SlideShare a Scribd company logo
FRSecure 2017 CISSP
Mentor Program
EVAN FRANCEN, PRESIDENT & CEO – FRSECURE
BRAD NIGH, SENIOR INFORMATION SECURITY ANALYST - FRSECURE
CLASS SESSION #2
CISSP Mentor Program Session #2
Domain 1: Security and Risk Management
(e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity
• Cornerstone Information Security Concepts
• Legal and Regulatory Issues
• Security and 3rd Parties
• Ethics
• Information Security Governance
• Access Control Defensive Categories and Types
• Risk Analysis
• Types of Attackers
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Information security is the application of
administrative, physical, and technical controls to
protect the confidentiality, integrity, and
availability of information.
“Most organizations overemphasize technical controls to
protect confidentiality and do so at the expense of other
critical controls and purposes.”
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Information security is the application of
administrative, physical, and technical controls to
protect the confidentiality, integrity, and
availability of information.
Balance is critical
Opposite of C I A is D A D (Disclosure, Alteration, and
Destruction)
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Privacy is the application of administrative,
physical, and technical controls to protect the
confidentiality, of personally identifiable
information (“PII”).
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Identity, Authentication, Authorization, and Accountability (“AAA”)
• Identity is who I am.
• Often a name, username, ID number, employee number, etc.
• You’d have to take my word for it if I don’t prove it.
• Social engineers often profess an identity without proving it.
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Identity, Authentication, Authorization, and Accountability (“AAA”)
• Authentication is proving who I am.
• Often a password, PIN code, picture, etc.
• Identity without authentication is pretty much useless
• If I steal your authentication, I get to be you!
• Identity and authentication should be different (SSN)
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Identity, Authentication, Authorization, and Accountability (“AAA”)
• Three types (or factors) of authentication
• Something only you know; password, PIN number, etc.
• Something only you have; tokens, phone, debit card, etc.
• Something only you are; biometrics
• Using two (or more) factors is called “strong” authentication or multi-factor
authentication
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Identity, Authentication, Authorization, and Accountability (“AAA”)
• What the system will allow me to do
• After I identify and authenticate
• Authorization is tied to identity
• Sometimes referred to as privileges or rights
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Identity, Authentication, Authorization, and Accountability (“AAA”)
• A record of what I did
• Before and after authentication
• Accountability is also tied to identity. If my identity (and authentication) is
stolen or shared, there is no accountability.
• Shared accounts are bad.
• Non-repudiation; the ability to prove that someone (or something)
performed an action.
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Very similar, but slightly different:
• Least Privilege is tied to rights; basically what I can
do with and in the system.
• Need to Know is tied to information; basically what
I can with information.
I violation of least privilege can easily violate the
Need to Know principle.
"Over 30 percent of respondents admit to having no
policy in place for managing administrator access”
http://www.businessnewsdaily.com/4614-managing-administrator-access-
security.html#sthash.o753cCcv.dpuf
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Subjects and Objects
• A subject is an active entity; users, services, applications, etc.
• An object is a passive entity; paper, database tables, etc.
• An entity can be a subject in one instance and an object in another. It really
depends on context.
Expect the exam to use these definitions and test you on them.
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Defense-in-depth
• The concept stresses the importance of not relying upon a single (or single
layer) of controls.
• Multiple controls (or safeguards) to protect (or reduce risk to) information
assets.
• Bypassing one control leads to the occurrence of another.
CISSP Mentor Program Session #2
Cornerstone Information Security Concepts
Due Care and Due Diligence
• Be careful to not provide legal guidance. Lawyers do that.
• Both concepts rely on the “prudent man” rule. What would a prudent man
do in a similar situation?
• Due care is doing what the prudent man would do.
• Due diligence is management (formal) of due care.
• Negligence (and gross negligence) is not practicing due care. Some people go
as far as calling this reckless.
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Compliance is critical! Although “compliance” and “security” are two different
things.
• More detailed instruction about compliance is provided when we get to
Domain 9: Legal, Regulations, Investigations, and Compliance.
• Compliance is doing what you’ve been told to do or what you’ve been
commanded to do.
• Security is using administrative, physical, and technical controls to protect (or
manage risks related to) confidentiality, integrity, and availability of
information.
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Major Legal Systems
• There are four major legal systems that are covered in the exam:
• Civil Law
• Common Law
• Religious Law
• Customary Law
• There are different legal systems in different parts of the world. Be aware of
what legal system is used in whatever country you’re operating in!
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Major Legal Systems – Civil Law
• A very Most common legal system throughout the world.
• Codified laws (or statutes)
• A legislative body (or branch) is usually tasked with creating the
laws/statutes.
• Judicial body (or branch) interprets the law.
• No (or very little) weight is given to judicial precedent or outcomes from
previous cases.
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Major Legal Systems – Common Law
• The legal system in the United States, Canada, U.K. and others
• Codified laws (or statutes)
• A legislative body (or branch) is usually tasked with creating the
laws/statutes.
• Much weight is given to judicial precedent and outcomes from previous
cases. Judicial interpretations of the laws can change over time.
This is the most likely legal system to be referred to on the exam.
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Major Legal Systems – Religious Law
• Religious doctrine and/or interpretation is the source of laws/statutes.
• Extent and degree of interpretation and enforcement varies greatly from
jurisdiction to jurisdiction.
• Islam is the most common source for religious legal systems.
• Sharia Law
• Qur’an and Hadith are used.
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Major Legal Systems – Customary Law
• Refers to the customs or practices within a jurisdiction.
• The laws/statutes are often undocumented, but generally well-understood.
• Best practices  negligence
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Within the Common Law (legal system)
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Within the Common Law (legal system) – Criminal Law
• Victim is society – promote and maintain an orderly and law-abiding citizenry
• Require proof beyond a reasonable doubt
• Deter crime and punish offenders
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Within the Common Law (legal system) – Civil Law
• Victim is an individual, group, or organization
• Most commonly between private parties
• One act can be prosecuted under both criminal and civil procedures
• Damages are financial (often):
• Statutory Damages – prescribed by the law (even if no loss or injury to the victim)
• Compensatory Damages – awarded to compensate a victim for loss or injury
• Punitive Damages – to punish and discourage really bad behavior
• Burden of proof is the preponderance of the evidence (think tipping the scale)
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Within the Common Law (legal system) – Civil Law
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Within the Common Law (legal system) – Administrative Law
• Laws enacted by governmental agencies
• Typically the legislature or President issues an administrative law
• The agency interprets the law and enforces it
• Government-mandated compliance
• Examples include FCC regulations, HIPAA, FDA regulations, FTC regulations,
etc.
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Within the Common Law (legal system) – Administrative Law
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Liability
• Who should be held accountable
• Who should we blame
• Who should pay!
• Apply the Prudent Man Rule
• Due Care
• Due Diligence
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Legal Aspects of Investigations
• Collecting and handling evidence is a critical legal issue – some evidence carries more weight
than others
• Types of evidence
• Real Evidence – consists of tangible or physical objects; a computer or hard drive is real evidence, but the
data is NOT.
• Direct Evidence – testimony from a first hand witness using one or more of his/her five senses; non-first
hand evidence is called “hearsay”.
• Circumstantial Evidence – establishes the circumstances related to points in the case or other evidence;
not good to use alone to prove a case.
• Corroborative Evidence – evidence to strengthen a fact or element of a case; provides additional support,
but cannot establish a fact on its own.
• Hearsay Evidence – second hand evidence normally considered inadmissible in court (Rule 802), but there
are exceptions (Rule 803)…
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Legal Aspects of Investigations - Hearsay Evidence
• There are rules (namely Rule 803 and Rule 804) within the Federal Rules of Evidence
of the United States that permit exclusions to Rule 802
• Business and computer generated records (logs) are generally considered to be
hearsay evidence.
• Rule 803 allows for records or reports that were “made at or near the time by, or
from information transmitted by, a person with knowledge, if kept in the course of a
regularly conducted business activity, and if it was the regular practice of that
business activity to make the memorandum, report, record or data compilation”
• Rule 1001 allows for the admissibility of binary disk and physical memory images; “if
data are stored in a computer or similar device, any printout or other output
readable by sight, shown to reflect the data accurately, is an ‘original’.
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Legal Aspects of Investigations
• Best Evidence Rule – courts prefer the best evidence possible; evidence should be
relevant, authentic, accurate, complete, and convincing – direct evidence is always
best.
• Secondary Evidence – common in cases involving computers; consists of copies vs.
originals – logs and documents from computers are considered secondary
• Evidence Integrity – evidence must be reliable; hashes, copies vs. originals, etc.
• Chain of Custody – chain of custody form
• Prosecuting computer crimes (criminal) is hard…
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Legal Aspects of Investigations – Reasonable Searches
• Fourth Amendment to the United States Constitution protects citizens from
unreasonable search and seizure
• In ALL cases, the court will determine if evidence was obtained legally
• Law enforcement needs a search warrant issued by a judge (in most cases)
• Plain sight
• Public checkpoints
• Exigent circumstances – immediate threat to human life or of evidence destruction
• Only apply to law enforcement and those operating under the “color of law” – Title 18.
U.S.C. Section 242 – Deprivation of Rights Under the Color of Law
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Legal Aspects of Investigations – Entrapment & Enticement
• Entrapment – persuades someone to commit a crime who otherwise had no
intent to commit a crime – valid legal defense
• Enticement – persuades someone to commit a crime who already had the
intent to commit a crime – not a valid defense.
Honeypots
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Intellectual Property – Trademarks and Servicemarks
• Trademarks – ® and ™
• Creation of a distinguishing brand
• Applies to name, logo, symbol, or image (usually)
• ™ can be used freely by anyone; unregistered trademark
• ® is a registered trademark with the U.S. Patent and Trademark Office
• A superscript “SM” can be used to brand a service
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Intellectual Property – Trademarks and Servicemarks
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Intellectual Property – Patents
• Provide a monopoly to the patent holder in exchange for the patent holder
making their invention public
• Invention must be “novel” and “unique”
• Generally patents provide exclusivity for 20 years
• After patent expiration, the invention can be produced and sold by anyone
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Intellectual Property – Copyright
• Software is typically covered under copyright law
• Limitations:
• Fair sale – allow a legitimate purchaser to sell the software (or video, music, etc.) to
someone else
• Fair use – allows for duplication without the consent of the copyright holder, subject to the
Copyright Act of 1976
• Licenses – contract between the consumer and provider; provides explicit
limitations on the use and distribution of software; EULAs
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Intellectual Property – Trade Secrets
• Business-proprietary information that is essential for the organization to
compete in the marketplace.
• “Secret sauce”
• Must be “actively protected” to be enforceable; using due care and due
diligence
• If an organization does not take reasonable steps to protect a trade secret, it
is assumed that the organization doesn’t enjoy a competitive advantage from
the trade secret, leading to a conclusion that it’s not actually a trade secret at
all.
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Intellectual Property – Intellectual Property Attacks
• Constant problem
• Piracy and copyright infringement – Pirate Bay, Bit Torrent, etc.
• Cybersquatting & Typosquatting
• Counterfeiting
• Dilution (not really an attack)
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Intellectual Property – Intellectual Property Attacks
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Privacy
• Confidentiality of personally-identifiable information (subset of security)
• Examples of PII; names/email addresses (maybe), Social Security Numbers
(SSN), Protected Health Information (“PHI”), bank account information (sort
of), etc.
• There are numerous privacy laws throughout the world
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Privacy – European Union Privacy (EU Data Protection Directive)
• Aggressive pro-privacy law
• Notifying individuals of how their data is gathered and used
• Allow for opt-out for sharing with 3rd parties
• Opt-in required for sharing “most” sensitive data
• Reasonable protections
• No transmission out of EU unless the receiving country is perceived to have
adequate (equal) privacy protections; the U.S. does NOT meet this standard.
EU-US Safe Harbor, optional between organization and EU.
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Privacy – European Union Privacy (EU Data Protection Directive)
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Privacy – Organization for Economic Cooperation and Development (OECD)
Privacy Guidelines
• 30 member nations from around the world (including U.S.)
• Focus on issues that impact the global economy
• OECD Guidelines on the Protection of Privacy and Transborder Flows of
Personal Data; issued in 1980
• Eight principles…
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Privacy – Organization for Economic Cooperation and Development (OECD) Privacy
Guidelines
• Eight driving principles:
• Collection Limitation Principle
• Data Quality Principle
• Purpose Specification Principle
• Use Limitation Principle
• Security Safeguards Principle
• Openness Principle
• Individual Participation Principle
• Accountability Principle
• Not mandatory
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Other Rules and Laws
• Health Insurance Portability and Accountability Act (HIPAA not HIPPA)
• Overseen by the Department of Health and Human Services (DHS), enforced by the Office
for Civil Rights (OCR)
• Three rules; Privacy Rule, Security Rule, and Breach (notification) Rule
• Applies to “covered entities” and also (now) “business associates”
• Originally passed in 1996, Security Rule finalized in 2003, modified in 2009 (HITECH), and
Omnibus Rule in 2013
• Security Rule mandates certain administrative, physical, and technical safeguards
• Risk analysis is required
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Other Rules and Laws
• Electronic Communications Privacy Act (ECPA)
• Protection of electronic communications against warrantless wiretapping
• Amended/weakened by the PATRIOT Act
• Computer Fraud and Abuse Act (CFAA) – Title 18 Section 1030
• Most commonly used law to prosecute computer crimes
• Enacted in 1986
• Amended in 1989, 1994, 1996, 2001, 2002 (PATRIOT Act), and 2008 (Identity Theft
Enforcement and Restitution Act)
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Other Rules and Laws
• PATRIOT Act of 2001
• Expands law enforcement electronic monitoring capabilities
• Allows search and seizure without immediate disclosure
• Gramm-Leach-Bliley Act (GLBA)
• Applies to financial institutions; driven by the Federal Financial Institutions Examination
Council (FFIEC); enforced by member agencies, OCC, FDIC, FRB, NCUA, and CFPB
• Enacted in 1999, requires protection of the confidentiality and integrity of consumer
financial information
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Other Rules and Laws
• California Senate Bill 1386 (SB1386)
• Regulates the privacy of personal information
• One of the first data breach notification laws
• Sarbanes-Oxley Act of 2002 (SOX)
• Directly related to the financial scandals in the late 90s
• Regulatory compliance standards for financial reporting
• Intentional violations can result in criminal penalties
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Other Rules and Laws
• Payment Card Industry Data Security Standard (PCI-DSS)
• Applies to cardholder (credit and debit) data
• Created by the major card brands; VISA, MasterCard, Discover, etc.
• NOT governmental and NOT a law (yet)
• Requires merchants (and others) to meet a minimum set of security requirements
• Mandates security policy, devices, control techniques, and monitoring
CISSP Mentor Program Session #2
Legal and Regulatory Issues
Breach Notification Laws
• 47 48 (New Mexico) states have enacted breach notification laws
• There is no Federal breach notification law
• Conflicts arise in interpretations, jurisdictions, and definitions
• Safe harbors may (or may not) be provided if the data was encrypted,
depending on the state
There are also two data protection laws and numerous data destruction laws.
To make matters worse, there are data openness laws and Freedom of
Information Act considerations!
CISSP Mentor Program Session #2
Security and 3rd Parties
Vendor Risk Management Considerations
• Attestation – How can you attest to the fact that vendors are protecting
assets adequately? Risk assessments (FISA™), SOC 2 (Type 1 and 2), ISO
Certification, HITRUST, Shared Assessments, PCI-DSS ROC, etc.
• Right to Penetration Test & Right to Audit
• Procurement
• Acquisitions
• Divestures
CISSP Mentor Program Session #2
Ethics
ISC2® Code of Ethics
• Very testable
• Must be agreed to in order to become CISSP
• Preamble, cannons (mandatory), and guidance (advisory)
• Cannons:
• Protect society, the commonwealth, and the infrastructure
• Act honorably, honestly, justly, responsibly, and legally
• Provide diligent and competent service to principals
• Advance and protect the profession
• Cannons are applied in order; if there are conflicts go with the higher one.
CISSP Mentor Program Session #2
Ethics
Computer Ethics Institute
• Ten Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other peoples computer resources without authorization or proper compensation.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the system you are
designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
CISSP Mentor Program Session #2
Ethics
Internet Activities Board (IAB) Ethics
• “Ethics and the Internet”
• Defined as a Request for Comment (RFC), #1087
• Published in 1987
• Considered unethical behavior:
• Seeks to gain unauthorized access to the resources of the Internet
• Disrupts the intended use of the Internet
• Wastes resources (people, capacity, computer) through such actions
• Destroys the integrity of computer-based information
• Compromises the privacy of users
CISSP Mentor Program Session #2
Information Security Governance
Security Policy and Related Documents
• Policy (Mandatory)
• Purpose
• Scope
• Responsibilities
• Compliance
• Policy types
• Program policy
• Issue-specific policy
• System-specific policy
CISSP Mentor Program Session #2
Information Security Governance
Security Policy and Related Documents
• Procedures
• Mandatory
• Step-by-step guidance
• Standards
• Mandatory
• Specific use of a technology
• Guidelines
• Recommendations; discretionary
• Advice/advisory
• Baselines (or benchmarks)
• Usually discretionary
• Uniform methods of implementing a standard
CISSP Mentor Program Session #2
Information Security Governance
Personnel Security Considerations
• Security Awareness and Training
• Actually two different things
• Training teaches specific skills
• Awareness activities are reminders
• Background Checks
• Criminal history, driving records, credit checks, employment verification, references, professional claims, etc.
• More sensitive roles require more thorough checks; one-time and ongoing
• Employee Termination
• Formalized disciplinary process (progressive)
• Exit interviews, rights revocation, account reviews, etc.
• Dealing with Vendors, Contractors, 3rd Parties
• Outsourcing and Offshoring
CISSP Mentor Program Session #2
Access Control Defensive Categories and Types
• Categories
• Administrative Controls
• Technical Controls
• Physical Controls
• Types
• Preventive
• Detective
• Corrective
• Recovery
• Deterrent
• Compensating
• Very testable; you may be given a
scenario or control description and
need to provide the category and
type.
• In order to be sure of the control
type, you need to clearly
understand context.
CISSP Mentor Program Session #2
Risk Analysis
• All decisions should be driven by risk.
• Most people don’t assess risk well (formally or informally)
• Assets
• Threats
• Vulnerabilities
• Risk = Threat x Vulnerability
• Risk = Threat x Vulnerability x Impact (better)
• Risk is arguably the most overused
and misunderstood concept in
security.
• I disagree with the book. Risk is
the likelihood of something bad
happening and the impact if it did.
CISSP Mentor Program Session #2
Risk Analysis
• Risk calculations
• Risk analysis matrix
• Annualized Loss Expectancy (ALE = SLE x ARO)
• Asset Value (AV)
• Market Approach
• Income Approach
• Cost Approach
• Exposure Factor (EF) – expressed as a percent
of asset exposed (given a threat and
vulnerability)
• Single Loss Expectancy (SLE = AV x EF)
• Annual Rate of Occurrence (ARO)
CISSP Mentor Program Session #2
Risk Analysis
• Total Cost of Ownership (TCO) - ROSI
• Budget and Metrics – I can’t manage what I can’t measure
• Risk Choices
• Accept the risk; document risk acceptance criteria
• Mitigate the risk
• Transfer the risk; insurance?
• Risk Avoidance
CISSP Mentor Program Session #2
Risk Analysis
• Qualitative Risk Analysis
• Quantitative Risk Analysis
• Risk Management Process (NIST SP 800-30 outlines a 9-step process)
1. System Characterization
2. Threat Identification
3. Vulnerability Identification
4. Control Analysis (vulnerabilities)
5. Likelihood Determination
6. Impact Analysis
7. Risk Determination
8. Control Recommendations
9. Results Documentation
CISSP Mentor Program Session #2
Types of Attackers
• Hackers
• Black hat (or “Cracker” or “malicious hacker”)
• White hat (or “ethical hacker”)
• Gray hat (confused/identity crisis)
• Script Kiddies – low skill, can click and type, use tools/scripts made by others
• Outsiders vs. Insiders
• Hacktivist
• Bots and Botnets
• Phishers and Spear Phishers (also vishers and whalers or whaling)
Questions?
PHEW!!! We made it.
Homework for Tuesday (4/4)
◦ Read Chapter 3/Domain 2: Asset Security (Protecting Security of Assets)
– Pages 81 through 98 (short!); I will probably cover more on Tuesday
though. Feel free to read into Chapter 4/Domain 3: Security
Engineering (Engineering and Management of Security)
◦ Complete the quiz (or we’ll cover on Tuesday)
◦ Come with questions!
Have a great weekend!
Questions?
Hopefully about security.
Thank you!
Evan Francen
◦ FRSecure
◦ efrancen@frsecure.com
◦ 952-467-6384

More Related Content

PDF
Slide Deck - CISSP Mentor Program Class Session 1
PPTX
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck CISSP Class Session 3
PPTX
Purple Teaming - The Collaborative Future of Penetration Testing
PDF
Slide Deck CISSP Class Session 2
PPTX
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
PDF
Slide Deck CISSP Class Session 4
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck CISSP Class Session 3
Purple Teaming - The Collaborative Future of Penetration Testing
Slide Deck CISSP Class Session 2
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck CISSP Class Session 4

What's hot (20)

PDF
PDF
2018 CISSP Mentor Program Session 2
PPTX
HHS Ransomware and Breach Guidance - Brad Nigh
PDF
Craft Your Cyber Incident Response Plan (Before It's Too Late)
PPTX
How to Build a Successful Incident Response Program
DOCX
SEC440: Incident Response Plan
PDF
Chapter 15 incident handling
PPTX
Incident Response in the age of Nation State Cyber Attacks
PDF
Setting up CSIRT
PPTX
Insider threat kill chain
PDF
Incident Response
PDF
The Accidental Insider Threat
PPTX
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
PPTX
Cissp- Security and Risk Management
PPTX
Insider Threat Solution from GTRI
PPTX
Dancyrityshy 1foundatioieh
PDF
Identify and Stop Insider Threats
PDF
Science of Security: Cyber Ecosystem Attack Analysis Methodology
PDF
CSIRT_16_Jun
2018 CISSP Mentor Program Session 2
HHS Ransomware and Breach Guidance - Brad Nigh
Craft Your Cyber Incident Response Plan (Before It's Too Late)
How to Build a Successful Incident Response Program
SEC440: Incident Response Plan
Chapter 15 incident handling
Incident Response in the age of Nation State Cyber Attacks
Setting up CSIRT
Insider threat kill chain
Incident Response
The Accidental Insider Threat
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Cissp- Security and Risk Management
Insider Threat Solution from GTRI
Dancyrityshy 1foundatioieh
Identify and Stop Insider Threats
Science of Security: Cyber Ecosystem Attack Analysis Methodology
CSIRT_16_Jun
Ad

Viewers also liked (13)

PPTX
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 9 – FRSecure CISSP
PDF
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
PDF
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
PDF
Slide Deck CISSP Class Session 7
PPTX
Slide Deck CISSP Class Session 5
PPTX
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
PDF
Slide Deck CISSP Class Session 6
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 9 – FRSecure CISSP
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 5
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck CISSP Class Session 6
Ad

Similar to Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017 (20)

PDF
2019 FRecure CISSP Mentor Program: Session Two
PDF
2020 FRSecure CISSP Mentor Program - Class 2
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PPT
CNS UNIT 1 NEW NEW UNIT has been s 1.ppt
PDF
cnsunit1-slide-220111071646 (1).pdf
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
Whitman_Ch03.pptx
PDF
541341322-3-ITE403-Whitman-Ch03-W3C1.pdf
PDF
1 info sec+risk-mgmt
PDF
2018 CISSP Mentor Program- Session 6
PPTX
Law and Order in PK in a country is most important
PPTX
Module 1-History and Overview of Ethical and Legal Issues.pptx
PPTX
Laws and ethics in information assurance
PDF
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
PPTX
security IDS
PPTX
Law and Ethics in Information Security.pptx
PDF
Concepts of Cyber Security lecture notes.pdf
PPT
Ethics in IT Security
PPTX
539547533-Law-and-Ethics-in-Information-Security-1.pptx
2019 FRecure CISSP Mentor Program: Session Two
2020 FRSecure CISSP Mentor Program - Class 2
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNS UNIT 1 NEW NEW UNIT has been s 1.ppt
cnsunit1-slide-220111071646 (1).pdf
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
Whitman_Ch03.pptx
541341322-3-ITE403-Whitman-Ch03-W3C1.pdf
1 info sec+risk-mgmt
2018 CISSP Mentor Program- Session 6
Law and Order in PK in a country is most important
Module 1-History and Overview of Ethical and Legal Issues.pptx
Laws and ethics in information assurance
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
security IDS
Law and Ethics in Information Security.pptx
Concepts of Cyber Security lecture notes.pdf
Ethics in IT Security
539547533-Law-and-Ethics-in-Information-Security-1.pptx

More from FRSecure (20)

PDF
2020 FRSecure CISSP Mentor Program - Class 11
PDF
2020 FRSecure CISSP Mentor Program - Class 10
PDF
2020 FRSecure CISSP Mentor Program - Class 9
PDF
2020 FRSecure CISSP Mentor Program - Class 8
PDF
2020 FRSecure CISSP Mentor Program - Class 7
PDF
2020 FRSecure CISSP Mentor Program - Class 6
PDF
2020 FRSecure CISSP Mentor Program - Class 5
PDF
2020 FRSecure CISSP Mentor Program - Class 4
PDF
2020 FRSecure CISSP Mentor Program - Class 3
PDF
2020 FRsecure CISSP Mentor Program - Class 1
PDF
2019 FRSecure CISSP Mentor Program: Class Eleven
PDF
2019 FRSecure CISSP Mentor Program: Class Ten
PDF
2019 FRSecure CISSP Mentor Program: Class Nine
PDF
2019 FRSecure CISSP Mentor Program: Class Eight
PDF
2019 FRSecure CISSP Mentor Program: Class Seven
PDF
2019 FRSecure CISSP Mentor Program: Class Six
PDF
2019 FRSecure CISSP Mentor Program: Class Four
PDF
2019 FRSecure CISSP Mentor Program: Class Three
PDF
2019 FRSecure CISSP Mentor Program: Class One
PDF
2018 FRSecure CISSP Mentor Program Session 11
2020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 3
2020 FRsecure CISSP Mentor Program - Class 1
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Eight
2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class One
2018 FRSecure CISSP Mentor Program Session 11

Recently uploaded (20)

PPTX
Pharma ospi slides which help in ospi learning
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Complications of Minimal Access Surgery at WLH
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Insiders guide to clinical Medicine.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Classroom Observation Tools for Teachers
PDF
RMMM.pdf make it easy to upload and study
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Institutional Correction lecture only . . .
PPTX
Lesson notes of climatology university.
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Basic Mud Logging Guide for educational purpose
Pharma ospi slides which help in ospi learning
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Complications of Minimal Access Surgery at WLH
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Sports Quiz easy sports quiz sports quiz
Insiders guide to clinical Medicine.pdf
TR - Agricultural Crops Production NC III.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Classroom Observation Tools for Teachers
RMMM.pdf make it easy to upload and study
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Institutional Correction lecture only . . .
Lesson notes of climatology university.
Anesthesia in Laparoscopic Surgery in India
STATICS OF THE RIGID BODIES Hibbelers.pdf
Cell Structure & Organelles in detailed.
Supply Chain Operations Speaking Notes -ICLT Program
Basic Mud Logging Guide for educational purpose

Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017

  • 1. FRSecure 2017 CISSP Mentor Program EVAN FRANCEN, PRESIDENT & CEO – FRSECURE BRAD NIGH, SENIOR INFORMATION SECURITY ANALYST - FRSECURE CLASS SESSION #2
  • 2. CISSP Mentor Program Session #2 Domain 1: Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity • Cornerstone Information Security Concepts • Legal and Regulatory Issues • Security and 3rd Parties • Ethics • Information Security Governance • Access Control Defensive Categories and Types • Risk Analysis • Types of Attackers
  • 3. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Information security is the application of administrative, physical, and technical controls to protect the confidentiality, integrity, and availability of information. “Most organizations overemphasize technical controls to protect confidentiality and do so at the expense of other critical controls and purposes.”
  • 4. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Information security is the application of administrative, physical, and technical controls to protect the confidentiality, integrity, and availability of information. Balance is critical Opposite of C I A is D A D (Disclosure, Alteration, and Destruction)
  • 5. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Privacy is the application of administrative, physical, and technical controls to protect the confidentiality, of personally identifiable information (“PII”).
  • 6. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Identity, Authentication, Authorization, and Accountability (“AAA”) • Identity is who I am. • Often a name, username, ID number, employee number, etc. • You’d have to take my word for it if I don’t prove it. • Social engineers often profess an identity without proving it.
  • 7. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Identity, Authentication, Authorization, and Accountability (“AAA”) • Authentication is proving who I am. • Often a password, PIN code, picture, etc. • Identity without authentication is pretty much useless • If I steal your authentication, I get to be you! • Identity and authentication should be different (SSN)
  • 8. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Identity, Authentication, Authorization, and Accountability (“AAA”) • Three types (or factors) of authentication • Something only you know; password, PIN number, etc. • Something only you have; tokens, phone, debit card, etc. • Something only you are; biometrics • Using two (or more) factors is called “strong” authentication or multi-factor authentication
  • 9. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Identity, Authentication, Authorization, and Accountability (“AAA”) • What the system will allow me to do • After I identify and authenticate • Authorization is tied to identity • Sometimes referred to as privileges or rights
  • 10. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Identity, Authentication, Authorization, and Accountability (“AAA”) • A record of what I did • Before and after authentication • Accountability is also tied to identity. If my identity (and authentication) is stolen or shared, there is no accountability. • Shared accounts are bad. • Non-repudiation; the ability to prove that someone (or something) performed an action.
  • 11. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Very similar, but slightly different: • Least Privilege is tied to rights; basically what I can do with and in the system. • Need to Know is tied to information; basically what I can with information. I violation of least privilege can easily violate the Need to Know principle. "Over 30 percent of respondents admit to having no policy in place for managing administrator access” http://www.businessnewsdaily.com/4614-managing-administrator-access- security.html#sthash.o753cCcv.dpuf
  • 12. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Subjects and Objects • A subject is an active entity; users, services, applications, etc. • An object is a passive entity; paper, database tables, etc. • An entity can be a subject in one instance and an object in another. It really depends on context. Expect the exam to use these definitions and test you on them.
  • 13. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Defense-in-depth • The concept stresses the importance of not relying upon a single (or single layer) of controls. • Multiple controls (or safeguards) to protect (or reduce risk to) information assets. • Bypassing one control leads to the occurrence of another.
  • 14. CISSP Mentor Program Session #2 Cornerstone Information Security Concepts Due Care and Due Diligence • Be careful to not provide legal guidance. Lawyers do that. • Both concepts rely on the “prudent man” rule. What would a prudent man do in a similar situation? • Due care is doing what the prudent man would do. • Due diligence is management (formal) of due care. • Negligence (and gross negligence) is not practicing due care. Some people go as far as calling this reckless.
  • 15. CISSP Mentor Program Session #2 Legal and Regulatory Issues Compliance is critical! Although “compliance” and “security” are two different things. • More detailed instruction about compliance is provided when we get to Domain 9: Legal, Regulations, Investigations, and Compliance. • Compliance is doing what you’ve been told to do or what you’ve been commanded to do. • Security is using administrative, physical, and technical controls to protect (or manage risks related to) confidentiality, integrity, and availability of information.
  • 16. CISSP Mentor Program Session #2 Legal and Regulatory Issues Major Legal Systems • There are four major legal systems that are covered in the exam: • Civil Law • Common Law • Religious Law • Customary Law • There are different legal systems in different parts of the world. Be aware of what legal system is used in whatever country you’re operating in!
  • 17. CISSP Mentor Program Session #2 Legal and Regulatory Issues Major Legal Systems – Civil Law • A very Most common legal system throughout the world. • Codified laws (or statutes) • A legislative body (or branch) is usually tasked with creating the laws/statutes. • Judicial body (or branch) interprets the law. • No (or very little) weight is given to judicial precedent or outcomes from previous cases.
  • 18. CISSP Mentor Program Session #2 Legal and Regulatory Issues Major Legal Systems – Common Law • The legal system in the United States, Canada, U.K. and others • Codified laws (or statutes) • A legislative body (or branch) is usually tasked with creating the laws/statutes. • Much weight is given to judicial precedent and outcomes from previous cases. Judicial interpretations of the laws can change over time. This is the most likely legal system to be referred to on the exam.
  • 19. CISSP Mentor Program Session #2 Legal and Regulatory Issues Major Legal Systems – Religious Law • Religious doctrine and/or interpretation is the source of laws/statutes. • Extent and degree of interpretation and enforcement varies greatly from jurisdiction to jurisdiction. • Islam is the most common source for religious legal systems. • Sharia Law • Qur’an and Hadith are used.
  • 20. CISSP Mentor Program Session #2 Legal and Regulatory Issues Major Legal Systems – Customary Law • Refers to the customs or practices within a jurisdiction. • The laws/statutes are often undocumented, but generally well-understood. • Best practices  negligence
  • 21. CISSP Mentor Program Session #2 Legal and Regulatory Issues Within the Common Law (legal system)
  • 22. CISSP Mentor Program Session #2 Legal and Regulatory Issues Within the Common Law (legal system) – Criminal Law • Victim is society – promote and maintain an orderly and law-abiding citizenry • Require proof beyond a reasonable doubt • Deter crime and punish offenders
  • 23. CISSP Mentor Program Session #2 Legal and Regulatory Issues Within the Common Law (legal system) – Civil Law • Victim is an individual, group, or organization • Most commonly between private parties • One act can be prosecuted under both criminal and civil procedures • Damages are financial (often): • Statutory Damages – prescribed by the law (even if no loss or injury to the victim) • Compensatory Damages – awarded to compensate a victim for loss or injury • Punitive Damages – to punish and discourage really bad behavior • Burden of proof is the preponderance of the evidence (think tipping the scale)
  • 24. CISSP Mentor Program Session #2 Legal and Regulatory Issues Within the Common Law (legal system) – Civil Law
  • 25. CISSP Mentor Program Session #2 Legal and Regulatory Issues Within the Common Law (legal system) – Administrative Law • Laws enacted by governmental agencies • Typically the legislature or President issues an administrative law • The agency interprets the law and enforces it • Government-mandated compliance • Examples include FCC regulations, HIPAA, FDA regulations, FTC regulations, etc.
  • 26. CISSP Mentor Program Session #2 Legal and Regulatory Issues Within the Common Law (legal system) – Administrative Law
  • 27. CISSP Mentor Program Session #2 Legal and Regulatory Issues Liability • Who should be held accountable • Who should we blame • Who should pay! • Apply the Prudent Man Rule • Due Care • Due Diligence
  • 28. CISSP Mentor Program Session #2 Legal and Regulatory Issues Legal Aspects of Investigations • Collecting and handling evidence is a critical legal issue – some evidence carries more weight than others • Types of evidence • Real Evidence – consists of tangible or physical objects; a computer or hard drive is real evidence, but the data is NOT. • Direct Evidence – testimony from a first hand witness using one or more of his/her five senses; non-first hand evidence is called “hearsay”. • Circumstantial Evidence – establishes the circumstances related to points in the case or other evidence; not good to use alone to prove a case. • Corroborative Evidence – evidence to strengthen a fact or element of a case; provides additional support, but cannot establish a fact on its own. • Hearsay Evidence – second hand evidence normally considered inadmissible in court (Rule 802), but there are exceptions (Rule 803)…
  • 29. CISSP Mentor Program Session #2 Legal and Regulatory Issues Legal Aspects of Investigations - Hearsay Evidence • There are rules (namely Rule 803 and Rule 804) within the Federal Rules of Evidence of the United States that permit exclusions to Rule 802 • Business and computer generated records (logs) are generally considered to be hearsay evidence. • Rule 803 allows for records or reports that were “made at or near the time by, or from information transmitted by, a person with knowledge, if kept in the course of a regularly conducted business activity, and if it was the regular practice of that business activity to make the memorandum, report, record or data compilation” • Rule 1001 allows for the admissibility of binary disk and physical memory images; “if data are stored in a computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately, is an ‘original’.
  • 30. CISSP Mentor Program Session #2 Legal and Regulatory Issues Legal Aspects of Investigations • Best Evidence Rule – courts prefer the best evidence possible; evidence should be relevant, authentic, accurate, complete, and convincing – direct evidence is always best. • Secondary Evidence – common in cases involving computers; consists of copies vs. originals – logs and documents from computers are considered secondary • Evidence Integrity – evidence must be reliable; hashes, copies vs. originals, etc. • Chain of Custody – chain of custody form • Prosecuting computer crimes (criminal) is hard…
  • 31. CISSP Mentor Program Session #2 Legal and Regulatory Issues Legal Aspects of Investigations – Reasonable Searches • Fourth Amendment to the United States Constitution protects citizens from unreasonable search and seizure • In ALL cases, the court will determine if evidence was obtained legally • Law enforcement needs a search warrant issued by a judge (in most cases) • Plain sight • Public checkpoints • Exigent circumstances – immediate threat to human life or of evidence destruction • Only apply to law enforcement and those operating under the “color of law” – Title 18. U.S.C. Section 242 – Deprivation of Rights Under the Color of Law
  • 32. CISSP Mentor Program Session #2 Legal and Regulatory Issues Legal Aspects of Investigations – Entrapment & Enticement • Entrapment – persuades someone to commit a crime who otherwise had no intent to commit a crime – valid legal defense • Enticement – persuades someone to commit a crime who already had the intent to commit a crime – not a valid defense. Honeypots
  • 33. CISSP Mentor Program Session #2 Legal and Regulatory Issues Intellectual Property – Trademarks and Servicemarks • Trademarks – ® and ™ • Creation of a distinguishing brand • Applies to name, logo, symbol, or image (usually) • ™ can be used freely by anyone; unregistered trademark • ® is a registered trademark with the U.S. Patent and Trademark Office • A superscript “SM” can be used to brand a service
  • 34. CISSP Mentor Program Session #2 Legal and Regulatory Issues Intellectual Property – Trademarks and Servicemarks
  • 35. CISSP Mentor Program Session #2 Legal and Regulatory Issues Intellectual Property – Patents • Provide a monopoly to the patent holder in exchange for the patent holder making their invention public • Invention must be “novel” and “unique” • Generally patents provide exclusivity for 20 years • After patent expiration, the invention can be produced and sold by anyone
  • 36. CISSP Mentor Program Session #2 Legal and Regulatory Issues Intellectual Property – Copyright • Software is typically covered under copyright law • Limitations: • Fair sale – allow a legitimate purchaser to sell the software (or video, music, etc.) to someone else • Fair use – allows for duplication without the consent of the copyright holder, subject to the Copyright Act of 1976 • Licenses – contract between the consumer and provider; provides explicit limitations on the use and distribution of software; EULAs
  • 37. CISSP Mentor Program Session #2 Legal and Regulatory Issues Intellectual Property – Trade Secrets • Business-proprietary information that is essential for the organization to compete in the marketplace. • “Secret sauce” • Must be “actively protected” to be enforceable; using due care and due diligence • If an organization does not take reasonable steps to protect a trade secret, it is assumed that the organization doesn’t enjoy a competitive advantage from the trade secret, leading to a conclusion that it’s not actually a trade secret at all.
  • 38. CISSP Mentor Program Session #2 Legal and Regulatory Issues Intellectual Property – Intellectual Property Attacks • Constant problem • Piracy and copyright infringement – Pirate Bay, Bit Torrent, etc. • Cybersquatting & Typosquatting • Counterfeiting • Dilution (not really an attack)
  • 39. CISSP Mentor Program Session #2 Legal and Regulatory Issues Intellectual Property – Intellectual Property Attacks
  • 40. CISSP Mentor Program Session #2 Legal and Regulatory Issues Privacy • Confidentiality of personally-identifiable information (subset of security) • Examples of PII; names/email addresses (maybe), Social Security Numbers (SSN), Protected Health Information (“PHI”), bank account information (sort of), etc. • There are numerous privacy laws throughout the world
  • 41. CISSP Mentor Program Session #2 Legal and Regulatory Issues Privacy – European Union Privacy (EU Data Protection Directive) • Aggressive pro-privacy law • Notifying individuals of how their data is gathered and used • Allow for opt-out for sharing with 3rd parties • Opt-in required for sharing “most” sensitive data • Reasonable protections • No transmission out of EU unless the receiving country is perceived to have adequate (equal) privacy protections; the U.S. does NOT meet this standard. EU-US Safe Harbor, optional between organization and EU.
  • 42. CISSP Mentor Program Session #2 Legal and Regulatory Issues Privacy – European Union Privacy (EU Data Protection Directive)
  • 43. CISSP Mentor Program Session #2 Legal and Regulatory Issues Privacy – Organization for Economic Cooperation and Development (OECD) Privacy Guidelines • 30 member nations from around the world (including U.S.) • Focus on issues that impact the global economy • OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data; issued in 1980 • Eight principles…
  • 44. CISSP Mentor Program Session #2 Legal and Regulatory Issues Privacy – Organization for Economic Cooperation and Development (OECD) Privacy Guidelines • Eight driving principles: • Collection Limitation Principle • Data Quality Principle • Purpose Specification Principle • Use Limitation Principle • Security Safeguards Principle • Openness Principle • Individual Participation Principle • Accountability Principle • Not mandatory
  • 45. CISSP Mentor Program Session #2 Legal and Regulatory Issues Other Rules and Laws • Health Insurance Portability and Accountability Act (HIPAA not HIPPA) • Overseen by the Department of Health and Human Services (DHS), enforced by the Office for Civil Rights (OCR) • Three rules; Privacy Rule, Security Rule, and Breach (notification) Rule • Applies to “covered entities” and also (now) “business associates” • Originally passed in 1996, Security Rule finalized in 2003, modified in 2009 (HITECH), and Omnibus Rule in 2013 • Security Rule mandates certain administrative, physical, and technical safeguards • Risk analysis is required
  • 46. CISSP Mentor Program Session #2 Legal and Regulatory Issues Other Rules and Laws • Electronic Communications Privacy Act (ECPA) • Protection of electronic communications against warrantless wiretapping • Amended/weakened by the PATRIOT Act • Computer Fraud and Abuse Act (CFAA) – Title 18 Section 1030 • Most commonly used law to prosecute computer crimes • Enacted in 1986 • Amended in 1989, 1994, 1996, 2001, 2002 (PATRIOT Act), and 2008 (Identity Theft Enforcement and Restitution Act)
  • 47. CISSP Mentor Program Session #2 Legal and Regulatory Issues Other Rules and Laws • PATRIOT Act of 2001 • Expands law enforcement electronic monitoring capabilities • Allows search and seizure without immediate disclosure • Gramm-Leach-Bliley Act (GLBA) • Applies to financial institutions; driven by the Federal Financial Institutions Examination Council (FFIEC); enforced by member agencies, OCC, FDIC, FRB, NCUA, and CFPB • Enacted in 1999, requires protection of the confidentiality and integrity of consumer financial information
  • 48. CISSP Mentor Program Session #2 Legal and Regulatory Issues Other Rules and Laws • California Senate Bill 1386 (SB1386) • Regulates the privacy of personal information • One of the first data breach notification laws • Sarbanes-Oxley Act of 2002 (SOX) • Directly related to the financial scandals in the late 90s • Regulatory compliance standards for financial reporting • Intentional violations can result in criminal penalties
  • 49. CISSP Mentor Program Session #2 Legal and Regulatory Issues Other Rules and Laws • Payment Card Industry Data Security Standard (PCI-DSS) • Applies to cardholder (credit and debit) data • Created by the major card brands; VISA, MasterCard, Discover, etc. • NOT governmental and NOT a law (yet) • Requires merchants (and others) to meet a minimum set of security requirements • Mandates security policy, devices, control techniques, and monitoring
  • 50. CISSP Mentor Program Session #2 Legal and Regulatory Issues Breach Notification Laws • 47 48 (New Mexico) states have enacted breach notification laws • There is no Federal breach notification law • Conflicts arise in interpretations, jurisdictions, and definitions • Safe harbors may (or may not) be provided if the data was encrypted, depending on the state There are also two data protection laws and numerous data destruction laws. To make matters worse, there are data openness laws and Freedom of Information Act considerations!
  • 51. CISSP Mentor Program Session #2 Security and 3rd Parties Vendor Risk Management Considerations • Attestation – How can you attest to the fact that vendors are protecting assets adequately? Risk assessments (FISA™), SOC 2 (Type 1 and 2), ISO Certification, HITRUST, Shared Assessments, PCI-DSS ROC, etc. • Right to Penetration Test & Right to Audit • Procurement • Acquisitions • Divestures
  • 52. CISSP Mentor Program Session #2 Ethics ISC2® Code of Ethics • Very testable • Must be agreed to in order to become CISSP • Preamble, cannons (mandatory), and guidance (advisory) • Cannons: • Protect society, the commonwealth, and the infrastructure • Act honorably, honestly, justly, responsibly, and legally • Provide diligent and competent service to principals • Advance and protect the profession • Cannons are applied in order; if there are conflicts go with the higher one.
  • 53. CISSP Mentor Program Session #2 Ethics Computer Ethics Institute • Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other peoples computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
  • 54. CISSP Mentor Program Session #2 Ethics Internet Activities Board (IAB) Ethics • “Ethics and the Internet” • Defined as a Request for Comment (RFC), #1087 • Published in 1987 • Considered unethical behavior: • Seeks to gain unauthorized access to the resources of the Internet • Disrupts the intended use of the Internet • Wastes resources (people, capacity, computer) through such actions • Destroys the integrity of computer-based information • Compromises the privacy of users
  • 55. CISSP Mentor Program Session #2 Information Security Governance Security Policy and Related Documents • Policy (Mandatory) • Purpose • Scope • Responsibilities • Compliance • Policy types • Program policy • Issue-specific policy • System-specific policy
  • 56. CISSP Mentor Program Session #2 Information Security Governance Security Policy and Related Documents • Procedures • Mandatory • Step-by-step guidance • Standards • Mandatory • Specific use of a technology • Guidelines • Recommendations; discretionary • Advice/advisory • Baselines (or benchmarks) • Usually discretionary • Uniform methods of implementing a standard
  • 57. CISSP Mentor Program Session #2 Information Security Governance Personnel Security Considerations • Security Awareness and Training • Actually two different things • Training teaches specific skills • Awareness activities are reminders • Background Checks • Criminal history, driving records, credit checks, employment verification, references, professional claims, etc. • More sensitive roles require more thorough checks; one-time and ongoing • Employee Termination • Formalized disciplinary process (progressive) • Exit interviews, rights revocation, account reviews, etc. • Dealing with Vendors, Contractors, 3rd Parties • Outsourcing and Offshoring
  • 58. CISSP Mentor Program Session #2 Access Control Defensive Categories and Types • Categories • Administrative Controls • Technical Controls • Physical Controls • Types • Preventive • Detective • Corrective • Recovery • Deterrent • Compensating • Very testable; you may be given a scenario or control description and need to provide the category and type. • In order to be sure of the control type, you need to clearly understand context.
  • 59. CISSP Mentor Program Session #2 Risk Analysis • All decisions should be driven by risk. • Most people don’t assess risk well (formally or informally) • Assets • Threats • Vulnerabilities • Risk = Threat x Vulnerability • Risk = Threat x Vulnerability x Impact (better) • Risk is arguably the most overused and misunderstood concept in security. • I disagree with the book. Risk is the likelihood of something bad happening and the impact if it did.
  • 60. CISSP Mentor Program Session #2 Risk Analysis • Risk calculations • Risk analysis matrix • Annualized Loss Expectancy (ALE = SLE x ARO) • Asset Value (AV) • Market Approach • Income Approach • Cost Approach • Exposure Factor (EF) – expressed as a percent of asset exposed (given a threat and vulnerability) • Single Loss Expectancy (SLE = AV x EF) • Annual Rate of Occurrence (ARO)
  • 61. CISSP Mentor Program Session #2 Risk Analysis • Total Cost of Ownership (TCO) - ROSI • Budget and Metrics – I can’t manage what I can’t measure • Risk Choices • Accept the risk; document risk acceptance criteria • Mitigate the risk • Transfer the risk; insurance? • Risk Avoidance
  • 62. CISSP Mentor Program Session #2 Risk Analysis • Qualitative Risk Analysis • Quantitative Risk Analysis • Risk Management Process (NIST SP 800-30 outlines a 9-step process) 1. System Characterization 2. Threat Identification 3. Vulnerability Identification 4. Control Analysis (vulnerabilities) 5. Likelihood Determination 6. Impact Analysis 7. Risk Determination 8. Control Recommendations 9. Results Documentation
  • 63. CISSP Mentor Program Session #2 Types of Attackers • Hackers • Black hat (or “Cracker” or “malicious hacker”) • White hat (or “ethical hacker”) • Gray hat (confused/identity crisis) • Script Kiddies – low skill, can click and type, use tools/scripts made by others • Outsiders vs. Insiders • Hacktivist • Bots and Botnets • Phishers and Spear Phishers (also vishers and whalers or whaling)
  • 64. Questions? PHEW!!! We made it. Homework for Tuesday (4/4) ◦ Read Chapter 3/Domain 2: Asset Security (Protecting Security of Assets) – Pages 81 through 98 (short!); I will probably cover more on Tuesday though. Feel free to read into Chapter 4/Domain 3: Security Engineering (Engineering and Management of Security) ◦ Complete the quiz (or we’ll cover on Tuesday) ◦ Come with questions! Have a great weekend!
  • 65. Questions? Hopefully about security. Thank you! Evan Francen ◦ FRSecure ◦ efrancen@frsecure.com ◦ 952-467-6384