Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
18 views21 pages

Cissp 5

Uploaded by

Ghajini Sanjay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views21 pages

Cissp 5

Uploaded by

Ghajini Sanjay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 21

*Key Management Practices*

- Kerckhoff's law <screenshot>


A cryptosystem should be secure eern if everything about the system, except the key

Advances in kay management


- over web we need to exchange key
- framework is used to send/receive keys is XML
- XML - eXtensible Markup Langauge
- XML- based standards and specifications
- XML Key Management Specfifications2.0(XKMS)
Simplicity , increase security,

*Segregation of Duties*
- a crosscheck to ensure that misuse and abuse of assets, due to innocent mistakes

Key recovery
- Dual control
2 or more peopel required working in cooperation
- Split Knowledge
Specific information know only to one individual that must be combined with
knowledge held by another individual.

Key Escrow storing key with trusted party.

What makes key managmenet secure?

Key Wrapping and key Encrypting keys (KEK)


Key Distribution Centers (KDC)
-Master Key (static)
-session key (dynamnic)
-Each user has its own master key

Keys storage and destruction

Key Escrow (Key Recovery)


Ensring a thirdparty maintains a copy of private key or key needed to decrypt
information
should be mandatory for most org's use of cryptography

Summary: Screenshot

Attacks on Cryptosystem
-ciphertext-only attack
-known-plaintext attack
-chosen-plaintext attack
-chosen ciphertext attach

Statistical Attack
- Targets cryptography algorithm

side Channel Attack


-
Birthday attach (Hash collision)
Two different msgs providing same hash value.

linear cryptanalysis
- its knownplain text attack
reply attack
social engineer attack
Dictionary attack
Brute force attack
Summary - Screenshot

Under implemetation attack


Side channel
fault analysis
Probing attack.

*Risk from Remote Computing*


*Risk from mobile worker*

End point device risk


trusted client
network architecture
policy implmentation
stolen or lost device

Mobile work risk


platform proliferation (BOYD)
Home base PC and mulidevice synch sol

potential attach vectors for mobile devices


sms, wifi, bluetooth/infra-red,usb,webbrowser/ jailbrokerphones, os
vulnerabilities / physical access

Useful stds
- SP 800-40 R3 patc mgm
-800-121 R1 - bluetto seurity
-800-124 R - MDM

Industrial Control Systems


- embeded system platforms

Type of ICS
supervisory control and data acquistion system (SCADA)
Distributed control system (DCS)
Programmable Logic controller (PLC)

perimeter lighting
is deterance control

If power is gone Generator kicks in withing 10 secs


User Power conditioners to handle power issues

SMoke detector
- Photoelectric Smoke Detector
- Ionization Detector
- reactes to charged practicles of smoke
- gives early warning
Crytography
Crypto- Secret
Graphy- science of writing.
Cryptography made of two components Algorithm (Logic) and Key (Factor)
Science of Meaning communications **

Cryptography
Modern
-Symmetric
-Block
-Stream
-Asymmetric

Traditional /Classical
Substitutional
Transposition

Encryption happens at bits level


Encoding happens at character level

Cryptography Goals
Confidentiality
Authenticity (validation of source)
Integrity. (Hash value)
Non-repudiation (Proof of origin)

Strength of cryptosystem
Effectiveness of crytopsystem
Algorithm
secrecy of the key
length of key

Exclusive Or XOR functionality


Two rules
If both bits are same the result is zero
if they are different than each other then result is one
Encryption System
Null Cipher may be used when krypton is not needed but must be configured to make
system work.

Running key Cipher


OTP - One time Pads (Which is impossible to break)
For One time Pad Encryption scheme to be considered Unbreakable, each pad
In the scheme must be
⁃ Made up of truly random Values
⁃ Used only one time
⁃ Securely distributed to its destination
⁃ Secured at sender’s and receiver’s sites
⁃ At least as long as the message

Data in Transit

Algorithm / Protocol Governance


cryptography policies, standard, procedure related should be minimally address
- approved algorithm and keys sizes
- transition plans or compromised keys/ algorithm
- procedure for use of cryptography
- key generation, escrow, destruction
- incident reporting

International Export Controls


Symemtric cryptopgraphy
Advantages
Fast
secure
confiden
integrity and authentic
out of band
Disadvantage
key management is difficult
non repudiation not available

⁃ Stream-based cipher
⁃ Block Cipher :Users confusion and diffusion in their encryption method.
Initialisation Value (IV)

Data Encryption Standard (DES)


What is DES key size? 64 bits
DES Effective key size ? 56 bits as 8 bits used for parity
AES = 128 bit
Basic Block Cipher Modes of DES
Refere screenshot (ECB, CBC,CFB).
Streamline cipher (OFB, CTR)

2 DES
Meet in the middle attack on 2 DES
3 DES

Advanced Encryption Standards (AES)


Users block sizer of 128,192.256 bit
CCMP (Counter Mode with cipher block chaining Message
Rijinder
IDEA
CAST
Blowfish
Twofish
RC5
RC4 (used in SSL and WEP)
- key length at least 128bit
Summary Table Screenshot IMP

Asymmetric Cryptography
Also called as public key
5 Rules os asymmetric cryptogprahy referescreenshot

Different security gaols


Authenticity. (Encrypt with sender’s private key)
Confidentiality (
authentication and confidentiality (secure and origin)
=encrypt with senders private key and encrypt again with receiver’s public key
Algorithms in asymmetric
RSA.
EI Gamal
ECC. (Used in BIGDATA, limited processing power and no longer key)
(RSA vs ECC)
(Diff Halgaim Vs EL Gamal)

RSA - Public key algorithm 1978 (Provides authentication and Encryption)


Brute force, mathematical attach, timing attack,
Diffie Hellmann Algorithm
Discrete logarithm ( key agreement)
EL Gamal
Providing confidentiality and additional digital signatures service and
double the size data
ECC
Shoter keys from ECC implementation
Mathew Hellmann Not in syllabus but assyemtric

Symmetric Vs asymmetric Refere Screenshot

Hybrid Cryptography => Integrity

Message Digests => Data Integrity


Relook at video for understanding in detail white boarding

Example of Hashing Algorithm


MD2 128 bit
MD4 128 bit
MD5 128 bit - Ron Rivest
SHA-1 160 bit -NIST - SHA-256 SHA-384;SHA512
HAVAL. - Variation of MD5 ; variable length msg digest

MAC - Message Authentication Code


Two Types:- HMAC and CBC MAC

Session Key - refers screenshot


Quantum Key Distribution - New generation uses physics and light
Digital Signatures - screenshot used for non repudiation
Authenticity and Integrity

Summary for Asymmetric services = Screenshot


- Provides Integrity, authencation, no reputation

Com
bine Everything S / MIME

Quantum Cryptography (Used for key exchange)


- instead of maths it uses physics
- Fastest compare to asymmetric

Public key information (PKI)


CA (Certificate Authority) - TTP (Trusted Third Party)
PKI-CRL - certificate Revocation list
PKI- OCSP. - Online Ceritifcate status protocol
Receiving Certificate process - refers screen shot
SSL - Screenshot
SSL -TSL - Screenshot
SET - screenshot
Architecture
- enterprise architecture
- Security architecture

Defines how computing components are buit


Define show components connects communicates
How services get from system to users
Enterprise Architecture
IT stragegy
- Business archi. - products and services
- Information archi - data and information
- Application archi - system and applications
- Technology archi - network and infrastructure

Architecture integration
All information is not equal nor constant interns of value and risk over time

An efficient security program that applies the right tehc to project most critical
assent

Combined with quality prcoess

Security architecture
The manner in which security controls are designed, Implemented and integrated into
the system architecture.

Enterprise security architecture


- Building blocks for infosec
- Long term strategy for seuciry services
- Priorities for security services development

Key goal and objectctives


- Simple and long view o f control
- Unified vision for common security controls
- Leverages existing technology
- Flexible approaches to current and future threats

Benefits
- Helps decision maker to investment and design
- Future state tech architecture
- Support , enable , extent security policies and standards
- manages it solutions risk consistently.
- Reduce cost and improve flexibility
- Security mechanism for end of life

Common security services


- Boundary control services - firewalls, DMZ,Trusted DMS
- Access control services - SSO, IDM
- Integrity services - IPS
- Cryptographic services. PKI,NR,DC
- Audit and monitoring services - IDS

Common Criteria
- Documenting security requirements
- Documenting and validating security capabilities
- promoting international cooperation in are of it security.
Capturing and analysing requirements
Regardless of which framework used
- Business requirements for key stakeholders
- Key principles and grinders for design

Type of Requirements
- Functionals - controls, assets,threaths
- Non functional - QOS, performance and reliability
- Capturing requirements - vulnerabilities assessment, risk Asse, threat modelling.
information systems security evaluation models
- Security policy. What is requirement
- Security model - how this will work
- Formal security model - evaluate product.

Security models
- Requirements, CIA?
- Flexible
- May need to combine more than one model.

Example:
Security policy
-NIST
ISO
Security model
Programmin code
Operating system

Bell-LaPadula confidentiality Model


- Primary objective Confidentiality
- Multilevel security system
- Lattice based model (lattice- multiple level)
- State machine model
-
Simple security property - NO READ UP /READ DOWN
Star security property- No Write Down /Write up
Strong security property Constrained (Tranquility
)

Biba Intercity Model


- Address only and only Integrity
- Two main rules
- Start integrity - Subject cannot write data to an object at a higher integrity
level.
- Integrity level
- Simple integrity property means no read down

Simple property means READ


START means Alter/Edit/Write

Clark-Wilson interiors model


- Focused on integrity
- Well formed transactions One transaction should flow via multiple checkpoints. If
one checkpoint fails transaction can not go further
- separation of duties.
- Prevents users from making improper medication
- Forces collision to commit fraud
Brewer Nash (Chinese wall)
- Prevent conflict of interest
- UAT- Prod segregation
Graham -Denning Model

Information flow Model


- Classification and Need to Know
- Covert channels (bypass control and get access)
- information flow Lower security levels to higher level.
Non Interference Model
- Higher security level does not interfere with actions at lower security level
- Project state of entity at lower security level

Lattice Model
- Used in military
- Control model

Certification Technical evaluation


Accreditation- acceptation from management
-TCSEC(Trusted computer system Evaluation Criteria) used by DOD in their
Orange Book.

Common Criteria
- ISO/IEC 15408 standard
was first truly international product evaluation criteria
- Protection Profile
- ELA types (Evaluation Assurance Level)
- EAL1 Functionally tested - lowest
- EAL2 Structurally tested
- EAL3 Methodically tested and checked
- EAL4 Methodically designed , tested and Reviewed - Medium
- EAL5 Semi-formally designed and tested
- EAL6 semi-formally verified design and tested
- EAL7 Formally verified design and tested.

Module Topics
Access control Mechanisms
*Subject is active entity and Object Passive Entity (Subject user and object is
asset)
- Distinguish subject and object
- How sub and obj allowed to interact
- Assign identifiers to both sub n obj
- Authenticate all sub before they allowed to access resources on system

Processor State
- Support at least two Staes: supervisor (kernel mode) and problem (user mode ring
level3)
Layering
- Separate functional components thats tract in sequential and hierarchical way
- Ensure that volatile and sensitive areas are protected unauthorised access
Process Isolation
- Protect interaction with process
- Name distinguishes
- Distinct address space for each process in memory
- Virtualization :
- Type of Host
- Virtual host (Guest os)
- Physical host (Bare metal)
Type 1
Bare Metal ==> Hypervisor ==> Guest OS
- Less functionality More Secure
Type 2
Bare Metal => OS=> Virtual workstation
=> VMs
- more functionality but less secure

Common Threats
- System intergircy
- Confidentiality
- Availability
- Hardware failure
- Misses of system
- Buffer overflows memory attacks
- Denial of services
- Reverser engineering
- System hacking

Architecture based Risk


-System emanations (TEMPEST is standard to control system Emanations)
-Single point of failure
-Bypassing controls
-Race conditions (State attack) Two processes try to access same resource but they
should be in proper sequence) (Time of Check and time of use Attack)

State Attacks
“State attacks are also known as “race conditions”, which attempt to take advantage
of how a system handles multiple requests “

Covert Channel
- Covert - closed
- Overt - open
Two type attacks
Storage
Memory reuse
Object reuse
Timing
TOC, TOU,RC

Mainframes and other thin client system


Embedded Systems
*Firmware is basically ReadOnly*
Pervasive computing and model devices
*mobility is primary factor of data loss and control*

Guidelines for mobile security NIST 800 124

Security for Desktops, laptops and thin clients

Mobile device Management


Remotely manage mobile device using mdm agents
- refere screenshot

Server Based
Warehousing - Data warehousing is collected data sources or DB.
Big Data - also called as unstructured data (Primary concern is Privacy) .
Information should be masked for sensitive data while sharing with analytical tools

Data Mining
- Running queries on databases to collect information from data warehousers.
Counter measure is data masking

Large scale parallel data systems


-cluster computing, grid computing, cloud computing, the internet,
telecommunication, cyber physical systems, M2M
Examples: torrents,
IOT - protected as an endpoint
- not part of core infrastructure must be isolate from IOT

Grid computing
- Used in cloud providers

Cloud computing

Cloude service models


Service model - SAAS, PAAS, IAAS
Deploy model - private cloud, community cloud, hybrid cloud.

Cloud Security
- Refere Screenshot
Responsibility Matrix for security
Refere screenshot
[3/2, 12:52 PM] Prabh nair: Classification information and Security assest
IMP:- categarition is part of classification
Classification: Ensure information is marked in such a way that only those with
appropriate level of clearance can have access to the information.

Data Classification
analysing data that organization retains, determining its IMPORTANCE and VALUE and
then assigning it to a CATEGORY.

Sensitivity Vs Criticality

-Sensitivity describes the amount of damange that would be done should the
information be disclosed.

-Criticality describes the time sensitivity of the data.

Data Classificiation Considerations


- Value of data to org, can change over time.
- clearance is word used in militory.
- Level of damange that could be cuased if data is damanged or currpteed
- legal, regulatory to protect data
- industry and pupose /mission which org operates

DAta Classification Policy


- Data owner /bussiness owner will have access to data
How the data is secured
How lng the data the is to be retained
what menthods used to dispose of data
whether the data needs to be encrypted
appropriate use of data.

*D C helps the org comply with cuase and resolution *

What classification should be used


Class
-Commercial
-Military

Examples of categorizing data by title


- Private (SSN,bank a/c ,creditcard)
- Company restricted (data restricted to employee)
- Company confidential (can be all used to view can not be used)
- Public (can be used by Emp)

Who decides Data's Classificiation?


Individual who owns data
data owner should review classification atlease annually.

Data ower- who creates data, accountable for data.

Asset Management
- Tangable
- Intangable

- Inventory Managment
-Accurate
-Reside Who owns them
-H/w
-S/w

- Configuration managment
-
CMDB (Configuration Management Data Base)
- a logical entity with key integation points
- support and enables processess in service delivery, service support, IT asset
management and other IT disciplines.

Enablers for success of Asset management

Software Licensing
- Original copies of licensed software must be controlled by orgs to prevent
copyrights infringement
- All software copies should be managed by software or media Librarian
-conduct inventory

Determine and Maintain ownership

*Equipment is referred as services*

Introduciton
Data policy

cosideration
Cost, Owernship, Privacy, Liability, Sensitivity,
Existing law and policy requirements, Policy and process.

Information - Group of system produces information.(People, Process and


technology).
Information is always mission oriented.

Data owner
Data Custodianship
Data quality, effective control as defined by data owner,

Data quality Standards


- Accuracy, Precision, Resolution, Reliability,
Repeatability, Reproducibility, currency, Relevance, Ability to audit,
Completeness, Timeliness.
QC => internal standards
QA => External STandards

Improving Data Quality


Prevention
Correcction

Benefits of Data standards.


- Efficient data managemet
- Increased data sharing
higher qulaity data
improved data consistency
increased dtata intergration
Btter understanding of data
improved documentation of infrmation resources

Data Life cycle control


Data Audit
Note: Good Datamanagement required ongoing data audit.
Data storage and archiving
-server hardware and software
-network infrastructure
-database maintainance and updating
-database backup and recovery requirements
-archiving of data should be a priority data management issues

Data Remanence
- Residual physical representation of data that has been in some way erased
Commonly used countermeasures
- clearing
-/zerorition
- purging / Sanitazation
-multiple zerorition
- Degausssing (only for HDD) Physical level data destruction.
- destruction
destroying media and not data
- Grinding, shreeding
SSD- Physical detroy disk Crypto erase
- overwritting
- encryption
[3/2, 7:46 PM] Prabh nair: Classification information and Security assest
IMP:- categarition is part of classification
Classification: Ensure information
is marked in such a way that only those with appropriate level of clearance can
have access to the information.

Data Classification
analysing data that organization retains, determining its IMPORTANCE and VALUE and
then assigning it to a CATEGORY.

Sensitivity Vs Criticality

-Sensitivity describes the amount of damange that would be done should the
information be disclosed.

-Criticality describes the time sensitivity of the data.

Data Classificiation Considerations


- Value of data to org, can change over time.
- clearance is word used in militory.
- Level of damange that could be cuased if data is damanged or currpteed
- legal, regulatory to protect data
- industry and pupose /mission which org operates

DAta Classification Policy


- Data owner /bussiness owner will have access to data
How the data is secured
How lng the data the is to be retained
what menthods used to dispose of data
whether the data needs to be encrypted
appropriate use of data.

*D C helps the org comply with cuase and resolution *

What classification should be used


Class
-Commercial
-Military

Examples of categorizing data by title


- Private (SSN,bank a/c ,creditcard)
- Company restricted (data restricted to employee)
- Company confidential (can be all used to view can not be used)
- Public (can be used by Emp)

Who decides Data's Classificiation?


Individual who owns data
data owner should review classification atlease annually.

Data ower- who creates data, accountable for data.

Asset Management
- Tangable
- Intangable

- Inventory Managment
-Accurate
-Reside Who owns them
-H/w
-S/w

- Configuration managment
-
CMDB (Configuration Management Data Base)
- a logical entity with key integation points
- support and enables processess in service delivery, service support, IT asset
management and other IT disciplines.

Enablers for success of Asset management

Software Licensing
- Original copies of licensed software must be controlled by orgs to prevent
copyrights infringement
- All software copies should be managed by software or media Librarian
-conduct inventory
Determine and Maintain ownership

*Equipment is referred as services*

Introduciton
Data policy

cosideration
Cost, Owernship, Privacy, Liability, Sensitivity,
Existing law and policy requirements, Policy and process.

Information - Group of system produces information.(People, Process and


technology).
Information is always mission oriented.

Data owner
Data Custodianship
Data quality, effective control as defined by data owner,

Data quality Standards


- Accuracy, Precision, Resolution, Reliability,
Repeatability, Reproducibility, currency, Relevance, Ability to audit,
Completeness, Timeliness.

QC => internal standards


QA => External STandards

Improving Data Quality


Prevention
Correcction

Benefits of Data standards.


- Efficient data managemet
- Increased data sharing
higher qulaity data
improved data consistency
increased dtata intergration
Btter understanding of data
improved documentation of infrmation resources

Data Life cycle control


Data Audit
Note: Good Datamanagement required ongoing data audit.
Data storage and archiving
-server hardware and software
-network infrastructure
-database maintainance and updating
-database backup and recovery requirements
-archiving of data should be a priority data management issues

Data Remanence
- Residual physical representation of data that has been in some way erased
Commonly used countermeasures
- clearing
-/zerorition
- purging / Sanitazation
-multiple zerorition
- Degausssing (only for HDD) Physical level data destruction.
- destruction
destroying media and not data
- Grinding, shreeding
SSD- Physical detroy disk Crypto erase
- overwritting
- encryption
[3/2, 10:27 PM] Prabh nair: 1. Asset sec is about protecting security of
assets

2. Classification of information is very important - Categorisation is a part


of classification

3. Marking information based on appropriate clearance level – based on data


subject

4. Primary classific
ation based on business value - Classification deals with sensitivity-
Categorisation deals with impact on CIA – criticality

5. Data classification – analysing data – determining importance and value -


Classification aim based on value and importance - Marking handling is for
visibility and classification

6. Sensitivity and Criticality - Sensitivity – amount of damage that would be


done on disclosure - Critical talks about time sensitivity of data – how much
revenue / cust dissatisfaction

7. A classification policy needs to talk on all of these: access, security,


the data owner / business owner needs to know the regulatory requirements and
dictate data custodian (if both data owner / buss owner – pls select buss owner).
Method of disposal of data, encryption, appropriate use of data

8. Proper data classification helps the org with rules and regulation (ex
pcidss – card data to be encrypted) - Classification is of 2 types – commercial
and military - Clearance mostly used in military

9. Commercial Categories - private (ssn, addhaar), comp restricted – data


restricted to emp, comp confi- only within comp, public – open to all

10. Military categories– top secret, secret and confidential unrestricted

11. Components of asset management – Inventory management and configuration


management

12. Inventory – what, where and who owns assets - Overall objective of inv
management – accuracy of HW and SW

13. CMDB – config mgmt. DB – logical entity to maintain accuracy of secure state
across all systems - CMDB- enablers - single centralised repository, aligned to
Org processes and objectives – scalable technologies

14. Change management is part of config management – aims at stability

15. Good data management practices – strategic gaols, defined roles and resp,
documentation etc

16. Cost providing data Vs cost of providing access to data need to be considered

17. Software licences – must be controlled – conduct inventory scan to check


unlicensed software – to curb violations – prevents illegal duplication - done by
media librarian - Equipment = physical, alternate for equipment =service

18. Determine maintain ownership - Data owner – owns, data custodian – manages
data - Data steward – business driven responsibility – like a custodian but not
exactly – custodian examples – DB admin, app developer, proj manager etc

19. data life cycle - create store use share archive destroy - create and destroy
=data owner- others by data custodian

20. Data policy – strategic - Flexible, dynamic, attainable

21. Protecting Privacy - DS – DO-DC to GDPR DS – DC-DP – most R& O and objectives
as per GDPR –LFT, storage, purpose limitation, CIA, accuracy etc.,

22. Group of data = information – created from a system – information is always


mission oriented – produced by people process technology – Information owner knows
the impact of info on mission of org

23. QC – based on internal std and control – due care - QA – quality audit –
quality is assessed against ext std – due diligence

24. Verification and validation required for maintaining data quality –


prevention – correction - Documentation key to good data quality - Data
documentation aka meta data – help locating the data - Data documentation practice
- data set title file name (for identification) , file content, metadata

25. Effective working of data management requires data audit

26. Data Remanence - HDD –data magnetically wirtten on hard drive - SSD- solid
state drive - Flash memory

27. Track – sector and combination of them is cluster and data is stored here

28. Clearing not a technique to destroy disk but only make data unreadable and
unrecoverable – uses overwriting or zerozisation software overwrite - Random value
into Hexa decimal values – thus rendering data unreadable -Clearing performed only
once

29. Purging and sanitisation is same – removal to prevent reconstruction-


repeated clearing includes zerozisation and degaussing - more secure than clearing

30. Degauss – LCD – expose to strong magne


tic field – physical level data destruction - As per vendor guideline no guarantee
for reuse of disk

31. Degauss not applicable for SSD only destruction- first destroy data then disk

32. Cloud – crypto erase or crypto shredding – its an encryption- first data is
encrypted and then upload data on cloud. For destruction – destroy key and destroy
data which is encrypted. Encrypt key. So destroy both keys and then data -
Physical sec of storage resp of cloud serv provider

33. Ensure appropriate retention – legal, business, forensics and investigation

34. By scoping and tailoring – build effective security posture

35. 3 types - data at rest, data in transit and data in use. Only in 1st 2
encryption is possible
36. for data in use - data right management and DLP prevents copying in another
machine

37. For data in transit encryption ins imp because =even if link is intercepted
the content should not be readable

38. Data at rest – use encryption tools to balance between security and speed –
supported by strong password

39. Covered data means masked data

40. Removable media should have title, data owner and encryption date on its
label – generally very useful for tracking but can be counter-productive in case of
destructive motive
[3/3, 12:59 PM] Prabh nair: 1. Link Encryption – performed by service provider.
Happens at layer 2 – data link layer. All fields are encrypted i.e. data, headers
& routing info.
Advantages- all fields are getting encrypted. sniffing and eavesdropping not
possible
Disadvantages: Key distribution
2. End to end encryption – performed by client. Happens at layer 7 –application
layer
Recommendation – protocol TLS 1.1 or 1.2 & Email PGP-S/MIME
3. Data security in the cloud – protecting data moving to cloud SSL/TLS/IPsec,
Encryption. Detecting of data – DAM & DLP
4. Data Dispersion – data is replicated in multiple location across cloud for high
availability
5. Data Fragmentation- splitting dataset into smaller fragments and distributes to
multiple locations.
6. Masking, Obfuscation, Anonymization & Tokenization
7. Picking Encryption algorithm and establishing hardening requirements
8. Data protection – first identify and categorize , labeling
9. Data protection policy – Data retention – established protocol for keeping info
for operational and regulatory compliance.
10. Cloud considerations – Legal, regulatory and standards.

Domain 3: Security Engineering


1. System Engineering model and process . ISO/IEC15288:2008 System & software
engineering
2. The V-model (system life cycle)
3. Verification – whether to meet user’s documented requirement. It includes
validation
4. Validation – Testing against user’s objective (User acceptance testing).
5. Key system Engineering - Technical process and Management process
6. SELC – used to build the system. SDLC – software deliver
7. ISO /IEC 21827:2008 SSE-CMM
8. Security models, information systems security evaluation models, Product
evaluation models.
9. Computing components – CPU (ALU & Control Unit), Multitasking, Multiprocessing,
multithreading
10. Trusted computing Base(TCB) - is responsible for Confidentiality and integrity
. Controls all H/W, S/W, firmware within a system.
11. TCB features – trusted shell, security kernel, reference monitor
12. Security memory management. primary storage, secondary storage, Virtual memory
13. Volatile vs. Non-volatile memory.
14. Process states – super state or privilege mode – Problem state or user mode
15. Memory protection – isolation & segmentation. Segmentation PagingProtection
keying
16.
[3/4, 12:00 AM] Prabh nair: Domain 2 balance
1. Data in transit – 2 types of encryption - Link and end to end - Link
performed by the service provider - End to end by client

2. No change in the encryption algorithm

3. A sends data to B over internet. The data sent by A has header (IP of
sender and destination) and pay load. Both these are encrypted and sent to SP
router 1 . SP adds his (routing infor) header to encrypted data and encrypts again
(encrypted data and routing
infor header)and sends to router 2. Router 2 decrypts routing header reads – again
encrypts and fwds to next router and so on …only at the recipient end the message
is decrypted (all other steps only routing info header is decrypted and encrypted)

4. Use link and end to end to make it more secure

5. Link encryption happens on L2 of OSI and end to end at the application


layer

6. All data is encrypted in link along the communication line – disadvantages


- key management and distribution is a challenge- also if one node is compromised
then all traffic thru the node can be compromised- the fact that some decryption
happens at each node can be a vulnerability

7. End to end – decryption happens only at recipient end – routing info is


visible , only data in encrypted

8. TLS replaced with SSL bcos TLS is more strong

9. Masked data transmitted over email must be secured with strong encryption
like email - SMIME or PGP

10. Encryption should be applied when transmitting covered data between devices
in protected subnets with strong FW controls - At the firewall the connection is
broken and packets are decrypted and connection re-established post inspection of
packet. Now we must know which all packets should go thru this process

11. Dlp – at rest, use and transit- Dlp primary objective – egress filtering –
prevent unauthorised data leaving org

12. Dam - dam - data base activity monitoring used for integrity, it will detect
changes

13. Data security on cloud - protecting data moving into and within cloud (SSL,
TLS IPSec), protecting data on cloud – detection of data migration to cloud – DLP
and DAM

14. Data security on cloud - Data dispersion –replication of data across cloud
in multiple physical location- RAID – AVAILABILITY –retrieval from another zone

15. Data fragmentation – splitting data into small fragments or shards –


performance is the primary objective

16. Alternate of data encryption - 2018 syllabus – masking, anonymisation,


tokenisation , obfuscation

17. Obfuscation aka masking – omitting, hiding, replacing sensitive info


18. Masking – hiding parts of data set. Masking is of 2 types – static (when data
is not in used – stored data in DB), dynamic (when data is use – PW masked while
typing in application)

19. Data anonymisation - people to whom data pertains is removed/ remain


anonymous – PIPL.COM – removal or encryption of personal references is used

20. Tokenisation - data in public cloud can be integrated with private cloud
that stores sensitive data; The data sent to public cloud is altered and contains a
ref to the data in private cloud example -Used in POS devices – PCIDSS –token alone
is sent for authentication – cr card numbers are exchanged with other numbers is
database – called as tokens – these numbers are static

21. Examples of insecure NW protocols and alternatives – Web access - HTTP


instead use HTTPS; SSL instead use TLS. File transfer – FTPS, SFTP SCp to be used
instead of FTP, RCP. Remote shell – SSH V3 to be used instead of Telnet. Remote
desktop RAdmin, RDP to be used instead of VNC

22. Handling requirement –Data identification – classification/categorisation –


label and mask

23. Physical labelling (document) and logical labelling (digital document). DLP
works on logical labels for restricting information. FW cannot inspect based on
label, it can only inspect based on predefined rules

24. Labelling – define information. marking in internal – label external- label


can also contain =ownership and other associated information when media without
label – pls label it at highest level of sensitivity

25. store media safely – if not required – pls destroy

26. Cloud data retention 2018 syllabus -–legal req must be documented– mapping
of data – classification – driven by policy appropriate

Domain 3 first part

Domain 3- Building security and implementing security

1. Sys engineering models follow a life cycle - Standard for building a


product ISO 15288:2008

2. V model system life cycle – 6


steps – order important

3. Verification check against the requirement and validation test against


user objective – UAT - 1st verification and then validation

4. SDLC – for developing software and SELC- methodology for building a system
- Steps in SDLC and SELC exam question

5. When u build a system the order of priority is people, process and


technology

6. ISO 21827:2008 – SSE CMM- capability maturity model – system engineering

7. Fundamental concept of sec urity model – v v vimportant- examples of


security models
8. Computer components, ALU, CPU, GPU, memory, storage,buses, I/O, nw, OS

9. Cpu - control unit and arithmetic logic unit like a traffic cop-
Fetches instruction from the memory and Decodes, Executes the codes and Stores back
to memory – FDES order

10.

· Multitasking – only one processor – various tasks –shared processing

· Multi processing – various processors – used in cloud and grid computing

· Multi threading – only 1 processor- multiple thread of single application


/ multiple thread of multiple application processed by same processor - Example -
MS paint – to run the paint execute process – split into task – task split threads

11. TCB – very important – responsible for confidentiality and integrity –this
has a Hware, Sware and a firmware within a system and enforces security of a system
and describes the concept of trust in a system

12. TCB has 4 functions – I/O, execution of domain security, memory protection
and process activation

13. Trusted computing base- admin level restrictions esp for installing new
software by any user there is a restriction – example -Black berry and Linux still
use TCB

14. System modification is gen done only by root - Internal nucleus is kernel -
layer 0 - root - the rounds are called rings of protection- root kit – a malware
which compromises the layer 0

15. Root mode is Trusted Shell – an isolated user interface via command line that
cannot be accessed by external users / observers – U have to be a privileged user
for accessing the trusted shell

16. SECurity KERNEL – software / hardware that applies reference monitor

17. Reference monitor manages the access controls - ensures proper privileges
between objects and subjects - example - the prompt to run as admin to do
modifications at the root level - Ref monitor is like a bodyguard checks access
privileges with kernel

18. Rules defined by reference monitor – rules are forwarded to kernel and user
is awarded access or otherwise - The kernel accesses the ref monitor before access
is granted

19. TCB – main objective is to enforce security policy – Ref monitor operates at
the separation point between trusted and untrusted realm

20. 2 types of users – Privileged (supervisor state – ring 0 to2), normal user
(problem state – ring 3 and above)

21. Other terms – Execution domain – isolated domain where TCB can function
without external access from other systems ; Sec perimeter –conceptual line between
trusted and untrusted components; Trusted path – a connection that cannot be
compromised

22. Secure memory management – primary – ram, cache - Secondary – H disk


23. If running out of primary memory space and spills into secondary memory –
virtual memory

24. Volatile – RAM – need power – Non-volatile – do not need power - ROM- FLASH
MEMORY

25. Memory protection – isolation, segmentation, paging

26. Isolation – it’s a requirement for multilevel security mode - logical –


controls via OS

27. Segmentation – dividing computer memory into segments – more physical – HW


controls

28. Paging is further segmenting - Paging – dividing the memory address space
into equal size block called pages

29. Protection keys – each process has unique key used by paging for processing
information

30. Firmware – The storage of programs or instructions in ROM, typically embedded


in HW and used to control HW. Non-volatile

You might also like