ISC2 CC Notes
ISC2 CC Notes
• Only employers and clients may file under a complaint, due to the
nature of the code
_____
3 Goals of Information Security
• Confidentiality
• Integrity
• Availability
= CIA
Confidentiality Concerns
• Snooping
• Dumpster Diving
• Eavesdropping
• Wiretapping
• Electronic Eavesdropping
• Social Engineering
_____
Integrity Concerns
• Unauthorized Modification
• Impersonation
• Man-in-the-Middle (MITM)
• Replay
• Power Outages
• Hardware Failures
• Destruction
• Service Outages
_____
Authentication & Authorization
Access Control Process
1. Identification
2. Authentication
3. Authorization
Every organization should make it easy for users to change their passwords, however,
be careful of password reset process as it may provide an opportunity for attackers to
take advantage through unauthorized password reset.
Password Managers
_____
• Passwords, Pins
Non-repudiation
_____
Privacy
Organization Privacy Concerns
2. Educating on users
• Educated users of how they can protect their own personal information
• Regulated by HIPPA
• Many laws that govern whether information must be protected are based upon
whether the person disclosing the information had a reasonable expectation of
privacy
_____
Risk Management
1. Internal Risks
• Risks that arise from within the organization
2. External Risks
3. Multiparty Risks
_____
Risk Assessment
Threat
• Threat Vector
Vulnerabilities
Likelihood
Impact
2. Quantitative Techniques
_____
Risk Treatment (Management)
1. Risk Avoidance
2. Risk Transference
3. Risk Mitigation
4. Risk Acceptance
Risk Profile
_____
Inherent Risk
Residual Risk
• Risk that is reduced and what is left of it is known as the residual risk
Control Risk
• New risk that may have been introduced by the controls applied to mitigate
risk
_____
Security Controls
• Are procedures and mechanisms that reduce the likelihood or impact of a risk
and help identify issues
Defense in Depth
1. Prevent
2. Detect
3. Correct
Then group them by their Control Mechanism: 3 Types of Control Mechanisms are:
1. Technical
2. Administrative
3. Physical
_____
Configuration Management
Baselines
Versioning/Version Controls
_____
Security Governance
You must first identify how domestic and international Laws and Regulations apply to an
organization
Security Policy Framework
1. Policies
2. Standards
3. Guidelines
4. Procedures
_____
Best Practice of Security Policies
3. Password Policies
5. Privacy Policies
_____
Business Continuity
Business Continuity Planning (BCP)
• Provides a mechanism to identify and remove single points of failure from their
systems
• The SPOF analysis continues until the cost of addressing risk outweighs the
benefit
• SPOF can be used in many areas other than the IT Infrastructure, it can be
applied in management of HR, 3rd party vendor reliance etc)
_____
Continued Operation of Systems
2. Fault-Tolerance
Load Balancing
1. Power Supply
2. Storage Media
• Mirroring
• Striping
3. Networking
_____
Incident Response
• Statement of Purpose
• Strategies and goals for incident response
• Approach to incident response
• Communication with other groups
• Senior leadership approval
NIST SP 800-61
_____
Building a Incident Response Team
IR Team should consist of:
• Management
• Information Security Personnel
• SMEs
• Legal Counsel
• Public Affairs
• Human Resources
• Physical Security
_____
• Always involve your own organization’s legal team to ensure compliance with
laws and organization’s obligations with 3rd parties.
• Describe communication paths on how information will trickle down the
organization
_____
Incident Identification
• Firewalls
• Authentication Systems
• Integrity Monitors
• Vulnerability Scanners
• System Event Logs
• Netflow Records
• Antimalware Packages
• Security solution that collects information from diverse sources, analyzes it for
signs for security incidents and retains it for later use.
• Centralized log repositories
• Basically take a load of data, feed it to the SIEM, and it will spit out details
regarding risk
When these systems and security mechanisms FAIL do detect risks before dealt with
internally, an EXTERNAL source (customer) may be first to detect a risk
Therefore, IR Team should have a consistent method for receiving, recording, and
evaluating external reports
_____
First Responder Duty
• First responders (whomever they are, whom encounters the risk first) have a
set of responsibilities as they may have the power to tremendously reduce risk
Highest Priority
_____
Disaster Recovery
Disaster Recovery (DR)
• Initial Report
• Status updates
• Ad hoc messages
_____
Backups
• Provides an organization with a fail-safe way to recover their data in the event
of
• Technology failure
• Human error
• Natural disaster
Backup Methods
1. Tape Backups
2. Disk-to-disk Backups
• Writes data from Primary Disks to special disks that are set aside for
backup purposes
• Backups that are sent to a storage area network or a network attached
storage are also fitting in this category of backup
3. Cloud Backups
• AWS, Azure, GC
1. Full Backups
2. Differential Backups
3. Incremental Backups
• Include all data modified since the last full or incremental backup
Scenario: Joe performs full backups every Sunday evening and differential backups every
weekday evening. His system fails on Friday morning. What backups does he restore?
A: 1) Sundays Full Backup
2) Thursday’s differential backup
Scenario: Joe performs full backups every Sunday evening and incremental backups every
weekday evening. His system fails on Friday morning. What backup does he restore?
A: 1) Sunday’s Full Backup
2) Monday, Tuesday, Wednesday, Thursday incremental backups
Trade off: Incremental backups takes longer to restore but requires smaller storage
_____
1. Hot Site
2. Cold Site
3. Warm Site
Disaster Recovery Sites don’t only provide a facility for technology operations, but also
serve as an Offsite Storage Location. They are:
• Geographically distant
• Site Resiliency
• Allows backups to be physically transported to the disaster recovery facility
either manually or electronically called “Site Replication”
• Online or offline backups
_____
1. Read-through
2. Walk-through
3. Simulation
4. Parallel Test
• While above are all theoretical approaches, the Parallel Test actually
activates the Disaster Recovery Environment
• However, they do not switch operations to the backup environment
5. Full Interruption
• Most effective
• Activate Disaster Recovery Environments
• Also switch primary operations to the backup environment
• Can be very disruptive to business
1. Data Centers
• Most important
2. Server Rooms
6. Distribution Cabling
7. Operations Center
_____
Types of Physical Security
1. Gates
2. Bollards
CPTED
CPTED Goals
1. Natural Surveillance
• Design your security in a way that allows you to observe the natural
surroundings of your facility
• Gates, etc
• Making it visually and physically obvious that the area is closed to the
public
• Signs, Lightnings
_____
Visitor Management
Visitor Procedures
_____
Physical Security (Human Security)
• Two people must have control access to very sensitive functions, requiring an
agreement of 2 persons before action
_____
Logical Access Controls
Account Management Tasks
_____
1. Account Audits
• Inaccurate Permissions
4. Geotagging
5. Geofencing
_____
Provisioning and Deprovisioning
Provisioning
• After onboarding, administrators create authentication credentials and grant
appropriate authorization
Deprovisioning
It is a good idea to Deactivate the account first before permanent removal as it can be
reversed
_____
Authorization
• User should have the minimum set of permission necessary to perform their
job
_____
Computer Networking
Network
1. Ethernet
3. Bluetooth
_____
TCP/IP - Transmission Control Protocol/Internet Protocol
Internet Protocols
• How users interact with data, using web browsers or other apps
• Why 255?
• 1) Network Address
• 2) Host Address
• IPv6
• ex= fd02:24c1:b942:01f3:ead2:123a:c3d2:cf2f
1. Static IPs
Typically,
Servers are configured with Static IP Addresses
End-user devices are configured with Dynamically-Changing IP Addresses
_____
Network Ports
Port Ranges
• 0 - 1,023 = Well-known ports
• Examples
Important Port #s
Administrative Services
Mail Services
Web Services
_____
Securing Wireless Networks
Service Set Identifier (SSID)
• 1) Open Network
• 2) Enterprise Authentication
• 3) Captive Portals
_____
Wireless Encryption
In Summary,
Open Network : Insecure
WEP : Insecure
WPA: Insecure
WPA2 : Secure
WPA3: Secure
_____
Ping and Traceroute
Command Line Network (CLI)
Important Commands
1. ping
2. hping
3. traceroute
4. pathping
_____
Network Threats
Malware
• 1) Propagation Mechanism
• 2) Payload
Types of Malware
1. Virus
2. Worms
3. Trojan Horse
_____
Botnets
In Summary Botnets:
1. Infect Systems
2. Convert to bots
3. Infect others
4. Check in through Command and Control Network
5. Get Instructions
6. Deliver payload
_____
Eavesdropping Attacks
• All eavesdropping attacks rely on a compromised communication path
between a client and a server
Man-in-the-browser Attacks
If the attacker is able to control the network traffic, they may be able to conduct a Reply
Attack
Replay Attack
• Token
• Timestamp
SSL Stripping
_____
Implementation of Attacks
Cryptographic systems may have flaws = vulnerability = attacks
Fault Injection Attacks
• These failures of security may cause systems to fail to encrypt data property.
_____
Threat Identification and Prevention
Intrusion Detection Systems (IDS)
• SQL Injections
• Malformed Packets
• Unusual Logins
• Botnet Traffic
• Alerts administrators
• Requires someone to take action
1. In-band Deployments
_____
Malware Prevention
1. Signature Detection
2. Behavior Detection
• Memory
• Processor use
• Registry Entries
• Network Communications
_____
Port Scanners
Vulnerability Assessment Tools
1. Port Scanner
2. Vulnerability Scanner
3. Application Scanner
_____
Network Security Infrastructure
Data Centers
• Do not contain water until the valve opens during a fire alarm.
• Prevents burst pipes, by removing standby water
3. Chemical Systems
• Removes oxygen
• Memorandum of Understanding
• Outlines the environmental requirements
_____
Security Zones
• Internet
• Intranet
• DMZ
Zero Trust Approach : Systems do not gain any trust based solely upon their network
location
3 Special-Purpose Networks
1. Extranet
2. Honeynet
3. Ad Hoc Networks
East-West Traffic
North-South Traffic
• The Physical APs itself has a wired connection back to the switch
Routers
Stateless Inspection
_____
Virtual LANs (VLANs)
• Users on the same VLAN will be able to directly contact each other as
if they were connected to the same switch
Configuring VLANs
_____
Firewalls
• Often sit at the network perimeter
• Between Router and Internet
Switch
I
I
I
Switch —------------- Router —------------- Firewall —------------- Internet
I
I
I
Switch
Firewalls connect 3 networks together
1. Internet
2. Internal Network
3. DMZ
The Newest type of Firewalls are called New Generation Firewalls (NGFW)
2. Content/URL Filtering
3. Web application firewall
• Understands how HTTP protocol works and dive deep into those
application connections, looking for signs of SQL Injection, Cross-site
scripting, and other web application attacks
1. Network Hardware
1. Hardware Appliance
2. Virtual Appliance
_____
VPNs and VPN Concentrators
VPNs provide 2 security functions:
1. Site-to-Site VPNs
VPNs
• Firewalls
• Router
• Server
• Dedicated VPN Concentrators - Used for High Volume
Firewalls, Router, Server does not contain specialized hardware that accelerates
Encryption
IPSec (Internet Protocol Security) Protocol
• Creates encrypted tunnels
• Works at Layer 3 : Network Layer
• Supports Layer 2 Tunneling Protocol (L2TP)
• Provides secure transport
• Difficult to configure
• Often used for Static Site-to-Site VPN Tunnels
SSL/TLS VPNs
HTML5 VPNs
• All network traffic leaving the connected device is routed through the
VPN tunnel, regardless of final destination
• Only traffic destined for the corporate network is sent through the VPN
tunnel
• Other traffic is routed directly over the Internet (risk of eavesdropping)
• Not as safe so not recommended
• Connects automatically
• Takes control from the user
• Always protected by strong encryption
_____
• Intercepts network traffic coming from unknown devices and verifies that the
system and users are authorized before allowing further communication
• Uses 802.1x authentication. This requires 3 devices
_____
Internet of Things
• Smart devices
• Difficult to update
• Connect to home and office wireless (Risk for malicious actors)
• Connects back to cloud services for command and control, creating a pathway
for external attackers
Security of IOT
1. Private Cloud
2. Public Cloud
3. Hybrid Cloud
4. Multi Cloud
5. Community Cloud
• Shared Consortium
• Add a third-party security layer to the interactions that users have with other
cloud
services
• Works in 2 ways
• 1) Network-Based CASB
_____
• Ensure that vendor security policies are at least as stringent as your own
• Vendor lock-in makes it difficult to switch vendors down the road. So be
careful
• Conduct due diligence
• Socialize with team
• Present to stakeholders
• Schedule weekly meetings
1. Vendor Selection
• Due Diligence
2. Onboarding
3. Monitoring
4. Offboarding
_____
Vendor Agreements
Non-Disclosure Agreements (NDA)
Data Security
Encryption
1. Data at Rest
• Stored data
• Can be in:
• File
• Disk
• Device
2. Data in Transit
_____
Symmetric vs Asymmetric Cryptography
Symmetric Encryption
• You encrypt and decrypt with the same shared secret key
• It's like a password to a message
• You will keep needing more keys as network populates
Asymmetric Encryption
• You encrypt and decrypt with different keys from the same pair
Keys used for Asymmetric encryption and decryption (public & private) must be from the
same pair
Advanced Encryption Standard (AES) → Symmetric
Rivest-Shamir-Adleman (RSA) → Asymmetric
_____
Hash Functions
• One-way function that transforms a variable length input into a unique, fixed-
length output
2. SHA-1
3. SHA-2
• Replaced SHA-1
• Consists of a family of 6 has functions
• Produces output of 224, 256, 384 and 512 bits
• Uses a mathematically similar approach to SHA-1 and MD5
• SHA-2 is no longer secure
4. SHA-3
5. RIPEMD
Data Lifecycle
Cycle
1. Create
2. Store
3. Use
4. Share
5. Archive
6. Destroy
_____
Data Classification
1. Sensitivity of Information
2. Criticality of Information
Classification Levels
Labeling Requirements
• Covered by HIPPA
_____
Logging and Monitoring
Logging establishes:
1. Accountability
2. Traceability
3. Auditability
_____
Security Awareness and Training
Social Engineering
1. Authority
2. Intimidating
3. Consensus
4. Scarcity
5. Urgency
6. Familiarity
• Whaling
• Phishing targeted on executives
• Pharming
• Vishing
• Voice phishing
• Sda
• Spoofing
• Faking an identity
Security Training
• Provides users with the knowledge they need to protect the organization’s
security
Security Awareness
• Keeps the lessons learned during security training top of mind for employees.
Reminder
• Phishing simulations
• Gamification
• Capture the Flag exercises
Sure! Here are some examples of subjects, objects, and rules in the context of
computer security: