Lesson 1
Lesson 1
CIA Triad
Classifications of Data:
a. Public
b. Internal/external
c. Unidentified
Goal: Ensures that the data remains the same from the source to receiver.
Threats:
1. Risk Assessment- Identify the risks that would affect your environment
2. Evaluate the risk for the two factors -
a. How is it likely to occur? Determining the likelihood of that risk to occur.
b. What are the impacts of that risk in your environment?
3. Prioritize- risk matrix a mechanism to use for prioritization.
RISKS LIKELIHOOD IMPACT TOTAL CORE STRATEGY/IES DATE DOCUMENTATION STATUS Res
RISK PRINCIPLE TO DEAL WHEN OF RESIDUAL RISK
SCORE AFFECTED WITH THE THE RISK
RISK SHOULD
BE
ADDRESS
- Review the final order, also consider external factors such as cost.
- Availability of the resources
- After finalizing the priority
Types of Response:
Residual risk- the remaining risk after you solve the risks.
1. Understanding of the Least Privilege- security discipline that requires, system be given
no more privilege than necessary. Simple but difficult to implement in reality.
Challenge: Complexity of the environment
- Very rare of implementation, at least give best effort
Tools to use:
a. Group users in application
b. Multiple user accounts for administrators
c. Account Standardization
d. Third Party Applications
e. Processes and Procedures
2. Understanding Separation of Duties- principle that prevents every entity to have a full
access to information. Designed to prevent fraud, errors, and theft.
3. Understanding an Attack Surface- the larger the attack surfaces the greater the risk could
happen
a. Divide the attack surface into 3 components
Application, network, employees
b. Evaluate the Application Surface- number of data input, number of running
services.
c. Evaluate the Network Surface- IP address
d. Evaluate the Employees- risk of malicious intention
Data Center
EXTERNAL
GUARD DESK
INTERNAL PERIMETER
SECURE AREAS
LOCKED SERVERS/ RACKS
DEFENSE IN DEPT- a concept in which multiple layers of defending assets
1. EXTERNAL PERIMETER
2. INTERNAL PERIMETER-the areas restricted to only the employees can occupy
3. SECURE AREA- security measures in place, data centers
EXTERNAL PERIMETERS
1. Security Cameras
2. Perimeter Fence
3. Identification Card
INTERNAL PERIMETERS
1. Locks
2. Security Camera
3. ID Badges
4. Guards within Perimeter
5. Smoke Detector
6. IDPS
SECURE AREA
1. Sensors
2. Badge Readers
3. Biometric Technologies
4. Locks
5. Metal Detectors
6. IDPS
SITE SECURITY PROCESSESS
COMPUTER SECURITY
1. Servers
2. Desktop Computers- spreadsheets
3. Mobile Computers- those that could carry include laptops, phones, notebook