Usable Security: Module 3 to 5

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/85

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

86 Terms

1
New cards

Risk Management

the process of identifying, assessing, and reducing risks facing an organization

2
New cards

Risk Identification

the enumeration and documentation of risks to an organization’s information assets

3
New cards

Risk Control

the application of controls that reduce the risks to an organization’s assets to an acceptable level

4
New cards

Know Yourself

identity, examine and understand the information and systems currently in place

5
New cards

Know Your Enemy

identity, examine and understand the threats facing the organization

6
New cards

Risk Appetite

It defines the quantity and nature of risk that organizations are willing to accept as trade-offs between perfect security and unlimited accessibility.

7
New cards

Residual Risk

the risk that has not been completely removed, shifted, or planned for

8
New cards

Iterative Process

Begins with the identification and inventory of assets, including all elements of an organization’s system (people, procedures, data and information, software, hardware, networking)‏

9
New cards

People

position name/number/ID; supervisor; security clearance level; special skills

10
New cards

Procedures

description; intended purpose; relation to software/hardware/networking elements; storage location for reference; storage location for the update

11
New cards

Data

classification; owner/creator/manager; data structure size; data structure used; online/offline; location; backup procedures employed

12
New cards

Asset Attribute

to be considered are name, IP address, MAC address, element type, serial number, manufacturer name, model/part number, software version, physical or logical location, and controlling entity.

13
New cards

Asset Inventory

  • Unless information assets are identified and inventoried, they cannot be effectively protected.

  • The inventory process involves formalizing the identification process in some form of organizational tool.

  • Automated tools can sometimes identify the system elements that makeup hardware, software, and network components.

14
New cards

Asset Categorization

  • People comprise employees and nonemployees.

  • Procedures either do not expose knowledge useful to a potential attacker or are sensitive and could allow an adversary to gain an advantage.

  • Data components account for the management of information in transmission, processing, and storage.

  • Software components are applications, operating systems, or security components.

  • Hardware: either the usual system devices and peripherals or part of information security control systems

15
New cards

Classifying, Valuing, and Prioritizing Information Assets

  • Many organizations have data classification schemes (e.g., confidential, internal, public data)‏.

  • Classification of components must be specific enough to enable the determination of priority levels.

  • Categories must be comprehensive and mutually exclusive.

16
New cards

Data Classification and Management

  • A variety of classification schemes are used by corporate and military organizations.

  • Information owners are responsible for classifying their information assets.

  • Information classifications must be reviewed periodically.

  • Classifications include confidential, internal, and external.

  • Security clearances

17
New cards

Specifying Asset Vulnerabilities

  • Specific avenues threat agents can exploit to attack an information asset is called vulnerabilities.

  • Examine how each threat could be perpetrated and list the organization’s assets and vulnerabilities.

  • The process works best when people with diverse backgrounds within an organization work iteratively in a series of brainstorming sessions.

  • At the end of the risk identification process, a prioritized list of assets with their vulnerabilities is achieved.

18
New cards

Risk Assessment

  • Risk assessment evaluates the relative risk for each vulnerability.

  • It assigns a risk rating or score to each information asset.

  • Planning and organizing risk assessment

19
New cards

Determine the Loss Frequency

  • Describes an assessment of the likelihood of an attack combined with expected probability of success

  • Use external references for values that have been reviewed/adjusted for your circumstances.

  • Assign a numeric value to likelihood, typically annual value.

20
New cards

Assessing Risk Acceptability

  • For each threat and associated vulnerabilities that have residual risk, create ranking of relative risk levels.

  • Residual risk is the left-over risk after the organization has done everything feasible to protect its assets.

  • If risk appetite is less than the residual risk, it must look for additional strategies to further reduce the risk.

21
New cards

Documenting the Results of Risk Assessment

  • The final summarized document is the ranked vulnerability risk worksheet.

  • Worksheet describes asset, asset relative value, vulnerability, loss frequency, and loss magnitude.

  • Ranked vulnerability risk worksheet is the initial working document for the next step in the risk management process: assessing and controlling risk.

22
New cards

The FAIR Approach to Risk Assessment

  • Identify scenario components

  • Evaluate loss event frequency

  • Evaluate probable loss magnitude

  • Derive and articulate risk

23
New cards

Risk Control

  • Involves selection of control strategies, justification of strategies to upper management, and implementation/monitoring/ongoing assessment of adopted controls

  • Once the ranked vulnerability risk worksheet is complete, the organization must choose one of five strategies to control each risk:
    –Defense

    –Transfer

    –Mitigation

    –Acceptance

    –Termination

24
New cards

Defense

  • Attempts to prevent exploitation of the vulnerability

  • Preferred approach

  • Accomplished through countering threats, removing asset vulnerabilities, limiting asset access, and adding protective safeguards

  • Three common methods of risk avoidance:

–Application of policy

–Education and training

–Applying technology

25
New cards

Transfer

  • Attempts to shift risk to other assets, processes, or organizations

  • If lacking, the organization should hire individuals/firms that provide security management and administration expertise.

  • The organization may then transfer the risk associated with management of complex systems to another organization experienced in dealing with those risks.

26
New cards

Mitigate

  • Attempts to reduce impact of attack rather than reduce success of attack itself

27
New cards

Incident Response (IR) Plan

define the actions to take while the incident is in progress

28
New cards

Disaster Recovery

the most common mitigation procedure; preparations for the recovery process

29
New cards

Business Continuity

encompasses the continuation of business activities if a catastrophic event occurs

30
New cards

Acceptance

–Doing nothing to protect a vulnerability and accepting the outcome of its exploitation

–Valid only when the particular function, service, information, or asset does not justify the cost of protection

31
New cards

Termination

–Directs the organization to avoid business activities that introduce uncontrollable risks

–May seek an alternate mechanism to meet the customer needs

32
New cards

Selecting a Risk Control Strategy

  • Level of threat and value of asset should play a major role in the selection of strategy.

  • Rules of thumb on strategy selection can be applied:

–When a vulnerability exists

–When a vulnerability can be exploited

–When attacker’s cost is less than the potential gain

–When potential loss is substantial

33
New cards

Justifying Controls

  • Before implementing one of the control strategies for a specific vulnerability, the organization must explore all consequences of vulnerability to information assets.

  • Several ways to determine the advantages/disadvantages of a specific control

  • Items that affect the cost of control or safeguard include the cost of development or acquisition, training fees, implementation cost, service costs, and cost of maintenance.

  • Asset valuation involves estimating real/perceived costs associated with design, development, installation, maintenance, protection, recovery, and defense against loss/litigation.

  • Process result is the estimate of potential loss per risk.

34
New cards

The Cost Benefit Analysis (CBA)

Determines if an alternative being evaluated is worth the cost incurred to control vulnerability. Is most easily calculated using the ALE from earlier assessments, before implementation of the proposed control:

35
New cards

ALE (Prior)

Is the annualized loss expectancy of risk before implementation of control.

36
New cards

ALE (Post)

Is the estimated ALE based on control being in place for a period of time.

37
New cards

ACS

Is the annualized cost of the safeguard.

38
New cards

CBA Formula

CBA = ALE(prior) – ALE(post) – ACS

39
New cards

Implimentation, Monitoring, and Assessment of Risk Controls

  • The selection of the control strategy is not the end of a process.

  • Strategy and accompanying controls must be implemented and monitored on ongoing basis to determine effectiveness and accurately calculate the estimated residual risk.

  • Process continues as long as the organization continues to function.

40
New cards

Quantitative VS Qualitative Risk Control Practices

  • Performing the previous steps using actual values or estimates is known as quantitative assessment.

  • Possible to complete steps using an evaluation process based on characteristics using non-numerical measures, called qualitative assessment

  • Utilizing scales rather than specific estimates relieves the organization from the difficulty of determining exact values.

41
New cards

Benchmarking

the process of seeking out and studying practices in other organizations that one’s own organization desires to duplicate

42
New cards

Metric-based measures

based on numerical standards

43
New cards

Process-based measures

more strategic and less focused on numbers

44
New cards

Standard of Due Care

when adopting levels of security for a legal defense, the organization shows it has done what any prudent organization would do in similar circumstances.

45
New cards

Baselining

–Performance value or metric used to compare changes in the object being measured.

–In information security, baselining is the comparison of past security activities and events against an organization’s future performance.

–Useful during baselining to have a guide to the overall process

46
New cards

Organizational

Assesses how well the proposed IS alternatives will contribute to an organization’s efficiency, effectiveness, and overall operation

47
New cards

Operational

Assesses user and management acceptance and support, and the overall requirements of the organization’s stakeholders

48
New cards

Technical

Assesses if the organization has or can acquire the technology necessary to implement and support proposed control

49
New cards

Political

Defines what can/cannot occur based on the consensus and relationships among communities of interest

50
New cards

Recommended Risk Control Practices

  • Convince budget authorities to spend up to the value of assets to protect from the identified threats.

  • Chosen controls may be a balanced mixture that provides the greatest value to as many asset-threat pairs as possible.

  • Organizations looking to implement controls that don’t involve such complex, inexact, and dynamic calculations.

51
New cards

Access Control

method by which systems determine whether and how to admit a user into a trusted area of the organization

52
New cards

Mandatory Access Control

use data classification schemes

53
New cards

Discretionary Access Control

allow users to control and possibly provide access to information/resources at their disposal

54
New cards

Identification

mechanism whereby unverified entities seeking access to a resource (supplicants) provide a label by which they are known to the system

55
New cards

Authentication

the process of validating a supplicant’s purported identity

56
New cards

Password

a private word or a combination of characters that only the user should know

57
New cards

Passphrase

a series of characters, typically longer than a password, from which a virtual password is derived

58
New cards

Dumb Card

ID or ATM card with magnetic stripe

59
New cards

Smart Card

contains a computer chip that can verify and validate information

60
New cards

Authentication

the matching of an authenticated entity to a list of information assets and corresponding access levels

61
New cards

Accountability (Auditability)

ensures that all actions on a system—authorized or unauthorized—can be attributed to an authenticated identity

62
New cards

Biometrics

Approach based on the use of measurable human
characteristics/traits to authenticate identity

63
New cards

Trusted Computing Base (TCB)

Part of TCSEC Rainbow Series. Used to enforce security policy (rules of system
configuration)

64
New cards

ITSEC

an international set of criteria for evaluating computer systems

65
New cards

The Common Criteria

Considered successor to both TCSEC and ITSEC

66
New cards

Bell-LaPadua Confidentiality Model

Model of an automated system able to manipulate its state or status over time

67
New cards

Biba Integrity

Based on “no write up, no read down” principle

68
New cards

Graham-Denning Access Control Model

Composed of set of objects, set of subjects, and set of rights

69
New cards

Harrison-Ruzzo-Ullman Model

Defines method to allow changes to access rights and addition/removal of subjects/objects

70
New cards

Brewer-Nash Model

Designed to prevent conflict of interest between two parties

71
New cards

Firewall

Prevent specific types of information from moving
between an untrusted network (the Internet) and a
trusted network (organization’s internal network)

72
New cards

Packet Filtering Firewalls

examine the header information of data packets.

73
New cards

Static Filtering

requires that filtering rules be developed and installed within the firewall

74
New cards

Dynamic Filtering

allows firewall to react to emergent event and update or create rules to deal with event

75
New cards

Stateful Inspection

allows firewall to react to emergent event and update or create rules to deal with event

76
New cards

Application Layer Firewall

Frequently installed on a dedicated computer; also
known as a proxy server

77
New cards

MAC Layer Firewalls

Designed to operate at media access control sublayer of network’s data link layer

78
New cards

Hybrid Firewalls

Combine elements of other types of firewalls, that is, elements of packet filtering and proxy services, or of packet filtering and circuit gateways

79
New cards

Firewall Architectures

Firewall devices can be configured in several
network connection architectures

80
New cards

Packet Filtering Routers

Most organizations with Internet connection have a
router at the boundary between internal networks
and external service provider.

81
New cards

Bastion Hosts

Commonly referred to as sacrificial host, as it stands
as sole defender on the network perimeter

82
New cards

Screened Host Firewalls

Combines packet-filtering router with separate,
dedicated firewall such as an application proxy
server

83
New cards

Screened Subnet Firewall

Is the dominant architecture used today

84
New cards
85
New cards
86
New cards