CISA Exam Prep Domain 5 - 2019
CISA Exam Prep Domain 5 - 2019
Domain 5
Domain 1: Auditing
Domain 5: Protection of Information Systems
Information Assets, 27% Process, 21%
6
Ensure Confidentiality, Integrity and Availability
Confidentiality
Security
Integrity Availability
7
Information Asset Security Frameworks, Standards and Guidelines
8
Auditing the Information Security Management Framework
9
Privacy Principles
10
Privacy Principles Good Practice
• Privacy should be considered from the outset and be built in by design. It should be systematically built into
policies, standards and procedures from the beginning.
• Private data should be collected fairly in an open, transparent manner. Only the data required for the purpose
should be collected in the first instance.
• Private data should only be used and/or disclosed for the purpose for which they were collected.
11
Purpose of Privacy Impact Analysis
12
IS Audit to Assure Compliance Privacy Policy, Laws and Other Regulations
13
Audit Considerations for Privacy
14
Physical Access and Environmental Controls
15
Physical Access and Environmental Controls
• An effective control is one that prevents, detects, and/or contains an incident and enables recovery from an
event.
• Controls can be:
Proactive
• Safeguards
Reactive
• Controls that attempt to
prevent an incident • Countermeasures
• Controls that allow the
detection, containment and
recovery from an incident
Managerial, Technical and Physical Controls
18
Physical Access Issues
• Unauthorized entry
• Blackmail
• Embezzlement
Physical Controls Examples
20
Physical Access Audit
• The test should include all paths of physical entry, as well as the following locations:
Power failure
Water damage/flooding
Manmade concerns
• Terrorist threats/attacks
• Vandalism
• Equipment failure
Environmental Controls
• Environmental exposures should be afforded the same level of protection as other types of exposures.
Possible controls include:
Fireproof and
Strategically
Fire suppression fire-resistant Electrical surge
located
systems building and protectors
computer rooms
office materials
Documented and
Uninterruptible Power leads
Emergency tested BCPs and
power supply/ from two
power-off switch emergency
generator substations
evacuation plans
Environmental Control Audit
• The IS auditor should first establish the environmental risk by assessing the location of the data center.
• In addition, the IS auditor should verify that the following safeguards are in place:
• The directory of facility operations has asked the IS audit team to perform a gap
analysis of the current policies and procedures at the headquarters building that also
houses the primary data center. You find that policies and procedures are currently
focused on operations and maintenance contracting activities.
Power line conditioners are used to compensate for peaks and valleys in the power supply and reduce peaks in the
power flow to what is needed by the machine. Any valleys are removed by power stored in the equipment.
Knowledge
Check An IS auditor is reviewing the physical security measures of an organization.
2 Regarding the access card system, the IS auditor should be MOST concerned that:
A. Non personalized access cards are given to the cleaning staff, who use a sign-in sheet but
show no proof of identity
B. Access cards are not labeled with the organization’s name and address to facilitate easy
return of a lost card
C. Card issuance and rights administration for the cards are done by different departments,
causing unnecessary lead time for new cards
D.
The computer system used for programming the cards can only be replaced after three
weeks in the event of a system failure
Knowledge
Check An IS auditor is reviewing the physical security measures of an organization.
2 Regarding the access card system, the IS auditor should be MOST concerned that:
A. Non personalized access cards are given to the cleaning staff, who use a sign-in sheet but
show no proof of identity
B. Access cards are not labeled with the organization’s name and address to facilitate easy
return of a lost card
C. Card issuance and rights administration for the cards are done by different departments,
causing unnecessary lead time for new cards
D.
The computer system used for programming the cards can only be replaced after three
weeks in the event of a system failure
Physical security is meant to control who is entering a secured area, so identification of all individuals is of utmost
importance. It is not adequate to trust unknown external people by allowing them to write down their alleged name
without proof (e.g., identity card, driver’s license).
Identity and Access Management
31
Security Objectives
• Security objectives to meet an organization’s business requirements should ensure the following:
• Adequate protection for sensitive data while stored and when in transit, based on organizational
requirements
System Access Permission
• System access permission generally refers to a technical privilege, such as the ability to read, create, modify or
delete a file or data; execute a program; or open or use an external connection.
• System access to computerized information resources is established, managed and controlled at the physical
and/or logical level.
• Access authorization should be regularly reviewed to ensure they are still valid.
• The IS auditor should evaluate the following criteria for defining permissions and granting access:
• Need-to-know
• Accountability
• Traceability
• Least privilege
• SoD
Information Security and External Parties
• Access by external parties to the organization’s information should not be provided until the
appropriate controls have been implemented and, where feasible, a contract has been signed
defining the terms and conditions for the connection or access and the working arrangement.
• External parties might put information at risk if their security management is inadequate.
• NOTE – Controls should be identified and applied to administer external party access to
information processing facilities.
• Asset protection and access control polices apply to customers to meet security requirements of
assets.
35
Third-Party Access
• Security roles and responsibilities of employees, contractors and third-party users should be defined and
documented in accordance with the organization’s information security policy.
• Screening
• All candidates for employment, contractors or third-party users should be subject to background
verification checks.
• The access rights of all employees, contractors and third-party users to information and information
processing facilities should be removed upon termination of their employment, contract or agreement, or
adjusted upon change.
Logical Access
39
Logical Access Exposures
• Data leakage
• Computer shutdown
40
Paths of Logical Access
• Direct path
• Local network
• Remote access
41
Activity
A. Piggybacking
B. Dumpster diving
C. Shoulder surfing
D. Impersonation
Knowledge
Check An information security policy stating that “the display of passwords must be
1 masked or suppressed” addresses which of the following attack methods?
A. Piggybacking
B. Dumpster diving
C. Shoulder surfing
D. Impersonation
If a password is displayed on a monitor, any person or camera nearby could look over the shoulder of the user to
obtain the password.
Knowledge
Check
With the help of a security officer, granting access to data is the responsibility of:
1
A. Data owners
B. Programmers
C. System analysts
D. Librarians
Knowledge
Check
With the help of a security officer, granting access to data is the responsibility of:
1
A. Data owners
B. Programmers
C. System analysts
D. Librarians
• Access control software is used to prevent the unauthorized access and modification to an
organization’s sensitive data and the use of system critical functions.
• Access controls must be applied across all layers of an organization’s IS architecture, including
networks, platforms or OSs, databases and application systems.
General operating and/or application systems Database and/or application-level access control
access control functions functions
• Create or change user profiles. • Create or change data files and database profiles.
• Assign user identification and authentication. • Verify user authorization at the application and
• Apply user logon limitation rules. transaction level.
• Notification concerning proper use and access • Verify user authorization within the application.
prior to initial login. • Verify user authorization at the field level for
• Create individual accountability and auditability changes within a database.
by logging user activities. • Verify subsystem authorization for the user at the
• Establish rules for access to specific information file level.
resources (e.g., system-level application resources • Log database/data communications access
and data). activities for monitoring access violations.
• Log events.
• Report capabilities.
Access Control Types
• Logical access identification and authentication (I&A) is the process of establishing and proving a
user’s identity.
• For most systems, I&A is the first line of defense because it prevents unauthorized people (or
unauthorized processes) from entering a computer system or accessing an information asset.
Identification and Authentication
• The user’s lack of knowledge on the risk associated with sharing authentication elements
Authentication Methods
• Single sign-on (SSO) is the process for consolidating all of an organization’s platform-based administration,
authentication and authorization functions into a single centralized administrative function.
Authentication Methods
Tokens
Biometrics
Authorization
• Authorization refers to the access rules that specify who can access what.
• Access control is often based on least privilege, which refers to the granting to users of only those
accesses required to perform their duties.
• The IS auditor needs to know what can be done with the access and what is restricted.
• The IS auditor must review access control lists (ACLs). An ACL is a register of users who have
permission to use a particular system and the types of access permitted.
Authorization Issues
Risks Controls
• Audit trail records should be protected by strong access controls to help prevent unauthorized
access.
• The IS auditor should ensure that the logs cannot be tampered with, or altered, without leaving an
audit trail.
• When reviewing or performing security access follow-up, the IS auditor should look for:
• Patterns or trends that indicate abuse of access privileges, such as concentration on a sensitive
application
• Violations (such as attempting computer file access that is not authorized) and/or use of incorrect
passwords
Access Control Lists
• To provide security authorizations for the files and facilities listed previously, logical access
control mechanisms use access authorization tables, also referred to as access control lists
(ACLs) or access control tables. ACLs refer to a register of:
• Users (including groups, machines, processes) who have permission to use a particular
system resource
• When a user changes job roles within an organization, often their old access rights are not
removed before adding their new required accesses.
• Without removing the old access rights, there could be a potential SoD issue.
56
Logical Access Security Administration
• Software controls over access to the computer, data files and remote access to the network should
be implemented.
• The physical control environment should be as secure as possible, with additions such as lockable
terminals and a locked computer room.
• Access from remote locations via modems and laptops to other microcomputers should be
controlled appropriately.
• Opportunities for unauthorized people to gain knowledge of the system should be limited by
implementing controls over access to system documentation and manuals.
• Controls should exist for data transmitted from remote locations such as sales in one location that
update accounts receivable files at another location. The sending location should transmit control
information, such as transaction control totals, to enable the receiving location to verify the update
of its files. When practical, central monitoring should ensure that all remotely processed data have
been received completely and updated accurately.
• When replicated files exist at multiple locations, controls should ensure that all files used are correct
and current and, when data are used to produce financial information, that no duplication arises.
57
Remote Access Security
• Host systems not secured appropriately • Encryption tools and techniques such as
use of a VPN
• Physical security issues over remote users’
computers • System and network management
58
Audit Logging in Monitoring System Access
• Access Rights to System Logs • IS Audit Review • Tools for Audit Trail (Logs)
• Access rights to system • The IS auditor should Analysis
logs for security ensure that the logs cannot • Audit reduction tools
administrators to perform be tampered with, or • Trend/variance-detection
the previous activities altered, without leaving an tools
should be strictly audit trail.
• Attack-signature-detection
controlled. • When reviewing or tools
• A periodic review of performing security access
• SIEM systems
system-generated logs follow-up, the IS auditor
can detect security should look for:
problems, including • Patterns or trends that
attempts to exceed indicate abuse of access
access authority or gain privileges, such as
system access during concentration on a
unusual hours. sensitive application
• Violations (such as
attempting computer
file access that is not
authorized) and/or use
of incorrect passwords
59
Auditing Logical Access
• Obtain a general understanding of the security risk facing information processing, through a review
of relevant documentation, inquiry, observation, risk assessment and evaluation techniques.
• Document and evaluate controls over potential access paths into the system to assess their
adequacy, efficiency and effectiveness by reviewing appropriate hardware and software security
features and identifying any deficiencies or redundancies.
• Test controls over access paths to determine whether they are functioning and effective by applying
appropriate audit techniques.
• Evaluate the access control environment to determine if the control objectives are achieved by
analyzing test results and other audit evidence.
• Evaluate the security environment to assess its adequacy by reviewing written policies, observing
practices and procedures, and comparing them with appropriate security standards or practices
and procedures used by other organizations.
60
Auditing Logical Access Process
Reviewing
Familiarization Assessing and Reviewing Reports
Interviewing Application
with the IT Documenting the from Access
Systems Personnel Systems
Environment Access Paths Control Software
Operations Manual
61
Data Leakage
• Data leakage involves the unauthorized transfer of sensitive or proprietary information from an internal
network to the outside world.
• Data leak prevention is a suite of technologies and associated processes that locate, monitor and protect
sensitive information from unauthorized disclosure.
• Data at rest
• Data in motion
• Data in use
• Workflow management
• Reporting
64
The Open Systems Interconnection (OSI) Model
• The OSI model defines groups of functionality required for network computers into layers, described as
follows:
2. Data link layer: Divides data into frames that can be transmitted by the physical layer
3. Network layer: Translates network addresses and routes data from sender to receiver
4. Transport layer: Ensures that data are transferred reliably in the correct sequence
7. Application layer: Mediates between software applications and other layers of network services
65
Traditional OSI Model
66
Associated LAN Risks
67
IS Audit’s Role in LAN Technology
68
Network Infrastructure Security
• The IS auditor should be familiar with risk and exposures related to network infrastructure.
• IS auditors need to understand the advantages and disadvantages of virtualization to determine whether
the enterprise has considered the applicable risk in its decision to adopt, implement and maintain this
technology.
Advantages Disadvantages
• The IS auditor must understand the risk and security factors needed to ensure that proper controls are in
place when a company connects to the Internet.
• Examples of passive attacks include network analysis, eavesdropping and traffic analysis.
Internet Security
• Once enough network information has been gathered, an intruder can launch an actual attack against a
targeted system to gain control.
• Examples of active attacks include denial of service (DoS), phishing, unauthorized access, packet replay,
brute force attacks and email spoofing.
• The IS auditor should have a good understanding of the following types of firewalls:
• Packet filtering
• Application firewall systems
• Stateful inspections
Internet Security
• Screened-host firewall
• Dual-homed firewall
• Demilitarized zone (DMZ) or screened-subnet
firewall
• A firewall is a system or combination of systems that enforces a boundary between two or more
networks.
• Typically forms a barrier between a secure and an open environment such as the Internet, apply
rules to control the type of networking traffic flowing in and out.
• Most commercial firewalls are built to handle commonly used Internet protocols.
77
Firewall Features
• There are different types of firewalls, but most of them enable organizations to:
• Encrypt packets sent between different locations within an organization by creating a Virtual Private
Network (VPN) over the Internet (i.e., IPSec, VPN tunnels)
78
Firewall Technologies
• Packet Filters
• Stateful Inspection
• Application Proxy
• Next Generation Firewall
79
Packet-filtering Firewall Model
• A first-generation firewall, in packet filtering, a screening router examines the header of every data
packet traveling between the Internet and the organization’s network.
• With this, the router can prevent certain packets from being sent between the Internet and the
corporate network.
80
Packet-filtering Firewalls
Advantages
Disadvantages
81
Common Attacks Against Packet-filtering Firewalls
• The attacker defines the route the IP packet takes such that it will bypass
the firewall.
Source routing specification • This type of attack centers around the routing that an IP packet must
take when it traverses the Internet from the source host to the
destination host.
82
Application Firewall Systems
• Application firewall systems allow information to flow between systems but do not allow the direct exchange
of packets.
• Application-level gateways: Systems that analyze packets through a set of proxies—one for each service.
• The implementation of multiple proxies impacts network performance, so when network performance is a
concern, a circuit-level gateway may be a better choice.
• Circuit-level gateways: Systems that use one proxy server for all services.
• These are more efficient and also operate at the application level.
• TCP and UDP sessions are validated, typically through a single, general-purpose proxy before opening a
connection.
83
Application Firewalls
Advantages
Disadvantages
84
Stateful Inspection Systems
• Also referred to as dynamic packet filtering, a stateful inspection system tracks the destination IP
address of each packet that leaves the organization’s internal network.
• The stateful system maps the source IP address of an incoming packet with a list of destination IP
addresses that is maintained and updated.
• When a response to a packet is received, its record is referenced to determine whether the
incoming message was made in response to a request that the organization sent out.
Advantages
Disadvantages
• Complex to administer
86
Stateless Vs. Stateful Firewalls
• Stateless filtering does not keep the state of ongoing TCP connection sessions.
• This contrasts with the action of stateful systems, which keep track of TCP connections.
• The stateless system has no memory of what source port numbers a session’s client selected.
• Stateless firewalls are quicker, but less sophisticated than stateful firewalls.
• Because UDP traffic is stateless, applications that require UDP to operate from the Internet into a corporate
network should be:
• Used sparingly
• Implemented with alternate controls
Firewall Implementations
• Firewall implementations can take advantage of the functionality available in a variety of firewall designs to
provide a robust and layered approach to protect an organization’s information assets.
• Screened-host firewall: Implements basic network layer security (packet filtering) and application server
security (proxy services)
• Dual-homed firewall: Has two or more network interfaces, each of which is connected to a different
network.
91
Firewall Platforms
• They are flexible and may include additional services such as virus protection.
• When server-based firewalls are used, operating systems in servers are often vulnerable to attacks.
• An appliance is a device with all software and configurations pre-setup on a physical server that is plugged in
between two networks. It is generally better to use appliances, rather than normal servers, for the firewall.
Next Generation Firewalls (NGFW)
• NGFWs are firewalls aimed at addressing two key limitations found in earlier firewalls:
• The firewall’s inability to inspect packet payload
• The firewall’s inability to distinguish between types of web traffic
• An NGFW is an adaptive network security system capable of detecting and blocking sophisticated attacks.
• The WAF operates at higher levels in the OSI model, generally at level 7.
• A WAF may be customized to identify and block many types of attacks, but
customization requires effort.
• When changes to the application are made, the WAF rules need changes as
well.
94
Development and Authorization of Network Changes
95
Shadow IT
96
Shadow IT Controls
• User education
• Shadow IT policy: A shadow IT policy that aligns with business objectives and support
security requirements.
97
Activity
• External
• Standard ISP provided T1s and OS3
• Satellite communications
• Point to Point RF
• Internal
• WIFI for corporate and guests
100
Data Classification
• In order to have effective controls, organizations must have a detailed inventory of information assets.
• Most organizations use a classification scheme with three to five levels of sensitivity.
• The information owner should decide on the appropriate classification, based on the organization’s data
classification and handling policy.
• Data classification must also take into account legal, regulatory, contractual and internal requirements for
maintaining privacy, confidentiality, integrity and availability.
Activity
• When the firewall was sent off site for vendor maintenance,
what actions should have been taken?
Knowledge
Check
The FIRST step in data classification is to:
1
A. Establish ownership.
A. Establish ownership.
Data classification is necessary to define access rules based on a need-to-do and need-to know basis. The data
owner is responsible for defining the access rules; therefore, establishing ownership is the first step in data
classification.
Knowledge
Check From a control perspective, the PRIMARY objective of classifying information assets
2 is to:
A. Establish guidelines for the level of access controls that should be assigned.
A. Establish guidelines for the level of access controls that should be assigned.
Information has varying degrees of sensitivity and criticality in meeting business objectives. By assigning classes or levels of
sensitivity and criticality to information resources, management can establish guidelines for the level of access controls that
should be assigned. End user management and the security administrator will use these classifications in their risk assessment
process to assign a given class to each asset.
Data Encryption and Encryption-related Techniques
108
Encryption
Encryption algorithm
Encryption key
• A piece of information that is used by the encryption algorithm to make the encryption or
decryption process unique
Key length
• A predetermined length for the key; the longer the key, the more difficult it is to
compromise
Encryption Schemes
• The underlying algorithm works even if the private key is used for
encryption and the public key for decryption.
Digital Signature Schemes
B. Work is being done in tunnel mode with the nested services of authentication header (AH)
and encapsulating security payload (ESP).
D. Work is being done in transport mode with the nested services of AH and ESP.
Knowledge
Check Which of the following BEST determines whether complete encryption and
1 authentication protocols for protecting information while being transmitted exist?
B. Work is being done in tunnel mode with the nested services of authentication header (AH)
and encapsulating security payload (ESP).
D. Work is being done in transport mode with the nested services of AH and ESP.
Tunnel mode provides encryption and authentication of the complete IP package. To accomplish this, the
authentication header and encapsulating security payload services can be nested.
Public Key Infrastructure
116
Public Key Infrastructure
• Public key infrastructure (PKI) allows a trusted third party to issue, maintain and revoke public key certificates.
ELEMENTS OF PKI
A digital certificate is composed of
Digital a public key and identifying
Certificates information about the owner of
The CA is an authority in a
network that issues and An RA is an authority in a
manages security credentials network that verifies user
Certificate Registration
and public keys for message requests for a digital certificate
Authority (CA) Authority (RA)
signature verification or
and tells the CA to issue it.
encryption.
Web-based Communications Technologies
118
VOIP Security
• The key to securing VoIP is to use the security mechanisms such as those deployed in data networks (e.g.,
firewalls, encryption) to emulate the security level currently used by public switched telephone network
(PSTN) network users.
• OS patches and virus signature updates must be promptly applied to prevent a potential system outage. To
enhance the protection of the telephone system and data traffic, the VoIP infrastructure should be
segregated using virtual local area networks (VLANs).
• Any connections between these two infrastructures should be protected using firewalls that can interpret
VoIP protocols.
119
Email Security
120
Peer-to-Peer Computing
121
Instant Messaging
122
Social Media
123
Cloud Computing Service Models
124
Cloud Computing Deployment Models
125
Cloud Computing Essential Characteristics
126
Cloud Security Objectives
• Ensure the integrity and preserve the confidentiality information and sensitive data while stored and in
transit.
• Ensure adherence to trust and obligation requirements in relation to any information relating to an
identified or identifiable individual (i.e., data subject) in accordance with its privacy policy or applicable
privacy laws and regulations.
127
IS Auditor and Cloud Computing
• Data ownership, data custody and security administration related to cloud deployment models: The CSA
provides a questionnaire that organizations can use to ascertain a service providers compliance to the
Controls Matrix.
• Legal requirements and unique risks in the cloud environment: Regulations such as GDPR can present
unique challenges for data stored in the cloud.
• Potential limitations to the right-to-audit in a cloud environment: An auditor may not be able to
physically investigate a vendor’s facilities.
128
Virtualized Environments
129
Virtualized Environments
• Bare metal/native virtualization occurs when the hypervisor runs directly on the underlying hardware,
without a host OS.
• Hosted virtualization occurs when the hypervisor runs on top of the host OS (Windows, Linux or
MacOS). The hosted virtualization architectures usually have an additional layer of software (the
virtualization application) running in the guest OS that provides utilities to control the virtualization while
in the guest OS, such as the ability to share files with the host OS.
• Containerization: Containers include the application and all of its dependencies but share the kernel
with other containers. They run as an isolated process in user space on the host operating system.
130
Virtualization Risk
• The following types of high-level risk are representative of the majority of • Virtualization products
virtualized systems in use: rarely have hypervisor
access controls:
• Rootkits
Therefore, anyone who
• Improper configuration
can launch an
• Guest tools
application on the host
• Snapshot/images
OS can run the
hypervisor.
131
Virtualization Typical Controls
132
Mobile, Wireless and Internet of things
133
Mobile Computing
• The following controls will reduce the risk of disclosure of sensitive data stored on mobile devices:
Virus
Device Physical
Tagging Data storage detection and
registration security
control
Acceptable
Encryption Compliance Approval Due care
use policy
• Malware protection
BYOD Risks
138
Wireless Security Threats and Risk Mitigation
139
Internet of Things Risk
• Device vulnerabilities
Technical risk: • Device updates
• Device management
140
Security Event Management
141
Security Awareness Training and Programs
142
Security Awareness Training
• An active security awareness program can greatly reduce risk by addressing the behavioral element of
security through education and consistent application of awareness techniques.
• All employees of an organization and third-party users must receive appropriate training and regular
updates on the importance of security policies, standards and procedures in the organization.
• In addition, all personnel must be trained in their specific responsibilities related to information security.
Knowledge
Check Which of the following is the BEST way for an IS auditor to determine the
1 effectiveness of a security awareness and training program?
Interviewing a sample of employees is the best way to determine the effectiveness of a security awareness and
training program because overall awareness must be determined and effective security is dependent on people.
Reviewing the security training program would not be the ultimate indicator of the effectiveness of the awareness
training.
Information System Attack Methods and Techniques
146
Fraud Risk Factors
Motivation
Fraud
Risk
Factors
Rationalization Opportunity
147
Computer Crimes
• Financial loss
• Legal repercussions
• Sabotage
148
Computer Crimes
• It is important that the IS auditor knows and understands the differences between computer crime and
computer abuse to support risk analysis methodologies and related control practices. Examples of computer
crimes include:
Malware,
Denial of
Hacking viruses and Fraud
service (DoS)
worms
Network
Packet replay Masquerading Eavesdropping
analysis
Malware Controls
System Management
monitoring vs Procedural
target attacks Controls
Anti-malware
Software Technical
Implementation Controls
Strategies
150
Security Testing Tools and Techniques
151
Security Testing Techniques
• The IS auditor can use sample cards and keys to attempt to gain access
Terminal cards and keys beyond what is authorized.
• The IS auditor should follow up on any unsuccessful attempted violations.
• The IS auditor can inventory terminals to look for incorrectly logged, missing
Terminal identification
or additional terminals.
Computer access • The IS auditor should work with the system software analyst to determine if all
controls access is on a need-to-know basis.
Computer access • The IS auditor should attempt to access computer transactions or data for
violations logging and which access is not authorized. The unsuccessful attempts should be identified
reporting on security reports.
Follow-up access • The IS auditor should select a sample of security reports and look for evidence
violations of follow-up and investigation of access violations.
• The IS auditor should work with the system software analyst, network
Bypassing security and
manager, operations manager and security administrator to determine ways
compensating controls to bypass security.
Penetration Testing
• During penetration testing, an auditor attempts to circumvent the security features of a system and exploits
the vulnerabilities to gain access that would otherwise be unauthorized.
Additional
Discovery
Reporting
Types of Penetration Tests
External testing Refers to attacks and control circumvention attempts on the target’s network
perimeter from outside the target’s system
Internal testing Refers to attacks and control circumvention attempts on the target from
within the perimeter
Blind testing Refers to the condition of testing when the penetration tester is provided
with limited or no knowledge of the target’s information systems
Double blind Refers to an extension of blind testing, because the administrator and
testing security staff at the target are also not aware of the test
Targeted testing Refers to attacks and control circumvention attempts on the target, while
both the target’s IT team and penetration testers are aware of the testing
activities
Threat Intelligence
156
Knowledge An IS auditor is evaluating network performance for an organization that is
Check considering increasing its Internet bandwidth due to a performance degradation
1 during business hours. Which of the following is MOST likely the cause of the
performance degradation?
A. Malware on servers
B. Firewall misconfiguration
A. Malware on servers
B. Firewall misconfiguration
Unauthorized network activities—such as employee use of file or music sharing sites or online gambling or personal
email containing large files or photos—could contribute to network performance issues. Because the IS auditor
found the degraded performance during business hours, this is the most likely cause.
Security Monitoring Tools and Techniques
159
Intrusion Detection Systems
• Categories
• Network-based IDSs
• Host-based IDSs
• A combination of
• Types
signature- and
• Signature-based
statistical-based
• Statistical-based
models provides
• Neural networks better protection.
• Policy
• Honeypots
• High-interaction
• Low-interaction
• A full review of all network system vulnerabilities should occur to determine intended victim
whether the threats to confidentiality, integrity and availability have been hosts from being
162
Knowledge
Check
Neural networks are effective in detecting fraud because they can:
1
B. Solve problems where large and general sets of training data are not obtainable.
D. Make assumptions about the shape of any curve relating variables to the output.
Knowledge
Check
Neural networks are effective in detecting fraud because they can:
1
B. Solve problems where large and general sets of training data are not obtainable.
D. Make assumptions about the shape of any curve relating variables to the output.
Neural networks can be used to attack problems that require consideration of numerous input variables. They are
capable of capturing relationships and patterns often missed by other statistical methods, but they will not discover
new trends.
Incident Response Management
165
Incident Response Management Plan
166
Evidence Collection and Forensics
167
Computer Forensics
• Data protection
• Data acquisition
• Imaging
• Extraction
• Interrogation
• Ingestion/normalization
• Reporting
Protection of Evidence and Chain of Custody
169
Knowledge
Check The CSIRT of an organization disseminates detailed descriptions of recent threats. An
1 IS auditor’s GREATEST concern should be that the users may:
Physically destroying the hard disk is the most effective way to ensure that the data cannot be recovered.
Key Takeaways