Cisa Notes 2 (AutoRecovered)
Cisa Notes 2 (AutoRecovered)
1. Availability of system utility is IS auditor most concerned when conducting an audit of client-
server database security because may enable unauthorized changes to be made to data on the
client-server database.
2. Recovery point objective (RPO) : age of the recovered data (ie. How long ago the data were
backed up)->if RPO is very low like minutes, it means org cannot afford to even lose even a few
minutes of data->data mirroring should be used
IF RPO is high->other backup procedures such as tape backup and recovery could be used
High Recovery time Objective (RTO):IT system may not be needed immediately after the disaster
declaration (it can be recovered later)
3. Mobile site: specially designed trailers that can be quickly transported to a business location or to
an alternate site to provide ready-conditioned information processing facility
Warm site: partially configured usually with network connections and selected peripheral
equipment but without main computer
Cold site: have only basic environment to operate IPF, ready to receive equipment but do not offer
any components at site in advance
Hot site: fully configured and ready to operate within several hours or even minutes
A4-2. Transition clause from old supplier to new supplier in the case of expiration or termination is
most important because there is a risk the old supplier may simply pull the plug make no data
available to the org
A4-3 Right to audit is most important in an outsourcing contract with a service provider
A4-11 To ensure system availability, test plans and procedures should be exist and closely followed
A4-12 ** Incident response plan determines the information security responses to incidents such as
cyberattacks on systems. This plan establishes procedures to enable security personnel to identify,
mitigate and recover from malicious computer incidents
Open systems are those which suppliers provide components whose interfaces are defined by public
standards, thus facilitating interoperability (help with each other) between systems made by
different vendors
A4-16: Critical element of disaster recovery plan: offsite storage of backup data
A4-24 Quality of Service: traffic prioritization and resource reservation control mechanisms rather
than the achieved service quality->priority to business applications and end users through
allocation of dedicated parts of bandwidth to specific traffic
A4-28
Retention time: duration of time for which the information should be maintained
Network diagnostic tool: client/server program that provides network configuration and
performance testing to a user desktop or laptop
Help desk report: prepared by help desk, staffed or supported by IS technical support personnel
trained to handle problems
Protocol analyzers: network diagnostic tools that monitor and record network information from
packets travelling in the link to which the analyser is attached
Fallback procedures: restore a system to a previous state->when software is being upgraded byt
the upgrade does not work and requires a fallback to its former state
A4-39 Concurrency control: prevent data integrity problems, which can arise when two update
processes access the same data item at the same time
A4-40
*Gateway-Application layer
A4-69 Escrow agreement: ensure customer can continue to use the software and obtain technical
support if a vendor were to go out of business
Object oriented technology
1. inheritance
2. encapsulation
3. polymorphism
SQL: structured query language->used to communicate with a database->SQL statements are sed to
perform tasks such as update data on database or retrieve data from database
Interface testing: test the interaction with external systems but would not validate the performance
of changed system
Network topology: arrangement of the elements (links, nodes etc) of a communication network,
used to define or describe the arrangement of various types of telecommunication networks
Redundant Array of Inexpensive Disks (RAID) level 1:
Provides disk mirroring, data written to one disk are also written to another disk->if one disk fails,
the second disk take over->ensure availability of data
Before image dump: last transaction in the dump will not have updated the database prior to the
dump being taken
For online systems, it is particularly important to ensure periodic dumps of transaction logs is the
only safe way of preserving timely historic data because online system do not have a paper trail that
can be used to recreate data, maintaining transaction logs is critically important to prevent data loss
Encryption Hashing
Both ways One way, you cant get the original file with the
hash value
Unique file In rare occasion, there will be hash conflict
Check digit->transposition and transcription errors->check accuracy (you have formula and calculate
into a certain number and you add it in the last number)
Parity bits: detect data transmission error->ensure data completion-> ensure data integrity (how?
You check how many 1 in the file and if 4 use 0)
Checksum: same as parity but able to identify complex errors by increasing the complexity of
arithmetic
CRC: more advanced version of parity and checksum and increase complexity of the arithmetic
Primary reason for establishing audit trails: establish accountability and responsibility for processed
transactions
Componenets of IDS: Sensors(collect data)->analyser (analyse data and determine intrusive activity)-
>user interface (users view result and take actions)-> administration console (manage IDS rules and
function)
Statistical based IDS: generate most false positive, determine normal (known and expected)
behaviour of the system
Neural network: similar to statistical based IDS with added self learning , capable of capturing
relationship missed by other statistical methods
*IDS wont detect application level vulnerabilities, will not detect encrypted traffic
Types of firewall:
What is bastion host: kind of reception area in office premise, only cpt allows to be addressed
directly from public network and designed to protect the rest of network from exposure
Proxy: middleman, stands between internal and external network; will not allow direct
communication between two networks
Firewall Implementation
For Confidentiality & Authenticity & Integrity: Hash-encrypt using sender’s private key; message-
encrypt using receiver’s public key
Digital signature:
Telecommunication network:
2) Baseband network-shared with many other users and requires encryption of traffic but still may
allow some traffic analysis by an attacker
3)
Testing
Data Encryption Standard Susceptible to brute force attack and has been
broken publicly ->no assurance that data
encrypted using DES will be protected from
unauthorized disclosure
Message digest 5 Generate one way hash of data to testand
verify data integrity
Does not encrypt data but put data through
mathematical process that cannot be reversed
Advanced Encryption Standard Greatest assurance that data are protected
Secure Shell (SSH) Encrypt data transmitted during a session, but
cant encrypt data at rest including USB
Social engineering attack: gather sensitive information to launch an attack, can be exercised ver any
kind of telephony
Responsibility:
2. Data custodians: implement information security, access rules to data and programs
*Security level of private key system depends on number of encryption key bits(key length)-
>larger number of bits, more difficult it would be difficult to brute force
Back door: opening implanted into or left in software that enables unauthorized entry into a
system
Ways to connect a private network over internet in small medium org:
-VPN(best)>dedicated line(exp)>leased line(exp but private option)>Integreated services
digital network (not encrypted)
Function of VPN:
-hide information from sniffers on internet using tunnel->works based on encapsulation and
encryption of sensitive traffic
-using tunnelling->confidentiality is ensured
Web of trust: suitable for secure communication within a small group
Keberos Authentication system: for a file to access to file server, it must pass through key
distribution centre, request for a ticket with encrypted key, distribution centre decrypt the
key and verify the client->send back a ticket encrypted with a secret key
*Voltage regulator->protect against short-term power fluctuations
Peer to peer computing: In peer-to-peer (P2P) networking, a group of computers are
linked together with equal permissions and responsibilities for processing data. Unlike
traditional client-server networking, no devices in a P2P network are designated solely to
serve or to receive data.
Filtering techniques:
Threat Vulnerability
External factor Internal factor
Not in our control Can be controlled
Example: fire, earthquake, malware, system Example: missing anti-virus, weaking
failure, hacker coding, weak access control
Probability *Impact->Risk
Threat* vulnerability->risk
R=P*I
R=T*V
Risk
-situation involve exposure to danger
-combination of probability of an event and its consequences
-potential a given threat will exploit vulnerabilities
-effect of uncertainty on objectives
Steps in risk assessment
1. Understand business environment
2. Identify critical assets
3. identify all potential risks for critical assets
4. prioritize risks in order of criticality
5. evaluate control mechanism available
6. apply relevant controls
Types of risk
1. Inherent risk: risk before controls
2. residual risk: risk after controls
3. control risk: ineffective controls (risk that a misstatement could occur but may not be
detected/prevented by entity’s internal control mechanism)
4. detection risk: ineffective audit
5. audit risk: Inherent risk+control risk +detection risk
Full operational test: conducted after paper and preparedness test, quite exp
Preparedness test: test the adequacy of the preparedness of local operations
Paper test: structured walkthough of the disaster recovery plan and should be conducted
before preparedness test
Regression test: not test in disaster recovery plan and is used in software development
and maintenance
Disaster recovery planning: technological aspect of BCP that focuses on IT systems and
operations
Implementation of DRP will increase the cost
BCP Process: Complete business impact analysis->develop recovery strategy->develop
plan->test and maintain the plan->implement the plan
Domain 3
Unit testing (individual program or module)->integrated testing(accurate flow of
information between two>system testing (full fledge test eg. Stress test, load test, volume
test)->final acceptance testing (QAT &UAT)
Unit test
-test of individual program or module
-test done during development stage
-white box is applied (test of internal program logic)
Integrated testing
-test of connection of two or more module
-perform testing on architectural design
A3-177
Project sponsor is the owner of the project->most appropriate person to ask whether the
business requirements defined as part of the project objectives
Project manager organize and ensure direction of the project aligns to the overall direction,
complies with standards and monitors project milestones
Scope creep
Check digit: use a set of formula to calculate one number->prevent transposition error