SlideShare a Scribd company logo
CNIT 125:
Information Security
Professional
(CISSP
Preparation)
Ch 2. Security and Risk
Management (Part 2)
Major Legal Systems
• Civil Law
• Laws and statutes determine what is allowed
• Precedents and particular case rulings carry
less weight than under common law
• Common Law
• Used in the USA, Canada, the UK, and former
British colonies
• Significant emphasis on particular cases and
precedents as determinants of laws
• The major legal system in the CISSP exam
Religious and Customary Law
• Religious Law
• Mainly Sharia (Islamic religious law)
• Customary Law
• Customs or practices that are commonly
accepted and treated as law
• Closely related to Best Practices
• Less important
Criminal and Civil Law
• Criminal Law
• Victim is society itself
• Enforced by police
• Punishment is often prison time
• Proof must be beyond a reasonable doubt
• Civil Law (Tort Law)
• Injury resulting from failure to provide due care
• Victim is an individual
• Enforced by lawsuits
• Result is financial damages paid to victim
• Burden of proof: preponderance of the evidence
(more likely than not)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
Administrative Law
• Also called Regulatory Law
• Specify rules and punishments for regulated
industries
• Examples
• FCC regulations
• HIPAA security mandates
• FDS regulations
• FAA regulations
Liability
• Due Care
• Also called Duty of Care
• Prudent Man Rule
• Businesses should do what a prudent
man would do
• Best Practices
• Due Diligence
• The management of due care
• Follows a formal process
Legal Aspects of Investigations
Evidence
• Real evidence
• Physical objects like hard drives, USB drives,
etc.
• Direct evidence
• Witness testimony about what that person
experienced directly
• Circumstantial evidence
• Indirect evidence of guilt
• Can support other evidence, but usually
inadequate for conviction alone
Evidence
• Corroborative evidence
• Additional support for a fact that may be
called into question
• Hearsay
• Secondhand evidence
• Normally inadmissible in court
• Exceptions:
• Business records and computer-generated
evidence
• Computer forensic hard disk and memory
images are original evidence, not hearsay
Evidence
• Best evidence
• Original documents, not copies
• The actual hard drive used
• Etc.
• Secondary evidence
• Copies of documents
• Log files may be considered secondary or
original
• Evidence integrity
• Typically ensured by MD5 or SHA-1 hash
Chain of Custody
• Evidence must be
protected from
tampering
• A list of names of
people who can
testify that they
protected the
evidence
Reasonable Searches
• Fourth amendment protects citizens from
unreasonable search and seizure by the
government
• Illegally obtained evidence is inadmissible in
court
• Most searches require probable cause and
a search warrant
Exceptions
• These searches don't require a warrant
• Objects in plain sight
• At a public checkpoint
• Exigent circumstances
• Immediate threat to human life or of
evidence being destroyed
Agents of Law Enforcement
• Private citizens are not part of the
government, so the fourth amendment does
not apply, unless:
• Private citizens who carry out investigations
on behalf of law enforcement, they are
acting under the color of law enforcement
or agents of law enforcement
• Then the fourth amendment applies
Should You Call Law Enforcement?
• Companies often avoid involving law
enforcement
• Makes cases simpler, avoids publicity
Entrapment and Enticement
• Entrapment
• Law enforcement agent persuades someone
to commit a crime when
• The person otherwise had no intention to
commit a crime
• Enticement
• Law enforcement agent makes conditions
favorable for a crime
• Person is already intent on committing a crime
Computer Crime
• Computer as target
• DoS, installing malware to send spam
• Computer as a tool
• Stealing secrets from a database
• Stealing credit card numbers
• Espionage
• Harassment
• Attribution
• Difficult to prove who did a crime
Intellectual Property
• Trademark
• Name, logo, or symbol used for marketing
• Unregistered ™ or Registered ®
• Patent
• Grants a monopoly for an invention
• Copyright ©
• Restricts copying creative work
• Software typically covered by copyright
• Fair sale & fair use are allowed
Intellectual Property
• Licenses
• End-User License Agreement (EULA)
• Trade secrets
• Special sauce
• Protected by non-disclosure agreements
(NDAs) & non-compete agreements
(NCAs)
Intellectual Property Attacks
• Software piracy
• Copyright infringement
• Corporate espionage
• Cybersquatting & Typosquatting
• Using a domain close to a company's
domain, like yahoo.net or yahooo.com
Privacy
• Confidentiality of personal information
• EU Data Protection Directive
• Individuals must be notified how their data
is used & allowed to opt out
• OECD Privacy Guidelines
• Organization for Economic Cooperation
and Development
• Includes EU, USA, Mexico, AU & more
EU-US Safe Harbor
• Part of EU Data Protection Directive
• Sending personal data from EU to other
countries is forbidden
• Unless the receiving country adequately
protects its data
• The USA lost this privilege in Oct. 2015
because of the Snowden leaks
• Replacement agreement should be reached
next week (Link Ch 1d, Jan. 25, 2016)
International Cooperation
• Council of Europe Convention on
Cybercrime
• Includes most EU countries and the USA
• Promotes cooperation
Import / Export Restrictions
• USA restricted exports of cryptographic
technology in the 1990s
• Restrictions have been relaxed since then
Important Laws and Regulations
HIPAA
• Health Insurance Portability and
Accountability Act
• Guidance on Administrative, Physical, and
Technical safeguards
• For Protected Health Information (PHI)
CFAA
• Computer Fraud and Abuse Act
• Protects government and financial
computers
• Including every computer on the Internet
(probably not the law's original intent)
• It's a crime to exceed your authorization to
use such a computer
ECPA & The PATRIOT Act
• Electronic Communications Privacy Act
• Protected electronic communications from
warrantless wiretapping
• Weakened by the PATRIOT Act
• The PATRIOT Act
• A response to 9/11 attacks
• Greatly expanded law enforcement's
electronic monitoring capabilities
GLAB & SOX
• Gramm-Leach-Bailey Act
• Forces financial institutions to protect
customer financial information
• Sarbanes-Ox;ey Act
• Response to ENRON scandal
• Regulatory compliance mandates for
publicly traded companies
• Ensures financial disclosure and auditor
independence
PCI-DSS
• Payment Card Industry Data Security
Standard
• Self-regulation by major vendors
• Mandates security policy, devices, controls,
and monitoring to protect cardholder data
US Breach Notification Laws
• 47 states require notification
• No federal law yet
• Safe harbor for data that was encrypted at
time of compromise
Security and 3rd Parties
• Service Provider Contractual Security
• Service Level Agreements (SLA)
• Identify key expectations vendor must
meet
• Attestation
• Third party review of the service provider
to determine security posture
• Includes SAS 70 (old), ISO 27001, and
PCI-DSS
Security and 3rd Parties
• Right to Penetration Test / Audit
• Allows the originating organization to
perform these security tests on a vendor
• Procurement
• Purchasing products or services
• Considering security before purchase is
best
Security and 3rd Parties
• Vendor Governance
• Ensure that vendor provides sufficient quality
• Acquisitions
• Purchasing a company to add to an existing
company
• Can disrupt security
• Divestitures
• Splitting a company into parts
• May result in duplicate accounts and other risks
(ISC)^2 Code of Ethics
• Four Canons
• Protect society, the commonwealth, and
the infrastructure
• Act honorably, honestly, justly, responsibly,
and legally
• Provide diligent and competent service to
principals
• Advance and protect the profession
x
Personnel Security
• Security Awareness and Training
• Background Checks
• Employee Termination
• Must use fair process
• Vendor, Consultant and Contractor Security
• Outsourcing and Offshoring
• Can lower Total Cost of Ownership
• May improve security
• Privacy and regulatory issues
• Must perform risk analysis first
Access Control Types
• Preventive
• Detective
• Corrective
• Recovery
• Deterrent
• Compensating
Access Control Categories
• Administrative
• Technical
• Physical
Risk Analysis
• Assets
• Valuable resources to protect
• Threat
• A potentially harmful occurrence
• Vulnerability
• A weakness
Risk = Threat x Vulnerability
• Earthquake risk is the same in Boston and
San Francisco
• Boston
• Earthquakes are rare, but buildings are old
and vulnerable
• San Francisco
• Earthquakes are common, but buildings
are new erand safer
Impact
• Severity of the damage in dollars
• Risk = Threat x Vulnerability x Impact
• Human life is considered near-infinite impact
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
Total Cost of Ownership (TCO)
• Of a mitigating safeguard includes
• Upfront costs
• Annual cost of maintenance
• Staff hours
• Maintenance fees
• Software subscriptions
Return on Investment (ROI)
• Amount of money saved by implementing a
safeguard
• If Total Cost of Ownership is less than
Annualized Loss Expectancy, you have a
positive ROI
Risk Choices
• Accept the risk
• Mitigate the risk
• Transfer the risk
• Risk avoidance
Quantitative and Qualitative Risk
Analysis
• Quantitative
• Uses hard metrics, like dollars
• Qualitative
• Use simple approximate values
• Or categories like High, Medium, Low
NIST 9-Step Risk Analysis Process
Types of Attackers
• Hackers
• Black hat, white hat, gray hat
• Script kiddies
• Outsiders
• Outside the company
• Insiders
• Hacktivists
• Bots
• Phishing

More Related Content

PPTX
CISSP Chapter 7 - Security Operations
PPTX
Chapter 1 Security Framework
PDF
CISSP Prep: Ch 8. Security Operations
PPTX
CISSP - Security Assessment
PPTX
CISSP - Chapter 3 - System security architecture
PPTX
CISSP - Chapter 4 - Network Topology
PPTX
CISSP - Chapter 3 - CPU Architecture
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Chapter 7 - Security Operations
Chapter 1 Security Framework
CISSP Prep: Ch 8. Security Operations
CISSP - Security Assessment
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 3 - CPU Architecture
CISSP Prep: Ch 1: Security Governance Through Principles and Policies

What's hot (20)

PPTX
CISSP Chapter 1 BCP
PPTX
Chapter 1 Personal security
PPTX
CISSP - Chapter 2 - Asset Security
PPTX
CISSP - Chapter 4 - Intranet and extranets
PPTX
CISSP - Software Development Security
PPTX
CISSP - Chapter 3 - Cryptography
PPTX
Evolving Cybersecurity Threats
PPTX
Chapter 5 - Identity Management
DOCX
Segurança em sistemas distribuidos
PPTX
CISSP - Chapter 1 - Security Concepts
PPTX
CA_Module_1.pptx
PDF
Cissp combined notes
PPT
Shaping Your Future in Banking Cybersecurity
PPTX
SOC Architecture Workshop - Part 1
PDF
CNIT 152: 3 Pre-Incident Preparation
PDF
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
PDF
Breach and attack simulation tools
PPTX
EDR vs SIEM - The fight is on
PPTX
CISSP - Chapter 4 - Network Fundamental
PDF
Industrial_Cyber_Security
CISSP Chapter 1 BCP
Chapter 1 Personal security
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 4 - Intranet and extranets
CISSP - Software Development Security
CISSP - Chapter 3 - Cryptography
Evolving Cybersecurity Threats
Chapter 5 - Identity Management
Segurança em sistemas distribuidos
CISSP - Chapter 1 - Security Concepts
CA_Module_1.pptx
Cissp combined notes
Shaping Your Future in Banking Cybersecurity
SOC Architecture Workshop - Part 1
CNIT 152: 3 Pre-Incident Preparation
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
Breach and attack simulation tools
EDR vs SIEM - The fight is on
CISSP - Chapter 4 - Network Fundamental
Industrial_Cyber_Security
Ad

Viewers also liked (20)

PDF
CISSP Prep: Ch 3. Asset Security
PDF
CISSP Prep: Ch 4. Security Engineering (Part 1)
PDF
CISSP Prep: Ch 7. Security Assessment and Testing
PDF
CISSP Prep: Ch 6. Identity and Access Management
PDF
CISSP Prep: Ch 4. Security Engineering (Part 2)
PDF
CISSP Prep: Ch 9. Software Development Security
PDF
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
PDF
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
PDF
CNIT 127: Ch 8: Windows overflows (Part 2)
PPTX
Cissp- Security and Risk Management
PDF
Slide Deck CISSP Class Session 2
PDF
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
PDF
Slide Deck CISSP Class Session 3
PDF
Slide Deck - CISSP Mentor Program Class Session 1
PPTX
CISSP Certification-Asset Security
PPTX
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
PPTX
Purple Teaming - The Collaborative Future of Penetration Testing
PDF
CNIT 140: Perimeter Security
PDF
CNIT 123: Ch 1 Ethical Hacking Overview
PDF
CNIT 127 14: Protection Mechanisms
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)
Cissp- Security and Risk Management
Slide Deck CISSP Class Session 2
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
Slide Deck CISSP Class Session 3
Slide Deck - CISSP Mentor Program Class Session 1
CISSP Certification-Asset Security
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Purple Teaming - The Collaborative Future of Penetration Testing
CNIT 140: Perimeter Security
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 127 14: Protection Mechanisms
Ad

Similar to CISSP Prep: Ch 2. Security and Risk Management I (part 2) (20)

PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PPTX
Laws and ethics in information assurance
PPT
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
PPTX
egal, Ethical, and Professional Issues in Information Security.pptx
PPT
10. law invest & ethics
PPTX
Law and Order in PK in a country is most important
PPTX
Chapter1 Cyber security Law & policy.pptx
PPTX
Whitman_Ch03.pptx
PPT
Ethical Hacking
PPTX
539547533-Law-and-Ethics-in-Information-Security-1.pptx
PPTX
Legal-Ethical-Professionalin-IS.pptx
PPT
InfoSecConcepts.ppt
PPT
4482LawEthics.pptwhich you should learns
PPT
4482LawEthics 3333333333333333333333333333333333333333333333333...
PDF
How to Build and Implement your Company's Information Security Program
PPT
4482LawEthics.ppt
PPTX
security in is.pptx
PPT
Law & Ethics.pptx - B.COM [Business Law]
PDF
Chapter 1 - Introduction.pdf
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Laws and ethics in information assurance
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
egal, Ethical, and Professional Issues in Information Security.pptx
10. law invest & ethics
Law and Order in PK in a country is most important
Chapter1 Cyber security Law & policy.pptx
Whitman_Ch03.pptx
Ethical Hacking
539547533-Law-and-Ethics-in-Information-Security-1.pptx
Legal-Ethical-Professionalin-IS.pptx
InfoSecConcepts.ppt
4482LawEthics.pptwhich you should learns
4482LawEthics 3333333333333333333333333333333333333333333333333...
How to Build and Implement your Company's Information Security Program
4482LawEthics.ppt
security in is.pptx
Law & Ethics.pptx - B.COM [Business Law]
Chapter 1 - Introduction.pdf

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
3: DNS vulnerabilities
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
Introduction to the Class & CISSP Certification
Cyberwar
3: DNS vulnerabilities
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
master seminar digital applications in india
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
01-Introduction-to-Information-Management.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Institutional Correction lecture only . . .
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Basic Mud Logging Guide for educational purpose
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Week 4 Term 3 Study Techniques revisited.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
PPH.pptx obstetrics and gynecology in nursing
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
master seminar digital applications in india
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
01-Introduction-to-Information-Management.pdf
Anesthesia in Laparoscopic Surgery in India
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
FourierSeries-QuestionsWithAnswers(Part-A).pdf
TR - Agricultural Crops Production NC III.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Renaissance Architecture: A Journey from Faith to Humanism
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Institutional Correction lecture only . . .
VCE English Exam - Section C Student Revision Booklet
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester

CISSP Prep: Ch 2. Security and Risk Management I (part 2)

  • 2. Major Legal Systems • Civil Law • Laws and statutes determine what is allowed • Precedents and particular case rulings carry less weight than under common law • Common Law • Used in the USA, Canada, the UK, and former British colonies • Significant emphasis on particular cases and precedents as determinants of laws • The major legal system in the CISSP exam
  • 3. Religious and Customary Law • Religious Law • Mainly Sharia (Islamic religious law) • Customary Law • Customs or practices that are commonly accepted and treated as law • Closely related to Best Practices • Less important
  • 4. Criminal and Civil Law • Criminal Law • Victim is society itself • Enforced by police • Punishment is often prison time • Proof must be beyond a reasonable doubt • Civil Law (Tort Law) • Injury resulting from failure to provide due care • Victim is an individual • Enforced by lawsuits • Result is financial damages paid to victim • Burden of proof: preponderance of the evidence (more likely than not)
  • 6. Administrative Law • Also called Regulatory Law • Specify rules and punishments for regulated industries • Examples • FCC regulations • HIPAA security mandates • FDS regulations • FAA regulations
  • 7. Liability • Due Care • Also called Duty of Care • Prudent Man Rule • Businesses should do what a prudent man would do • Best Practices • Due Diligence • The management of due care • Follows a formal process
  • 8. Legal Aspects of Investigations
  • 9. Evidence • Real evidence • Physical objects like hard drives, USB drives, etc. • Direct evidence • Witness testimony about what that person experienced directly • Circumstantial evidence • Indirect evidence of guilt • Can support other evidence, but usually inadequate for conviction alone
  • 10. Evidence • Corroborative evidence • Additional support for a fact that may be called into question • Hearsay • Secondhand evidence • Normally inadmissible in court • Exceptions: • Business records and computer-generated evidence • Computer forensic hard disk and memory images are original evidence, not hearsay
  • 11. Evidence • Best evidence • Original documents, not copies • The actual hard drive used • Etc. • Secondary evidence • Copies of documents • Log files may be considered secondary or original • Evidence integrity • Typically ensured by MD5 or SHA-1 hash
  • 12. Chain of Custody • Evidence must be protected from tampering • A list of names of people who can testify that they protected the evidence
  • 13. Reasonable Searches • Fourth amendment protects citizens from unreasonable search and seizure by the government • Illegally obtained evidence is inadmissible in court • Most searches require probable cause and a search warrant
  • 14. Exceptions • These searches don't require a warrant • Objects in plain sight • At a public checkpoint • Exigent circumstances • Immediate threat to human life or of evidence being destroyed
  • 15. Agents of Law Enforcement • Private citizens are not part of the government, so the fourth amendment does not apply, unless: • Private citizens who carry out investigations on behalf of law enforcement, they are acting under the color of law enforcement or agents of law enforcement • Then the fourth amendment applies
  • 16. Should You Call Law Enforcement? • Companies often avoid involving law enforcement • Makes cases simpler, avoids publicity
  • 17. Entrapment and Enticement • Entrapment • Law enforcement agent persuades someone to commit a crime when • The person otherwise had no intention to commit a crime • Enticement • Law enforcement agent makes conditions favorable for a crime • Person is already intent on committing a crime
  • 18. Computer Crime • Computer as target • DoS, installing malware to send spam • Computer as a tool • Stealing secrets from a database • Stealing credit card numbers • Espionage • Harassment • Attribution • Difficult to prove who did a crime
  • 19. Intellectual Property • Trademark • Name, logo, or symbol used for marketing • Unregistered ™ or Registered ® • Patent • Grants a monopoly for an invention • Copyright © • Restricts copying creative work • Software typically covered by copyright • Fair sale & fair use are allowed
  • 20. Intellectual Property • Licenses • End-User License Agreement (EULA) • Trade secrets • Special sauce • Protected by non-disclosure agreements (NDAs) & non-compete agreements (NCAs)
  • 21. Intellectual Property Attacks • Software piracy • Copyright infringement • Corporate espionage • Cybersquatting & Typosquatting • Using a domain close to a company's domain, like yahoo.net or yahooo.com
  • 22. Privacy • Confidentiality of personal information • EU Data Protection Directive • Individuals must be notified how their data is used & allowed to opt out • OECD Privacy Guidelines • Organization for Economic Cooperation and Development • Includes EU, USA, Mexico, AU & more
  • 23. EU-US Safe Harbor • Part of EU Data Protection Directive • Sending personal data from EU to other countries is forbidden • Unless the receiving country adequately protects its data • The USA lost this privilege in Oct. 2015 because of the Snowden leaks • Replacement agreement should be reached next week (Link Ch 1d, Jan. 25, 2016)
  • 24. International Cooperation • Council of Europe Convention on Cybercrime • Includes most EU countries and the USA • Promotes cooperation
  • 25. Import / Export Restrictions • USA restricted exports of cryptographic technology in the 1990s • Restrictions have been relaxed since then
  • 26. Important Laws and Regulations
  • 27. HIPAA • Health Insurance Portability and Accountability Act • Guidance on Administrative, Physical, and Technical safeguards • For Protected Health Information (PHI)
  • 28. CFAA • Computer Fraud and Abuse Act • Protects government and financial computers • Including every computer on the Internet (probably not the law's original intent) • It's a crime to exceed your authorization to use such a computer
  • 29. ECPA & The PATRIOT Act • Electronic Communications Privacy Act • Protected electronic communications from warrantless wiretapping • Weakened by the PATRIOT Act • The PATRIOT Act • A response to 9/11 attacks • Greatly expanded law enforcement's electronic monitoring capabilities
  • 30. GLAB & SOX • Gramm-Leach-Bailey Act • Forces financial institutions to protect customer financial information • Sarbanes-Ox;ey Act • Response to ENRON scandal • Regulatory compliance mandates for publicly traded companies • Ensures financial disclosure and auditor independence
  • 31. PCI-DSS • Payment Card Industry Data Security Standard • Self-regulation by major vendors • Mandates security policy, devices, controls, and monitoring to protect cardholder data
  • 32. US Breach Notification Laws • 47 states require notification • No federal law yet • Safe harbor for data that was encrypted at time of compromise
  • 33. Security and 3rd Parties • Service Provider Contractual Security • Service Level Agreements (SLA) • Identify key expectations vendor must meet • Attestation • Third party review of the service provider to determine security posture • Includes SAS 70 (old), ISO 27001, and PCI-DSS
  • 34. Security and 3rd Parties • Right to Penetration Test / Audit • Allows the originating organization to perform these security tests on a vendor • Procurement • Purchasing products or services • Considering security before purchase is best
  • 35. Security and 3rd Parties • Vendor Governance • Ensure that vendor provides sufficient quality • Acquisitions • Purchasing a company to add to an existing company • Can disrupt security • Divestitures • Splitting a company into parts • May result in duplicate accounts and other risks
  • 36. (ISC)^2 Code of Ethics • Four Canons • Protect society, the commonwealth, and the infrastructure • Act honorably, honestly, justly, responsibly, and legally • Provide diligent and competent service to principals • Advance and protect the profession
  • 37. x
  • 38. Personnel Security • Security Awareness and Training • Background Checks • Employee Termination • Must use fair process • Vendor, Consultant and Contractor Security • Outsourcing and Offshoring • Can lower Total Cost of Ownership • May improve security • Privacy and regulatory issues • Must perform risk analysis first
  • 39. Access Control Types • Preventive • Detective • Corrective • Recovery • Deterrent • Compensating
  • 40. Access Control Categories • Administrative • Technical • Physical
  • 41. Risk Analysis • Assets • Valuable resources to protect • Threat • A potentially harmful occurrence • Vulnerability • A weakness
  • 42. Risk = Threat x Vulnerability • Earthquake risk is the same in Boston and San Francisco • Boston • Earthquakes are rare, but buildings are old and vulnerable • San Francisco • Earthquakes are common, but buildings are new erand safer
  • 43. Impact • Severity of the damage in dollars • Risk = Threat x Vulnerability x Impact • Human life is considered near-infinite impact
  • 46. Total Cost of Ownership (TCO) • Of a mitigating safeguard includes • Upfront costs • Annual cost of maintenance • Staff hours • Maintenance fees • Software subscriptions
  • 47. Return on Investment (ROI) • Amount of money saved by implementing a safeguard • If Total Cost of Ownership is less than Annualized Loss Expectancy, you have a positive ROI
  • 48. Risk Choices • Accept the risk • Mitigate the risk • Transfer the risk • Risk avoidance
  • 49. Quantitative and Qualitative Risk Analysis • Quantitative • Uses hard metrics, like dollars • Qualitative • Use simple approximate values • Or categories like High, Medium, Low
  • 50. NIST 9-Step Risk Analysis Process
  • 51. Types of Attackers • Hackers • Black hat, white hat, gray hat • Script kiddies • Outsiders • Outside the company • Insiders • Hacktivists • Bots • Phishing