Cissp Chapter01
Cissp Chapter01
Management
First Some Terms
The objective of
confidentiality applies to both
data and system information
and is sometimes referred to
as the secrecy object. To
ensure confidentiality,
information
ity
must be protected to
al
eliminate the loss or
nti
disclosure of the information.
de
The actions
nfi
taken to protect information
Co
from disclosure include
numerous controls put in
place to
01 create defense in depth.
Integrity (52)
Int
eg
rit
y
Integrity ensures that the
system resources are
protected from unauthorized,
unanticipated, or unintentional
modifications. This objective
can apply to both the data
and the hardware system.
Data integrity is the
fundamental concept that
data has not been altered by
any manner while in storage,
during processing, or while in
transit unless
authorized.
Integrity Example
Example
MD5: 164731747fc7236d799e588f60efbbe7
Availability (51)
Availability 03
Parkerian Hexad
everything that
protects data.
Security Program Monitor
and Implement
development is a Evaluate
LIFECYCLE!!! Operate
and
maintain
Security Program
Examples?
Could be an un-patched application
Open modems
Lax physical security
Weak network protocol
Threat *
Functional:
“Does the solution carry out the required tasks”*
Assurance:
“How sure are we of the level of protection this
solution provides”*
Risk Analysis
Risk Analysis (76)
Quantitative analysis
Qualitative analysis
Example:
If you have a warehouse with $1,000,000 of
value, and the threat is a fires, your fire
suppression systems might stop a fire at
25%, this is your EF.
Step 2: Estimate Loss Potential*
Example:
The ALE for the warehouse fire is
ALE=SLE * ARO
SLE = $250,000
ARO = 1.2
ALE = $250,000 * 1.2
ALE = $300,000
Details:
The probability of a virus infection per month is 50%.
If an outbreak occurred your sales staff of 5, would not be able to
work for the 4 hours while the systems were rebuilt. Each sales
person makes $40/hour.
IT would require 1 person 4 hours to repair at a cost of $50/hour.
A certain antivirus system could stop ALL viruses (ok, that’s just to
make the math easier) but the cost is 20K per year for this system.
Questions:
Should you implement the Anti-virus system?
If so how much are you saving?
If not how much are you wasting by buying it?
Word Problem Answer
Step 1: Determine SLE
(5 sales * 4 hours each * $40) + (1 IT * 4 hours * 50)
= $1000 cost per incident
Compute ALE2
ALE2 (ALE after countermeasure) = $0.00
Countermeasure cost = $20,000
ALE2 + countermeasure cost = ($0) + $20,000.00
ALE2 = $20,000
Which is smaller?
ALE ($6,000) or ALE2 ($20,000)
Word Problem Answer
Brainstorming -
a conference technique of solving specific
problems, amassing information, stimulating
creative thinking, developing new ideas, etc., by
unrestrained and spontaneous participation in
discussion.
http://dictionary.reference.com/browse/brainstorming
Other Qualitative Methods
Focus groups –
a representative group of people questioned
together about their opinions on political issues,
consumer products, etc.
http://dictionary.reference.com/browse/focus+group
Other Qualitative Methods
Surveys
Questionnaires
Interviews and one-on-one meetings
Review of Quantitative and
Qualitative
Qualitative Cons
Subjective
No dollar values
No standards
Quantitative cons
Complex calculations
Extremely difficult without tools
Lots of preliminary work required
Policies, Standards, Baselines,
Guidelines, and Procedures
Policies Standards, Baselines,
Guidelines and Procedures
A security program must have all the pieces
necessary to provide overall protection to a
company and lay out a long term strategy.
Policies, Standards, Baselines, Guidelines and
Procedures are part of the security program
Example:
a standard is “all employees MUST wear their
company ID badge at all times”
Baseline
(more)
Baseline
Examples:
a baseline my specify that all windows XP systems
must have SP2 installed, and ISS turned off.
a baseline may also specify all Linux systems run
SElinux in enforcing mode.
Baseline
Taking due care, the organization would implement security controls to protect the
data. For example, administrators could store the customer information on a different
server within the private network that isn’t accessible from the Internet but is
accessible from the web server.
Additionally, they could encrypt sensitive data on the server to protect against the loss
of confidentiality. They don’t need to encrypt the entire database, but instead just
encrypt columns holding sensitive data such as credit card data.
Review of Policies, Standards…
Examples:
Procurement process
Hiring process
Order fulfillment process
User *
Why?
For redundancy
To ensure no-one has too much control over a
segment of business
Job Rotation
Why?
Gives opportunity for others to discover fraud. If
employees don’t want to take a vacation, they
might be doing something underhanded and do
not want to be found out
Additionally it enforces that other people can step
in and that the process cannot be disrupted by
that employee being absent for whatever reason.
Geographic Access Control
Example:
Two managers only know their half of a bank vault
combination.
Dual Control
Dual Control
Example:
A bank vault has two separate keys that must be
turned at the same time to unlock the vault.
Employee Termination
Employee Termination*
Q. What is a vulnerability
Q. What is an SLE