Domain 4 - CISA
Domain 4 - CISA
407
BEFORE STARTING
408
409
CISA CERTIFICATION
Certified Information System Auditor - CISA
CISA is a certificate by ISACA by ISACA - Information Systems Audit and Control Association®
Information system Auditing, not just IT!
This training is based on Review manual of ISACA
Pass the exam, 150 questions in 4 Hours,
Exam cost is 760 US $ for ISACA non-members
Membership is an annual fees you pay
Submit application post the exam, attest it and pay processing fees
If you meet the criteria's you will be certified
410
Domain 4 : IS
Domain 5 : Protection
Operations and
of Information Assets
Business Resilience
(27%)
(23%)
411
Certified
Information
System Auditor
DOMAIN 4
412
Information Systems
Operations and Business
Resilience
DOMAIN 4
413
About Domain 4
Domain 4 represents 23% of the questions on the CISA exam
(approximately 30 questions).
Content
1. Information System operations
2. Information System maintenance
3. Service management
4. Business continuity
414
Information Systems
management
415
INFORMATION SYSTEM
MANAGEMENT
Responsible for ongoing support for an organizations computer and IS
environment
plays a critical role in ensuring that computer operations processing
requirements are met, end users are satisfied, and information is processed
securely
Management plans, builds, runs and monitors activities in alignment with the
direction set by the governance body to achieve the enterprise objectives
Management is the responsibility of the executive management under the
leadership of the chief executive officer (CEO).
IS management has the overall responsibility for all operations within the IT
department
416
IS MANAGEMENT OBJECTIVES
The key function for IS operation is to ensure:-
✓Computer processing requirements are met
✓End users are satisfied
✓Information is processed securely
✓Outside parties (third parties, cloud computing) meet the company’s
processing requirements
417
IS GOVERNANCE
Ensures that stakeholder needs, conditions and options are evaluated to
determine balanced, agreed-on enterprise objectives to be achieved;
Setting direction through prioritization and decision making; and monitoring
performance and compliance against agreed-on direction and objectives.
Overall governance is the responsibility of the board of directors under the
leadership of the chairperson.
Specific governance responsibilities may be delegated to special organizational
structures at an appropriate level, particularly in larger, complex enterprises.
418
419
Service level agreement
420
421
Operational level agreement
OLA is an agreement between the internal support groups of an institution that
supports SLA
The OLA clearly depicts the performance and relationship of the internal service
groups.
The main objective of OLA is to ensure that all the support groups provide the
intended Service Level Agreement
422
423
Asset management
424
IT Asset Management
Assets could be systems, data or networking components, software licenses or source code
Assets should be monitored and controlled
You cannot protect what you do not know
Asset inventory should be available and clearly define
✓ Asset Owner (ultimate accountability)
✓ Asset Custodian (responsible for operation, security, data entry)
✓Asset identification and purpose
✓Location
✓Security classification from Risk PoV
✓Asset criticality level from Business PoV
✓Network information such as IP, Rack number and shelf where the device is mounted.
425
itam
Inventory Management: ITAM involves creating an inventory of all IT assets within an
organization, including hardware, software, licenses, and related data.
Asset Tracking: ITAM involves tracking the movement and location of IT assets
throughout their lifecycle, including when they are acquired, deployed, maintained,
and retired.
License Management: ITAM involves managing software licenses to ensure
compliance with licensing agreements and avoid potential legal and financial risks.
Maintenance and Support: ITAM involves managing maintenance and support
contracts for IT assets to ensure they are up-to-date and functioning correctly.
Security Management: ITAM involves managing the security of IT assets, including
protecting them from cyber threats, ensuring compliance with security policies, and
monitoring usage patterns to identify potential security risks.
426
Euc or shadow it
427
End User Computing
End user computing or shadow IT is the ability of end-user to design and implement their own
information system utilizing computer software products
Example is to use the Microsoft Access to build their own DB on device belong to company
End user computing should be governed by documented EUC/IT AUP policy.
EUC lead to following issues
Approved
Improperly Lack of No backed Not properly software list
No patch
configured information up on monitored to not
management
in term of control and regular identify consistent
enforced
security inventory interval threats with what
really exist
428
Shadow it risks
Security Risks: The use of unapproved technology solutions can increase the risk
of security breaches and data loss, as they may not be subject to the same
security controls and policies as approved solutions.
Compliance Risks: Shadow IT can also create compliance risks, as the use of
unapproved solutions may not comply with regulatory requirements or internal
policies.
Integration Challenges: Shadow IT can create challenges for IT departments in
integrating and managing disparate systems and applications, leading to
inefficiencies and potential data silos.
Cost Implications: Shadow IT can result in redundant technology solutions and
unnecessary expenses, as well as increased support and maintenance costs.
429
Controlling shadow it
Establishing IT Policies: Organizations can establish clear policies and procedures for
the procurement and use of technology solutions, including guidelines for approving
and supporting new solutions.
Educating Employees: Organizations can educate employees on the risks and
implications of shadow IT, and encourage them to work with IT to identify and address
their technology needs.
Monitoring and Auditing: Organizations can monitor and audit their technology
environment to identify and address instances of shadow IT.
Providing Approved Alternatives: Organizations can provide approved technology
solutions that meet employees' needs, reducing the likelihood of them turning to
unapproved solutions.
430
431
Job Scheduling
In large environments, automation is not an option
Job scheduling or scheduled tasks can be utilized to perform repetitive and routine
tasks, the feature which is included in OS and Applications
In Linux, scheduling can be achieved using Cron
By auto scheduling, we can reduce the probability of error, this contribute to creating
more secure environment
Audit trails should be kept for scheduled tasks
Authorization should be considered for scheduled tasks
Processing priority for scheduled tasks need to be known
Scheduled tasks should be documented, and reviewed periodically
A mechanism should be in place in order to get notified with failed tasks
432
433
Robotic process automation - rpa
Robotic Process Automation (RPA) is a technology that allows organizations to
automate repetitive and rule-based tasks using software robots or bots.
RPA bots mimic human actions and interact with applications, databases, and
other systems to perform tasks such as data entry, data processing, and report
generation.
RPA adoption involve Bot development, Bot deployment, Bot Management, Bot
Integration
RPA led to improved efficiency, scalability, cost saving and improved
compliance by avoiding the risk of human error.
434
435
Devops
436
What is devops
DevOps is a cultural shift
The term "DevOps" combines the words "development" and "operations."
Set of practices that automate the software delivery process and bring together
development, testing, deployment, and operations teams into a single, cohesive
workflow.
DevOps aims to break down the traditional silos between these teams and foster a
culture of collaboration, communication, and continuous improvement.
Key principles are
◦ Automation
◦ Continues Integration and Delivery
◦ Collaboration
◦ Infrastructure as a code
◦ Monitoring and feedback
437
Devops tools
Version control tools Continuous Integration and Configuration management Containerization tools
•Git Continuous Deployment tools •Docker
(CI/CD) tools •Ansible
•Subversion •Kubernetes
•CVS •Jenkins •Puppet •OpenShift
•CircleCI •Chef
•Travis CI •SaltStack
Infrastructure as Code (IaC) Monitoring and logging tools Collaboration and Testing tools
tools •Prometheus communication tools •Selenium
•Terraform •Grafana •Jira •JUnit
•CloudFormation •ELK stack (Elasticsearch •Trello •NUnit
•Azure Resource Manager •Logstash •Slack •Robot Framework
438
devsecops
439
What is devops
integrates security practices and principles into the DevOps process. The term
"DevSecOps" combines the words "development," "security," and "operations.“
aims to ensure that security is built into the software development process from the
start, rather than being added as an afterthought.
By integrating security into the DevOps process, organizations can increase the speed
and quality of software delivery while also reducing the risk of security vulnerabilities
and breaches.
Key principles are
◦ Security as a code
◦ Shift left
◦ Continues security testing
◦ Collaboration and communication
◦ Automation
440
Static Application Security Dynamic Application Container Security tools Infrastructure Security tools
Testing (SAST) tools Security Testing (DAST) •Aqua Security •HashiCorp Vault
•SonarQube tools
•Twistlock •CyberArk
•Checkmarx •OWASP ZAP •Sysdig Secure •AWS Secrets Manager
•Fortify Static Code •Burp Suite •Anchore
Analyzer •Qualys Web Application
Scanning
Vulnerability Scanning tools: Security Information and Compliance and Governance Identity and Access
•Tenable.io Event Management (SIEM) tools Management (IAM) tool
tools •Chef Compliance •Okta
•Qualys
•Rapid7 InsightVM •Splunk •Puppet Remediate •Ping Identity
•Elastic Stack •Auth0
•QRadar
441
INCIDENT MANAGEMENT
442
INCIDENT MANAGEMENT
An Incident is an event that could lead to loss of, or disruption to, an organization’s
operations, services or functions.
Incident management is a term describing the activities of an organization to identify,
analyze, and correct hazards to prevent a future re-occurrence.
Incident management is reactive and its objective is to respond to and resolve issues
restoring normal service (as defined by the SLA) as quickly as possible.
Prioritization of incident should be based on urgency and impact
Incident management focuses on providing continuity of service through the removal
or reduction of the adverse effect of disruptions to IT services.
Part of Risk Management, It is a corrective control
443
Types of incidents
On term of priority, incident could be
◦ Negligible — causing no perceptible damage
◦ Minor — producing no negative financial or material impact
◦ Major — causing a negative material impact on business processes; possible effects on other systems,
departments or outside stakeholders
◦ Crisis — resulting in serious material impact on the continued functioning of the enterprise and its
stakeholders
Incident sources
Malicious code
attacks
Unauthorized
Hoaxes/social
access to IT or
engineering
information sources
Unauthorized use
Surveillance and
of services or
espionage
physical threats
Unauthorized
changes to systems,
DoS/DDoS attacks
network devices or
information 445
Team formation
Incident management team and incident response team should be formed with clear roles
and responsibilities
Incident Management team (IMT), Incident Response team (IRT)
IMT team play more strategic role in developing IRP and process, while IMT deal with actual
incident
IRT can be Centralized, Distributed, Coordinating or outsourced
The IRT team could include people with no technical roles “HR, PR, Legal”
The IRT members need to have baseline of knowledge regarding security principals and key
concepts
IRT benefit from personal and communication skills such as reporting, communication,
leadership and problem solving and time management
Training plans should be developed and make sure knowledge is shared as turnover is an
enemy for IRT skills.
446
447
Incident management workflow
448
449
Write protection tools
450
451
INCIDENT RESPONSE PLAN TESTING
Testing help in identifying gaps and validate timelines, and evaluate the overall
performance and confirm the currency of the information and assumptions
Testing should be performed on regular intervals “ at least annualy”
Having plan is different that ensuring plan is working
452
Structured walkthrough
◦ Team members physically implement that plans on paper and review each step.
Simulation test
◦ The IRT role-plays a prepared disaster scenarios without activating the recovery site.
Operational tests are more like simulation, but when it is unannounced, this is a different
story ..
◦ Unannounced can be disruptive, costly, risky but it is the best way to reveal how much the IRP
team is ready, the highest level of management should approve such testing method
453
Problem Management
The objective of problem management is to prevent the recurrence of an
incident by identifying the root cause of the incident and taking appropriate
preventive action.
The elements of problem management are investigation, in-depth analysis, root
cause analysis, and addressing the issues identified during the root cause
analysis.
To prevent the reoccurrence of an incident, it is important to conduct a root
cause analysis and address the issues.
Problem management is a proactive process
454
455
Help desk
The responsibility of the technical support function is to provide specialist
knowledge of production systems to identify and assist in system
change/development and problem resolution.
The basic function of the help desk is to be the first, single and central point of
contact for users and to follow the incident management process
The help desk personnel must ensure that all hardware and software incidents
that arise are fully documented and escalated based on the priorities
established by management
456
Ticketing system
An IT ticketing system is a software application used by IT departments to manage and
track customer or user-reported issues and requests.
When a user or customer reports an issue or requests assistance, the IT department creates
a ticket in the system.
The ticket contains information about the issue, including its severity, priority, and any
relevant details. The ticket is then assigned to a technician or support staff member who is
responsible for resolving the issue.
The IT ticketing system allows the IT department to track the progress of each ticket from
creation to resolution. It can also provide metrics and reports on the number of tickets
created, the time taken to resolve each ticket, and other key performance indicators.
A source for manual reporting
Can be integrated with other tools to automatically create tickets
Triage is done by Help Desk analyst
457
WHAT IS SOC?
458
459
SOC ANALYST
SOC Technology Engineer is a specialized role within a security operations team that
focuses on the technology and tools used to monitor and defend against security
threats. This can include designing and implementing security information and event
management (SIEM) systems, configuring intrusion detection and prevention systems
(IDS/IPS), managing firewalls, and developing automated processes for incident
response.
SOC L1 (Level 1) analysts are typically entry-level security professionals who are
responsible for monitoring and triaging security alerts generated by security tools such
as intrusion detection systems, firewalls, and anti-virus software. They investigate and
escalate alerts that require further analysis to more experienced analysts or Level 2
analysts.
460
Soc analyst l2
SOC L2 (Level 2) analysts are more experienced security professionals who are
responsible for investigating and analyzing security incidents that have been
escalated by the L1 team. They use their expertise to determine the nature and
extent of a security incident, assess its potential impact, and provide
recommendations for remediation.
SOC L3 (Level 3) analysts are the most experienced members of the SOC team,
responsible for handling the most complex and critical security incidents. They
possess in-depth knowledge of advanced threat detection and response
techniques and are capable of performing advanced analysis and reverse
engineering to identify and mitigate sophisticated attacks.
461
INCIDENT RESPONSE SECURITY
TOOLS
462
siem
SIEM stands for Security Information and Event Management. It is a software solution
that provides real-time monitoring, correlation, and analysis of security events and
alerts generated from a variety of sources in an organization's IT environment.
SIEM systems collect and analyze log data from various sources, such as firewalls,
intrusion detection and prevention systems, endpoint security solutions, and other
security tools.
Logs that SIEM is receiving can be in Terabytes, SIEM index it and evaluate it based on
existing use-cases configured by SIEM admins or
The system correlates events from these sources to identify potential security threats
and alerts security analysts to investigate and respond to these threats.
SIEM systems use advanced analytics and machine learning algorithms to detect
anomalies and identify patterns of behavior that may indicate a security incident.
463
SIEM COMPONENTS
Data sources
◦ A SIEM system collects data from various sources, including network devices, servers, firewalls,
intrusion detection and prevention systems, and other security tools. The data can include
logs, system events, network traffic, and other security-related data.
Data normalization
◦ To make sense of the different types of data collected from various sources, a SIEM system
normalizes the data by converting it into a standard format. This makes it easier to analyze the
data and detect security threats.
Correlation engine
◦ The correlation engine is a key component of a SIEM system that analyzes the collected data
and detects patterns or anomalies that could indicate a security threat. The engine uses rules
or algorithms to correlate events and generate alerts.
464
SIEM COMPONENTS
Alert management:
◦ A SIEM system generates alerts based on the results of the correlation engine. The alerts are
prioritized based on severity and sent to the security team for further investigation. The system
can also automate responses to certain types of alerts.
465
466
467
fim
FIM stands for File Integrity Monitoring. It is a security control that ensures the integrity
and security of critical system files and directories by monitoring them for unauthorized
changes or modifications.
FIM solutions work by creating a baseline of the critical files and directories on a system
and then monitoring them for any changes. The baseline is typically created by taking
a snapshot of the files and directories and their associated metadata, such as their size,
date, and time stamps.
Any changes to these files or directories are then compared to the baseline to
determine whether they are authorized or unauthorized.
FIM solutions can monitor files and directories on a wide range of systems, including
servers, workstations, and network devices. They can also be configured to monitor
specific file types, such as configuration files, system files, and application files.
468
FIM ALERT
469
470
edr
EDR stands for Endpoint Detection and Response.
It is a security solution that provides real-time monitoring and response capabilities for
endpoints such as desktops, laptops, servers, and mobile devices.
EDR solutions work by collecting data from endpoint agents and analyzing it for
indicators of compromise (IoCs) and suspicious behavior. The data collected includes
information about processes running on the endpoint, network connections, system
logs, and other endpoint-related data.
They can detect a wide range of threats, including malware, ransomware, phishing
attacks, and zero-day exploits.
EDR solutions provide a range of response capabilities, such as isolating the endpoint
from the network, quarantining files, and terminating malicious processes. They also
provide detailed forensic data to support incident investigation and response.
471
472
Edr vendors
473
NDR
NDR stands for Network Detection and Response.
It is a security solution that provides real-time monitoring and analysis of network
traffic to detect and respond to potential security threats.
NDR solutions analyze network traffic data, including flow data, packet data,
and protocol data, to identify potential threats such as malware infections,
network intrusions, and data exfiltration attempts.
NDR solutions can also provide automated response capabilities, such as
blocking malicious network traffic or isolating infected endpoints. They can also
provide detailed forensic data to support incident investigation and response.
474
Ndr architecture
475
XDR
XDR stands for Extended Detection and Response.
provides advanced threat detection and response capabilities across multiple security
domains, including endpoints, networks, cloud environments, and applications.
work by collecting and analyzing data across multiple security tools and domains to
identify and correlate security events. This includes data from endpoint detection and
response (EDR), network detection and response (NDR), and cloud security tools.
provide a single, integrated view of security events across multiple domains. This allows
security analysts to quickly identify and respond to security threats, regardless of where
they originate.
XDR can also provide automated response capabilities, such as isolating infected
endpoints, blocking malicious network traffic, and quarantining files.
476
Xdr architecture
477
478
soar
SOAR stands for Security Orchestration, Automation, and Response.
It's a term used to describe a set of technologies and practices that enable security
teams to streamline and automate their incident response processes.
SOAR solutions typically provide the following capabilities:
◦ Orchestration: SOAR platforms enable security teams to coordinate and automate their
incident response workflows across different tools and systems.
◦ Automation: SOAR platforms automate repetitive and manual tasks, such as gathering
information about an incident, analyzing data, and containing threats.
◦ Response: SOAR platforms enable security teams to respond to incidents faster and more
effectively by providing them with real-time insights into threats and automating actions to
mitigate them.
479
How soar actually work?
Integration with security tools:
◦ SOAR integrates with a wide variety of security tools and systems, such as SIEMs, threat
intelligence feeds, endpoint detection and response (EDR) tools, and firewalls. This enables
SOAR to collect and analyze data from across an organization's security infrastructure.
480
481
Vulnerability scanners
Vulnerability scanners are tools that are used to identify security vulnerabilities in
software, operating systems, and other IT infrastructure components. These tools are
designed to scan systems and applications for known vulnerabilities, misconfigurations,
and other security issues.
Vulnerability scanners typically work by performing automated scans of the target
system or application, looking for common known vulnerabilities and misconfigurations.
This can include checks for unpatched software, weak passwords, open ports, missing
security updates, and other vulnerabilities that could be exploited by attackers.
Vulnerability scanners can be used by security teams to proactively identify and
remediate vulnerabilities before they can be exploited by attackers.
it's important to note that vulnerability scanners are not foolproof and can produce
false positives or miss certain vulnerabilities, so it's important to use them in conjunction
with other security measures such as penetration testing and manual security
assessments.
482
Vulnerability scanners
Vulnerability scanning can be launched against wide variety of systems, network
devices and end points.
The vulnerability assessment tool should be always up to date
The best vulnerability scanning way is the authenticated scan, which in it, you
provide administrative credentials for targeted device to perform login before
scan, this provide better results
Vulnerability scanning tools can also assess the system configurations against
hardening baseline such as CIS benchmark for example, which in that case help
security administrators getting the assurance that systems are hardened
properly.
Example Tenable/Nessus and Qualys
483
484
485
Threat intelligence
Threat intelligence is information that is used to identify and mitigate security
threats.
Threat intelligence can come from a variety of sources, both internal and
external to an organization, and can include information about known threats,
emerging threats, and potential vulnerabilities.
There are many types of threat intel including Open-Source and Commercial
solution, and threat intel can use internal SIEM as source of information or
collaboration with other organization (special-interest groups)
Threat intelligence focuses on specific indicators of compromise (IOCs) or
tactics, techniques, and procedures (TTPs) used by threat actors.
Based on IOCs, SOC can identify the type of malware, and based on TTPs SOC
can identify the threat actor
486
487
Mitre framework
488
Data backup
489
backup
Data backup refers to the process of creating a copy of your important data and
storing it in a safe location as a precautionary measure against data loss.
It is a corrective/recovery control
it helps to prevent data loss due to various reasons, such as hardware failure, cyber-
attacks, natural disasters, or human errors.
It is important to establish a regular backup schedule based on the frequency of data
changes and the criticality of the data. For instance, a business might need to backup
data daily, while an individual might backup data weekly or monthly.
There are several backup methods, including local backup, remote backup, and
hybrid backup. Local backup involves storing backup data on a local device such as
an external hard drive, while remote backup involves storing data on remote servers
via the internet. Hybrid backup involves using both local and cloud backup methods.
490
491
Backup types
Full Backup Differential Backup Incremental Backup
• Copies all files and folders • Check when the last full • Check when the last backup
• More time is needed to take backup was taken “of any kind” was taken
the backup • Take all new data since the • Take all new data since the
• More resources are needed to last full backup (Rely on the last backup (Rely on the
store the backup differential backup flag) incremental backup flag)
• Can be used for full • Differential backup flag is a • After taking the backup, the
restoration flag set to a folder that was incremental backup flag will
changed since the last backup be resisted
• Backup software reset the • Fastest, and small data size
differential backup flag once required “depend on the
the backup is completed delta”
• Require the latest full backup
to do a full restoration
492
494
Storage medias
Hard Disk Drive (HDD)
◦ HDDs are the most common type of storage media for desktop and laptop computers. They
typically have read speeds of 100-200 MB/s and write speeds of 50-120 MB/s, although higher-
speed drives are available.
495
MEDIA TYPES
496
Storage solutions
Network Attached Storage (NAS)
◦ NAS devices are used for centralized storage and backup in small to medium-sized businesses.
They typically have read speeds of 100-1000 MB/s and write speeds of 50-500 MB/s,
depending on the number and type of drives used.
497
San vs nas
498
Storage redundancy
499
Redundant array of inexpensive
disks
Redundant Array of Inexpensive Disks (RAID) is a technology that allows multiple
hard disk drives to be combined into a single logical unit for data storage and
protection. RAID provides improved performance, fault tolerance, and data
redundancy for mission-critical applications.
A RAID controller is a hardware device that manages the configuration and
operation of a Redundant Array of Independent Disks (RAID) system.
The RAID controller is responsible for managing the disk array, including disk
striping, mirroring, parity calculations, and data recovery in case of a disk failure.
500
Raid types
RAID 0
◦ RAID 0 provides improved performance by striping data across multiple disks.
◦ allows for faster data access and transfer.
◦ there is no redundancy, which means that if one disk fails, all data is lost.
RAID 1
◦ RAID 1 provides data redundancy by mirroring data across two disks.
◦ if one disk fails, the other disk can still be used to access the data
◦ reduced storage capacity, as half of the available storage is used for redundancy.
◦ Only 1 Disk can fail
RAID 5
◦ RAID 5 uses disk striping with parity to provide both improved performance and data redundancy.
◦ Data is striped across multiple disks, and parity information is stored on each disk.
◦ If one disk fails, the parity information can be used to rebuild the lost data.
◦ RAID 5 requires a minimum of three disks
◦ Only 1 disk can fail
◦ provides increased storage capacity compared to RAID 1.
501
Raid 0, 1, 5
502
Raid types
RAID 6 (DP)
◦ RAID 6 is similar to RAID 5, but it uses two sets of parity information instead of one.
◦ This provides an additional level of data redundancy, as two disks can fail without losing any
data.
◦ RAID 6 requires a minimum of four disks
◦ provides increased data protection compared to RAID 5
◦ Can absorb up to 2 drives failure
RAID 10 (1+0)
◦ RAID 10 combines disk striping and mirroring to provide both improved performance and
data redundancy.
◦ Data is striped across multiple disks, and each disk is mirrored to provide redundancy.
◦ RAID 10 requires a minimum of four disks
◦ provides improved performance compared to RAID 5 and RAID 6.
◦ Can absorb up to half of disks in even number implementation (4,6,8,12,16,20)
503
RAID 6, 10
504
Databases overview
505
What is Databases?
Central repository for data, accessible by application servers and web servers.
Closely related to the Structured query language, which is a 4th generation
programming language that is used to query the data from the databases
DB Can be a SQL or a No-SQL (Non-Relational SQL or Not-only SQL) Database
SQL is used for financial applications and business intelligence applications
No-SQL is used for Big-data, real-time applications such as chat, IoT applications
SQL DBs are very common, and it is relational Databases
Relational database model
◦ Data and relationships between data organized in tables
◦ Tables consist of rows, in each row, some columns exist
◦ Rows are also known as tuples and columns are also known as domains or attributes
◦ Each row is unique, the column value is of the same type, and order of rows is not important
506
507
Benefits of relational db
Easier to understand and implement
Easier to convert from other data structure
Support projection and join operations
Easy to create new relations
Access control management is better
Integration with applications
Modification and updates are seamless
Normalization
508
Relational Database
Customer_ID Customer_Account Agent_ID
1224 4556 23
1225 4558 25
Customer_ID Last_Name First_Name Phone Account_Balance Agent_I D La st_ Na me Fi rst_ Name Phone
1224 Vira Dyn e 678-9987 1223.95 23 S t ur m David 334-5678
1225 Davies Tricia 556-3342 234.25 25 Long K yl e 556-3421
509
Sql commands types
SQL is a language that is domain specific
There are two types of SQL commands
DDL stands for Data Definition Language. DDL commands are used to define the
structure of the database and the objects in it. Some examples of DDL
commands include CREATE, ALTER, and DROP.
DML stands for Data Manipulation Language. DML commands are used to
manipulate the data stored in the database. Some examples of DML commands
include SELECT, INSERT, UPDATE, and DELETE.
510
511
Primary Key and Foreign Key
Primary key is the unique identifier for each record in the
table.
Primary key is used to join and combine data from two or
more tables.
Foreign key is a key in a table that refer to the primary key
in other table
Foreign key provides the assurance of referential integrity.
Any changes to the primary key must be applied to
associated foreign keys
Referential integrity refers to the integrity and correctness
of data in different tables
512
513
Candidate and alternate key
In database management systems, a key is a field or set of fields that uniquely identifies
a record in a table. A table can have multiple keys, and among them, one key is
designated as the primary key. In addition to the primary key, a table can have
alternate keys and candidate keys.
An alternate key is a key that is unique but not designated as the primary key. For
example, in a table of employees, the employee ID field might be the primary key, but
the employee email field might also be unique and could serve as an alternate key.
A candidate key is a key that is unique and could serve as the primary key, but is not
currently designated as such. In other words, a candidate key is an alternate key that
could be promoted to primary key status. For example, in a table of customers, both
the customer ID and the customer email might be unique and could serve as the
primary key, but one is designated as the primary key and the other is a candidate
key.
Only 1 primary key should exists
514
Db management system
515
Database management system
A DBMS provides the facility to create and maintain a well-organized database
DBMS Aids in organizing, controlling and using the data needed by application
programs.
DBMS Primary functions include:
◦ Reduced data redundancy
◦ Decreased access time
◦ Basic security over sensitive data
◦ User management and authorization
◦ Data integrity
516
Data Normalization
The process of reducing duplicate data and thus reducing data redundancy in
known as normalization.
Redundancy may lead to more processing and query time, so it is bad.
Renormalizing data is the opposite of normalization
If normalization is not configured in DBMS, justification need to exist.
Deduplication
The technique is not only used in DB, but also in storage platforms “SAN”
Normalization can also refer to standardization
517
Metadata in databases
518
519
Database metadata types
◦ Conceptual schema -> high-level structure and relationships of data in
DB
◦ External schema -> describes the views and access paths that are
available to users and applications accessing a database.
◦ Internal schema -> low-level, refers to the information that describes the
physical storage of the data in a database
520
Database security
521
A.C.I.D
ACID is an acronym that stands for
Atomicity, Consistency, Isolation, and
Durability.
It is a set of properties that guarantee
reliable and consistent transaction
processing in database systems.
522
Database Transaction
Management
A transaction is a collection of operations that performs a single logical function
in a database application.
Transaction-management component ensures that the database remains in a
consistent (correct) state despite system failures
Concurrency-control manager controls the interaction among the concurrent
transactions, to ensure the consistency of the database
523
Db Security key controls
DB Logs should be forwarded to a remote server with restricted access
Default credentials have to be changed (Username/Password)
Access control and Authorization and Role-Based Access Control (RBAC)
Encryption for data in transit and at rest and for DB backup
Patch Management and implement the latest security updates
Database backup and recovery
Database activity monitoring to monitor the usage pattern and detect abnormal
activities
From the application side, ensure database connection strings are secured and
apply credentials rotation whenever applicable.
524
Database administrator
DBA is responsible for database administration and maintenance
DBA should not be an administrator on the DB server
DBA should not be able to install additional software on the DB server
DBA should not have an end-user role or entry or approver
DBA should not be responsible for DB Security monitoring
DBA should always use the unique account to access DB, and access through
authorized DBMS only
DB Access should be using strong authentication (multifactor authentication)
Most organizations adopt the Privileged access management server which
provides the ability to perform session recording
525
Database resiliency
526
DATABASE RESILLENCY
What is database resiliency?
Electronic vaulting
◦ Transfer data from the primary database to a secondary, offsite location for safekeeping and
disaster recovery purposes.
Remote journaling
◦ Create a journal, or log, of all database transactions at a remote location.
◦ This journal is then used to recover the database in the event of a failure or disaster.
527
Types of data synchronization
Synchronous mirroring
◦ Changes made to the primary database are immediately replicated to the remote copy
before the transaction is committed.
◦ Require very low latency
Asynchronous mirroring
◦ Changes made to the primary database are replicated to the remote copy later with delay
after the transaction is committed.
◦ Can be used if sync option is not available, and latency is high, can be based on the number
of transactions committed to ensure efficient bandwidth use.
◦ If we got 1000 transactions in 1 minute, we will transmit
Snapshot mirroring
◦ Periodic sync to a remote location, for example, every 1 hour
◦ Could lead to more data losses, if within 1 hour we got 1000 transactions it will be transmitted
528
529
Clark Wilson security model
• The Clark-Wilson model is a security model that is
used to ensure the integrity and Confidentiality
• Subject + Program/transaction + Object
• Require intermediate program or restricted interface
between Subject and Object
• A practical example is DBMS
• Key Principals
• Well-formed transactions
• Separation of duties
• Least privilege
• Auditing
• Integrity verification
530
531
Clark Wilson model in practice
A practical example of the Clark-Wilson model in action could be a financial system
that allows authorized users to enter and modify transactions, while at the same time
ensuring that the data is protected from unauthorized modification or access.
The data entry clerk would be responsible for entering transaction data into the
system but would not have the ability to approve or modify transactions.
The transaction approver would be responsible for approving or rejecting
transactions but would not have the ability to enter or modify transaction data.
The system administrator would have the ability to create and delete user accounts
but would not have access to the transaction data itself.
An auditor would be responsible for monitoring and tracking all system activities,
including user access and modifications to transaction data.
In addition to that, all transactions should be well-formed, audited and a mechanism
in place to ensure data integrity.
532
Endpoint security
533
endpoints
Laptops, desktops, mobile devices
Endpoints are often used by employees to access corporate networks,
communicate with customers and partners, and store sensitive information.
The most vulnerable entry points for cyber attackers to gain unauthorized access
to an organization's network and sensitive data.
Very large in number
Can be remote
Trusted by default … (well in most cases)
534
535
Security practices for end-user
devices
Patch Management and installation of OS & Application patches regularly
Use approved Operating systems only
Use the approved corporate-owned device to access the corporate network
Install only approved software and restrict the ability of end-users to install software by
themselves
Encryption, especially for the hard drive at the storage level, can protect data if the device
got lost
Enforce users to use strong passwords and change passwords regularly
Send Endpoint logs to an external location
Centrally manage the endpoint devices (Active directory domain)
Install Endpoint protection platform and device control
Digital watermark through group policy
Restrict Internet Access (Business needs)
536
537
Clear desk policy
A clear desk policy is a set of rules and guidelines that require employees to keep their
workspaces clean, organized, and free of confidential or sensitive information when
they are not present.
The policy aims to reduce the risk of sensitive information being lost, stolen, or accessed
by unauthorized individuals.
A clear desk policy typically includes the following requirements:
✓No confidential information should be left on desks or in open view.
✓All documents and files should be stored securely when not in use.
✓Computer screens should be locked or turned off when employees are away from their desks.
✓All removable media, such as USB drives, CDs, or DVDs, should be stored securely.
✓Desks and workspaces should be cleared at the end of each workday.
✓No food or drinks should be left on desks.
538
539
Endpoint security software
540
541
Endpoint Protection platform
software
Every additional agent for Software will impact the system performance (footprint
effect)
Endpoint Security A Single Software that can combine many features such as
Antivirus
Integration with Sandbox (close environment to test suspicious files)
Host-based IPS & Firewall
Device control
Application whitelisting
Web control
542
543
Endpoint protection console
544
An overview of secure it
network components
545
Cloud Email Cloud-
Business
Partners Extranet Internet Based File
Secure
Access Sharing
Service Edge
Other
Branches Intranet
VPN
App Zone DB Zone
NIPS Firewall Gateway
Backup Zone Least privilege Edge Device URL APP Backup DB
using FILTER
Backup Servers ACLs/Firewall
Rules User zone
IT Services
EPP Central Wireless MAC HIPS
Server Security FILTER
LAN Updates
LOG MAC Or use URL Filter
USER
AGGREGATION Filter/Ente NAC DESKTOP Encryption
rprise Device
VLANS /LAPTOP
GPO Active Directory wpa2 Control
EPP
DNS,DHCP,NTP
546
Introduction to
it networks
547
Computer network
Computer network is group of devices connected with others through any type
of medium (Wired or Wireless)
The purpose of network connection is to share common resource or to
exchange information (File sharing, Business-to-Business, Emails, E-learning)
The first computer network was the ARPAnet, it started to work on October 1969,
it was between two US research institutes, and marking the born of internet.
ARPAnet transformed to use TCP/IP in 1983.
TCP/IP is the current type of modern networks.
In TCP/IP networks, IP address is the logical address for devices
548
Client-Server Architecture
Network components
549
Types of networks
Local Area Network - LAN
Campus Area Network – CAN or Metropolitan Area Network - MAN
Wide Area Network – WAN
Virtual Private Network – VPN
Intranet – Local network of company branches connected through WAN or VPN
Extranet – network with partners and other businesses connected through WAN
or VPN or Internet
Internet – Global network with customers and other entities
550
551
Network topologies
552
Network topologies
Bus topology
Ring Topology
Star Topology
Partial Mesh Topology
Full Mesh Topology
Not all these topologies are related to LAN only, but also
WAN connection topologies can adopt this model
553
554
555
OSI Model
556
TCP/IP Model
557
Physical Layer (Layer 1) - 558 -
OSI Reference
Physical layer concerns the physical interface between devices Model
and the rules by which bits are passed between devices. Application
◦ Coaxial Cable
Network
◦ Fiber Optical
Data-Link
Physical
Network
Twisted Pair Cabling
◦ Inexpensive and very easy to install
OSI Reference
Model
Application
◦ Shielded is more expensive but has less crosstalk and more resistant to EMI.
Session
◦ Can be used for analog or digital transmissions.
◦ Can be used up to 100 Mbps Transport
559
Network Cabling OSI Reference
Model
◦ Fiber optic cable carries signals as light waves creating higher transmission
speeds and greater distances. Data-Link
networks.
560
Max
Media Type Bandwidth Advantages Disadvantages
Distance
Less susceptible to EMI Difficult to work with and
Thicknet Coax 500 meters 10 Mbps
than other copper media. expensive.
Susceptible to interference
Easy to use and widely
CAT 5 UTP 100 meters 100 Mbps can only cover a limited
available.
distance.
562
OSI Reference
Data-link layer defines the protocol that computers must follow in order to Model
Transport
Network
Data-Link
Physical
565
Media Access Control (MAC) - 566 -
OSI Reference
address that is burned into each NIC card by the manufacturer Application
◦ The hardware address is a 48-bit address expressed as 6 bytes. The first 3 bytes are the
vendor code and the second 3 bytes are the serial numbers made up by the manufacturer Presentation
◦ MAC sub-layer is responsible for media access. It controls how the workstations
communicate over the network. Session
Physical
24 Bits (3 Bytes) 24 Bits (3 Bytes)
Vendor Code Serial Number
Example: 00-0F-1F Example: C1-21-B8
Application
The Logical Link Control (LLC) runs between the and MAC sub-layer
Presentation
Enables the network layer and physical layers to act independently. Network Session
Network
Data-Link
Physical
567
Media Access Methods
OSI Reference
Three types of media access methods are used by packets to access the Model
Polling
Physical
Token Passing
568
◦ Requires that all devices on the LAN listen before they transmit. This contention Application
◦ After the collision, devices on the LAN will wait a random amount of time before
retransmitting data Session
Transport
Network
Data-Link
Physical
569
CSMA/CA
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
OSI Reference
Model
avoid collisions
◦ Contributes to network traffic because, before any real data is transmitted, it Presentation
has to broadcast a signal onto the network in order to listen for collision
scenarios and to tell other devices not to broadcast Session
Network
Data-Link
Physical
570
WAN Devices
Modem
◦ A device that interprets digital and analog signals, enabling data
to be transmitted over voice-grade telephone lines
Channel Service Unit/Digital Service Unit (CSU/DSU)
◦ A digital-interface device used to connect a router to a digital
circuit like a T1. The CSU/DSU also provides signal timing for these
two devices
Multiplexer (MUX)
◦ MUX allows more than one signal to be sent out simultaneously
over a physical circuit
WAN Switch
◦ An internetworking device used in carrier networks. This device
typically operates at the data-link layer
Access Server
◦ A concentration point for dial-in and dial-out connections.
571
WAN
Gateway Devices
◦ Allow different types of network to communicate
◦ Three main types of gateways are: address, protocol, and application
◦ Example: Gateway between RF and IP, Infrared and IP, etc.
Multi-Service Switch
◦ Layer 2/3 Devices that provide interoperability between data-link and network layers
◦ Example:
◦ WAN: MPLS (Multi-protocol Label Switching)
◦ LAN: RSM (Route/Switch Module)
Routers
◦ Devices that operate at the network layer of the OSI model
◦ A LAN or WAN devices determines the best path to send network traffic based on costs and
other network information
◦ A router also has to share information with other routers. (Static or dynamic routing.)
572
LAN Devices
Repeaters (Layer 1)
◦ Repeats electrical/radio signals to extend the length of the network
Hubs (Layer 1)
◦ Hubs are a central point of connection for cable segments in a physical star topology
Bridges (Layer 2)
◦ Bridges are intermediate systems, or switches, that forward MAC frames to destinations based on
MAC addresses
573
Virtual Local Area Network
(VLAN)
VLANS
◦ VLAN allows ports on a switch to be grouped into single broadcast domain. This allows devices to be
logically configured as if they are on the same network without regard to their physical location
574
◦ Recognizes and forwards to the transport layer incoming messages for Presentation
Application
Layer
local host domains
◦ Example: Internet Protocol (IP) and Netware Session
Host-to-Host
Transport Transport
Layer
Network
Data-Link Access Layer
Physical
576
TCP/IP
DoD created TCP/IP to provide robust communication during
wartime OSI Reference TCP/IP Protocol
Model Architecture
Application
◦ ARP– Determines MAC Address for known IP Address Network Internet Layer
Physical
577
Structure of an IP - 578 -
0 4 8 12 16 20 24 28 31
1
Version IHL Type of Service Total Length
2
Identification Flags Fragmentation Offset
Words
3
Header
4
Source Address
5
Destination Address
6
Options Padding
Application Layer
Data
Transport Layer
Header Data
Internet Layer
IP Addressing (IPv4)
Internet Protocol Addresses (IPv4)
◦ 32-bit IP Addresses are logical addresses and not physical OSI Reference TCP/IP Protocol
Model Architecture
◦ Includes a network ID and a host ID
◦ Every host must have an unique IP address
Application
Session
579
IP Addressing (IPv4)
OSI Reference TCP/IP Protocol
Model Architecture
Application
Application
Presentation
Layer
Session
Host-to-Host
Transport Transport
Layer
Network
Data-Link Access Layer
Physical
580
IPNetwork
Addressing (IPv4)
Address Translation (NAT) is a method of connecting
multiple computers to the Internet (or any other IP network) OSI Reference TCP/IP Protocol
◦ Shortage of IP addresses
Application
Presentation
◦ Security needs Layer
◦ RFC 1918 reserves the following private IP addresses for NAT Host-to-Host
◦ Class A: 10.0.0.0 – 10.255.255.255 Transport Transport
Layer
Physical
582
Priority: Enable a source to identify the desired delivery priority of the datagram
Flow Label: Used by a source to label those products for which it requests special handling by the
IPv6 router
Payload Length: Length of payload (in octets)
Next Header: Identifies the type of header immediately following the IPv6 header
Hop Limit: An 8-bit integer decremented by one by each node that forwards the datagram
Source & Destination Addresses: 128-bit IP addresses
Bits
0 4 8 12 16 20 24 28 31
1 Version Priority Flow Label
Source Address
Words
3-7
Destination Address
8 - 12
Internet Protocol Version 6 (IPv6) –
Addressing - 584 -
network
Multicast
IP Transmission Methods (in IPv6) - 586 -
Anycast
Bits
0 4 8 12 16 20 24 28 31
1 Type Code Checksum
2 Unused
Words
3
Internet Header + 64 bits of original datagram
4
Internet Group Management Protocol
(IGMP)
IGMP (Internet Group Management Protocol)
Created because IPv4 only supports unicast and broadcast
When a message is sent to a particular multicast group, all computers in that
group will get a copy of the message
It is used by hosts to report multicast group members to neighboring multicast
routers
588
Routing Protocols
◦ Interior Routing Protocols
◦ Routing Information Protocol (RIP) OSI Reference
Model
TCP/IP Protocol
Architecture
Routed Protocols
Layer
◦ Protocols that are encapsulated within the routing protocols and being
Network Internet Layer
◦ This is the most basic form of routing, and it usually requires that all Presentation
Application
Layer
exponentially to the number of static routes in the route table Network Internet Layer
Network
Data-Link Access Layer
Physical
590
Dynamic Routing
Dynamic routing uses special routing information protocols to automatically
update the routing table with routes known by peer routers
◦ These protocols are grouped according to whether they are Interior Gateway
Protocols (IGP’s) or Exterior Gateway Protocols (EGP’s)
◦ IGP’s are used to distribute routing information inside of an Autonomous System
(AS). An AS is a set of routers inside the domain administered by one authority.
Examples of interior gateway protocols are OSPF and RIP
◦ EGP’s are used for inter-AS routing, so that each AS may be aware of how to reach
others throughout the Internet. Examples of exterior gateway protocols are EGP
and BGP
591
– TCP vs. UDP - 592 -
stream message
Network
Data-Link Access Layer
Transport Layer
segment packet Physical
Internet Layer
datagram datagram
frame frame
Bits
0 4 8 12 16 20 24 28 31
1 Source Port Destination Port
2 Sequence Number
Words
3 Acknowledgment Number
6 Options Padding
Bits
0 4 8 12 16 20 24 28 31
Source Port Destination Port
Length Checksum
595
Session Layer (Layer 5)
Session Layer provides services to establish a session-connection between two
presentation entities and support orderly data exchange interactions, and to
release the connection in an orderly manner.
Connections: duplex, half-duplex mode
Session-connection synchronization
◦ Network File System (NFS)
◦ Remote Procedure Call (RPC)
◦ Network Basic Input/Output System (NetBIOS) names
◦ Structured Query Language (SQL)
596
597
Application Layer (Layer 7)
Application Layer provides services for application program that ensure that communication is
possible.
Makes sure that necessary communication resources exist
Ensures agreement at both ends about error recovery procedures, data integrity, and privacy
Determines protocol and data syntax rules at the application level
◦ File Transfers Protocol (FTP)
◦ Trivial File Transfer Protocol (TFTP)
◦ Simple Mail Transfer Protocol (SMTP)
◦ Simple Network Management Protocol (SNMP)
◦ Telnet
◦ Hypertext Transfer Protocol (HTTP)
598
Summary - 599 -
600
What is disaster?
Disruption of normal operation and processing
Is an incident that became big problem
Require recovery efforts to restore the operational status of information resources.
Reasons for disasters:-
◦ Natural calamities
◦ Pandemics, epidemics, or other infectious outbreaks
◦ Utility disruptions
◦ Actions by humans, whether intentionally harmful or through error
◦ Hardware or software malfunctions
◦ Incidents causing damage to image, reputation, or brand
601
Dealing with disasters
DRP (Disaster
Recovery Plan)
602
603
DISASTER RECOVERY PLAN
604
605
Drp components
COMMUNICATION
PLAN AND PRE-
DISASTER
BACKUP AND TESTING AND DRAFTED PRESS
RESPONSE TRAINING AND
SCOPE AND GOAL RECOVERY MAINTENANCE RELEASE AND APPROVAL
PROCEDURES / AWARENESS
PROCEDURES PROCEDURES CUSTOMER
PLAN ACTIVATION
NOTIFICATION
MESSAGES
606
BUSINESS CONTINUITY
PLAN
607
Business Continuity Plan
A Business Continuity Plan (BCP) is a comprehensive document that outlines the procedures and
processes that an organization will follow to ensure the continuity of its critical business functions
and operations in the event of a disruption.
The goal of a BCP is to minimize the impact of a disruption on an organization's ability to function
and to help it recover quickly.
Incorporate different DRPs together.
A corporate-wide document
608
609
Additional aspects regarding
bcp/drp
Members from across the organization should participate in creating the BCP to ensure
all systems, processes and operations are accounted for in the plan.
List of the BCP team members, including multiple contact methods and backup
members
Notification systems and call trees for alerting personnel that the BCP is being enacted
Contact numbers for critical members of the supply chain (vendors, customers,
possible external emergency providers, third-party partners)
Plans should be tested at predefined intervals as well as when significant changes
happen within the business environment.
Executive management should approve the execution
Full copies of the plan to be printed in hard copy and distributed, and kept at offsite
location
610
611
Recovery point objective
The RPO is the maximum allowable amount of data loss that an organization can
tolerate after a disruptive event.
It represents the point in time to which data must be restored in order to resume
operations.
For example, if an organization has an RPO of one hour, then it means that data
must be restored to the state it was in one hour before the event occurred.
Influence the Backup Strategy of the Organization
612
613
Aiw, sdo, mto
Acceptable Interruption Windows (AIW)
◦ a measure of the allowable time that an organization can tolerate for a business
function to be unavailable after a disruptive event.
◦ RTO should be less than the AIW
◦ No operation at all
614
FULL
SD RESTOR
BACKUP AT BACKUP AT BACKUP AT O E
RTO : 35 Minutes
10:20 10:55
616
RECOVERY SITE?
Recovery sites are alternate locations where an organization can resume critical
business operations in the event of a disaster or disruptive event.
Recovery site should be far from the business location to ensure it will not be
impacted with the same incident.
RTO is the key factor to select the type of recovery site
RTO is based on business criticality, organizations compare the recover cost
against the losses they might encounter, to be objective in this assessment, it is
important to know that Recovery cost include fixed cost and variable cost and
cost of disruption as well.
There are several types of recovery sites that organizations can use, depending
on their needs and budget.
617
Types of Recovery Capacity
Cloud-based
Mirror site Hot site Warm site Cold site Mobile site
site
• contains the • equipped • Equipped • has the • modular • uses cloud-
same with both with some necessary datacenter, based
information as hardware and hardware and electrical and can be sent to infrastructure,
the original system required physical area of such as virtual
Configured software to be utilities. components disaster, and servers and
for high used in the • In case of of a computer restore data to storage
availability event of a disaster, need facility. it and resume • can be quickly
• Data is disaster. to acquire • No computing operation. and easily
synchronized • Latest data is additional devices. provisioned
in real time or not available, hardware • Slowest.
near-real time it need to be • Require data • Cheapest.
• Very costly to restored from restoration
implement backup after then.
and maintain solution.
• Fastest
recovery
618
A reciprocal agreement
A reciprocal agreement is an agreement between two or more parties that
involves mutual benefits or obligations.
In the context of disaster recovery, a reciprocal agreement refers to an
agreement between two or more organizations or jurisdictions to provide mutual
assistance in the event of a disaster or emergency.
For example, a reciprocal agreement between two cities may specify that in the
event of a major disaster, one city will provide emergency personnel and
equipment to the other city to help with the response and recovery effort. In turn,
the other city may agree to provide similar assistance to the first city if it
experiences a disaster.
The entities establishing the reciprocal agreement should be working in the same
field, and their location are far from each others to ensure the agreement will be
effective.
619
BCP TESTING AND
EVALUATION
620
Ensure effectiveness
Build confidence
Continuous improvement
621
Testing drp
Document review / Checklist
• (Key participants review requirements)
review
Parallel test • (Bring the alternate site, while primary still operational)
622
623
continues optimization
Business Impact
Assessment
Training and
awareness
624