How to Pass Cissp
How to Pass Cissp
Anti-virus
Baseline think Platform unique
Procedures think Required
Guidelines think Recommended
Security Management Practices
The Books
Red Book = Trusted Network Interpretation (orange book for
networks)
Orange book = Trusted Computer security evaluation criteria
Confidentiality only….
Government based
Security Management Practices
The Certifications
·ITSEC = international community attempt to “harmonization” – more
commercial flavor
– ·Adds Integrity and availabilty issues
Common criteria = new effort to bring all together
– Replaces previous scheme
C1, C2, B1, B2, A
Security Management Practices
Types of classification
Object/subject
object = passive (files, data, sometimes program)
subject = active (usually people)
SUI = sensitive but unclassified information
Security Management Practices
Mitigatethe emergency….
Avoid the DRP !!!
Application & Systems Security
Important to build in security versus adding on.
Aggregation = situation where combining info creates
greater sensitivity than individual parts.
Inference = ability to derive information not explicitly
available
Object reuse = media must contain no residual data
Overwriting is best approach followed by degausser
Application & Systems Security
Trap Door versus Back Door….. Back Door built in by
designers.
Covert channels = Comm channel that violates policy by
communicating info
Covert storage channel = write by one channel, read by another at
lower security level
Covert timing channel = one process signals to other by
modulating own system use
Applet = small program downloaded to client computer….
Represent risk
Java = Sun
ActiveX = Microsoft
Application & Systems Security
Data Mining = analysis of databases with
tools without knowledge of meaning of data
Closed environment = not connected to
network
Granularity = fineness of security mechanism
Work factor = measure of amount of effort
required to overcome protective measure
Assurance = confidence in security measures
Application & Systems Security
Controls
Input controls = Validity, completeness controls such
as limit tests, logical checks, control totals
Output controls = i.e., reconciliation procedures,
physical handling procedures, authorization controls
Transaction controls = validity of transactions; limit
controls, verification with expected results
Application & Systems Security
Security Models
Bell-LaPadula
Biba
Clark-Wilson
Security Architecture & Models
Bell-LaPadual (B-L hereafter) Sponsored by Govt.
Deals with confidentiality ONLY>>>>>>
Subjects have clearances, objects have classifications.
Subjects can read from their clearance level DOWN = Read
down
Subjects can write from their clearance level UP = Write up
(Star property aka *-property means NO write down)
For example, TS person cannot write down to SECRET)
SUMMARY!!!! NO, NO, NO Read UP, Write Down
Security Architecture & Models
Types of controls
Preventive = avoid occurrence
Detective = identify occurrence
Deterrent = discourage violations
Corrective = remedy circumstances
– Recovery = restore resources, capability
Access Control
Audit trails = individual accountability (has legal
ramifications)
Analysis tools (humans miss about 80% versus
automated approach***)
Audit reduction tools = less data for manual review
Trends/variance detection = monitor trends and detect major
variations
E-mail *** legal precedents trail technology
Don’t promise email privacy
Elec Communication Privacy Act of 1986 = prohibits
phone and dataline taps
Except: Law enforcement and employers…..
Access Control
Secure reassignment = write over or degauss tapes
Magnetic remanence issue
Government = classified Private = sensitive
TEMPEST = countermeasure is shielding or white
noise
Biometrics
Physical arena = identification purposes
Access control = authentication purposes
Access Control
Authentication
something you have (token, smart cards, etc.)
something you know (PIN, password) ** most
common **
something you are (biometrics)
Onetime passwords
Synchronous = more precise timing involved
Asynchronous = time lapse allowed
Access Control
Web Security
Secure Hypertext Transfer Protocol (SHTTP
– Secure Socket Layer
Telecommunications
Secure gateways (firewalls) = can have a negative
impact on network performance. Also single point of
failure.
ACLs can be complex and difficult to maintain.
Screened host firewall system = employs bastion host and
packet filtering router
Provides higher level of security because it protects both network
layer (packet-filtering) and application layer (proxy services).
Requires an intruder to penetrate two separate systems before
reaching private network.
Dual-homed = bastion host has two network interfaces and host
capability to forward traffic around proxy is disabled.
Telecommunications
Screened-subnet (AKA DMZ concept) = two packet
filter routers and a bastion host
Puts limited number of services in the DMZ
Issues: single point of failure. Maintenance and coordination
required to introduce new services. *******
SOCKS = circuit level proxy server
Can be resource intensive
Network Address Translation (NAT) = tool for
resolving non-NIC registered IP addresses
Telecommunications