Risk Score (or Risk Rating)
is the multiplication
of Probability and Impact, and
is often used to rank
the risks.
▪ Common mitigation steps (e.g.
within IT projects)
Identify
Analyze
Plan Response
Monitor
Control
14 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
15 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
16 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
17 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
18 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
19 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
• GDPR
▪ GDPR is a regulation in EU law on data protection and privacy for all individuals
within the European Union (EU) and the European Economic Area (EEA).
▪ It does not matter where we are based, if we have customers in EU/EEA we
have to adhere to the GDPR.
▪ Violators of the GDPR may be fined up to €20 million or up to 4% of the annual
worldwide turnover of the preceding financial year in case of an enterprise,
whichever is greater.
▪ Restrictions: Lawful Interception, national security, military, police, justice
system
▪ Right to access: Data controllers must be able to provide a free copy of an
individual’s data if requested.
▪ Personal data: Covers a variety of data types including: Names, Email
Addresses, Addresses, Unsubscribe confirmation URLs that contain email and/or
names, IP Addresses.
▪ Right to erasure: All users have a “right to be forgotten”.
▪ Data portability: All users will be able to request access to their data “in an
electronic format”.
▪ Data breach notification: Users and data controllers must be notified of data
breaches within 72 hours.
▪ Privacy by design: When designing data processes, care must be taken to
ensure personal data is secure. Companies must ensure that only data is
“absolutely necessary for the completion of duties”.
▪ Data protection officers: Companies whose activities involve data processing
and monitoring must appoint a data protection officer.
20 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
▪ Policies – Mandatory.
High level, non-specific.
They can contain “Patches, updates, strong
encryption”
They will not be specific to “OS, encryption
type, vendor Technology”
▪ Standards – Mandatory.
Describes a specific use of technology (All
laptops are W10, 64bit, 8gig memory,
etc.)
▪ Guidelines – non-Mandatory.
Recommendations, discretionary –
Suggestions on how you would do it.
▪ Procedures – Mandatory.
Low level step-by-step guides,
specific.
They will contain “OS,
encryption type, vendor
Technology”
21 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 1
We talked about:
▪ The differences between Information Security, IT Security, and Cybersecurity.
▪ The CIA triad and IAAA.
▪ Privacy.
▪ Risk and incident management.
▪ Access control.
▪ The ISC2 ethics.
▪ Governance, management, laws, and regulations.
22 | P a g e
https://thorteaches.com/