-
Information Security Fundamental
-
Principals
-
History
- Caesar cipher c50 B.C
- Enigma
-
Key concepts
-
CIA triad
- Confidentiality
- Integrity
- Availability
-
Parkerian hexad
- Confidentiality
- Possession or Control
- Integrity
- Authenticity
- Availability
- Utility
-
Risk management
must strike a balance between productivity, cost, effectiveness of the countermeasure, and the value of the informational asset being protected.
-
Threats
-
Type of Attacks
- Access Attacks
- Examples
- Network Packet Capture
- File Snoop
- Interception+Packet Replay
- Passwork Attack
- 1. Exploit > Buffer Overflow
- 2. local Password Attack 8,xxx,xxx Pass/Sec
- 3. Remote Credential Capture > local Password Attack 1,5xx,xxx Pass/sec
- 4. Remote Password Attack (Bad Quality) 120 Pass/Minute = 2 Pass/Sec
- Modification Attacks
- Denied of Service Attacks
- Examples
- Smurf
- Tear-Drop Attack
- Repudiation Attack
- Examples
- Identity Theaft
- Spoofing
-
Agents
- Hackers
- Crackers
- Script Kiddies
- Malicious Insiders
- Industrial Espionage
-
Vulnerability
- CVE
-
Sites
- VulnWatch
- Bugtraq
- Full-Disclosure
-
Vulnerability Assessment
- Tools
-
Countermeasures (Controls)
-
Types of controls
- Administrative (also called procedural controls)
- Laws and regulations
- The Family Educational Rights and Privacy Act 1974
- The Computer Misuse Act 1990
- Health Insurance Portability and Accountability Act 1996 (HIPAA)
- UK Data Protection Act 1998
- Gramm-Leach-Bliley Act 1999 (GLBA)
- Sarbanes-Oxley Act 2002
- Payment Card Industry Data Security Standard (PCI DSS)
- Personal Information Protection and Electronics Document Act (PIPEDA)
- EU Data Retention laws requires Internet service providers and phone companies to keep data on every electronic message sent and phone call made for between six months and two years
- Policies
- Examples
- Information Policy
- Identification of Sensitive Information
- Classifications
- Business sector
Public, Sensitive, Private, Confidential
- Government
Unclassified, Sensitive But Unclassified, Restricted, Confidential, Secret, Top Secret
- Marking of Sensitive Information
- Storage of Sensitive Information
- Transmission of Sensitive Information
- Destruction of Sensitive Information
- Security Policy
- Identification and Authentication
- Access Control
- Mechanisms
- Mandatory Access Control (MAC)
- Discretionary access control (DAC)
- Role Base Access Control (RBAC)
- Something you know
- Something you have
- Token
- Something you are
- Fingerprints
- Voices
- Eyes
- Faces
- Keystrokes
- Place you stay
- Audit
- Network Connectivity
- Malicious Code
- Encryption
- Waivers
- Appendices
- Computer Use Policy
- Ownership of Computers
- Ownership of Information
- Acceptable Use of Computers
- No Expectation of Privacy
- Internet Use Policy
- E-Mail Policy
- Internal Mail Issues
- External Mail Issues
- Deploying Policy
- Gaining Buy-In
- Education
- Implementation
- Standards
- International Organization for Standardization (ISO)
- The USA National Institute of Standards and Technology (NIST)
- The Internet Society
- IETF
- IAB
- ISOC
- The Information Security Forum
- The IT Baseline Protection Catalogs
- Guidelines
- Procedures
- Eamples
- User Management Procedures
- New Employee Procedure
- Transferred Employee Procedure
- Employee Termination Procedure
- System Administration Procedure
- Software Upgrades
- Vulnerability Scans
- Policy Reviews
- Log Reviews
- Regular Monitoring
- Logical (also called technical controls)
- Passwords
- Network and host based firewalls
- Packet Filtering Firewalls
- Stateful Firewalls
- Application Proxy Firewalls
- Intrusion detection systems
- Goals of the IDS
- Detection of the attacks
- Prevention of attacks
- Detection of policy violations
- Enforcement of use policies
- Enforcement of connection policies
- Collection of evidence
- Network-Based IDS
- Advantages
- The N-IDS can be completely hidden on the network.
- A single N-IDS can be used to monitor traffic to a large number of potential target systems.
- The N-IDS can capture the content of all packets traveling to a target system.
- Disadvantages
- The N-IDS system can only alarm if the traffic matches pre-configured rules or signatures.
- The N-IDS can miss traffic of interest due to high bandwidth utilization or alternate routes.
- The N-IDS cannot determine if the attack was successful.
- The N-IDS cannot examine traffic that is encrypted.
- Switched networks require special configurations.
- Host-Based IDS
- Advantages
- The H-IDS will not miss attack traffic that is directed at a system as long as the attack generates a log message.
- The H-IDS can determine if an attack was successful by examining log messages or other indication on the system.
- The H-IDS can be used to identify unauthorized access attempts by legitimate system users.
- Disadvantages
- The H-IDS process may be identified and disabled by an attacker.
- The H-IDS system can only alarm if the log entries or system calls match pre-configure rules or signatures.
- Certain H-IDS systems may impact support and maintenance agreements on operation system software.
- Access control lists
- Cryptography
- Cryptosystems
- Symmetric cryptosystems
- RC2
- RC4
- RC5
- IDEA
- DES
- 3DES
- AES
- Blowfish
- Asymmetric cryptosystems
- RSA
- Diffi Hellman
- Cryptographic Checksums
A mathematical function, called a checksum function, to generate a smaller set of k bits from the original n bits. This smaller set is called the checksum or message digest.
- Keyless hash functions
- MD2
- MD4
- MD5
- The Secure Hash Algorithm (SHA)
- Snefru
- HAVAL
- HMAC
- Key Management
- Certificate Signature Chains
- X.509
- PGP Certificate Signature Chains
- Key Exchange
- Kerboros
- Digital Signature
- Cryptanalysis
- Rainbow Table Attack
- Physical
- Doors
- Locks
- Heating and air conditioning
- Smoke and fire alarms
- Fire suppression systems
- CCTV
- Barricades
- Fencing
- Security guards
- Cable locks
-
Risk Assessment
-
Qualitative
- Descriptive versus measurable
- Risk Ratings
- High
- Medium
- Low
-
Quantitative
- Annualized Loss Expectancy (ALE)
- ALE = SLE × ARO
- Single Loss Exposure (SLE)
- SLE=AV × EF
- Return On Investment (ROI)
- ROI = ((ALE × RM) - CSI)/CSI
- Glossary
- AV = Asset Value
- EF = Exposure Factor
- SLE = Single Loss Exposure
- ALE = Annualized Loss Expectancy
- ARO = Annualized Rate of Occurrence
- ROI = Return On Investment
- RM = Risk Mitigated
- CSI = Cost Security Investment
-
Measurable Tools
- Enumerations
- Common Vulnerabilities and Exposures (CVE®)
- Common Configuration Enumeration (CCE™)
- Common Platform Enumeration (CPE™)
- Common Weakness Enumeration (CWE™)
- Common Attack Pattern Enumeration and Classification (CAPEC™)
- CWE/SANS Top 25 Most Dangerous Programming Errors
- Center for Internet Security (CIS) Consensus Security Metric Definitions
- Default Password Enumeration (DPE)
- OWASP Top ten
- SANS Top 20
- The Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance
- WASC Web Security Threat Classification
-
Choose
- Accept the risk
- Mitigate the risk
- Transfer the risk
- Deny the risk
-
System and Network Security
-
TCP/IP Threats
- Application Layer
-
Host-to-Host (OSI Transport Layer)
- Syn Flooding
- Stealth Scanning
- OS/Service Fingerprint
-
Internet Protocol (OSI Network Layer)
- IP
- IP-Spoof
- Source Routing
- Fragmentation
- Evasion Techniques
- Denied-of-Service
- Tear-Drop Attack
- ARP
- ARP Spoof
- Poisoning
- Port Stealing
- ICMP
- TTL Exceed for Scan Port (Firewalk)
- Denied-of Service
- Data Hiding (Covert Channels)
-
Physical (OSI Datalink Layer + OSI Physical)
- MAC
- MAC Flooding (Wire,wireless)
- MAC-Spoof
- 802.11
- Wireless (SSID, MAC) Capture
- Wireless static-share-key Attack (WEP)
- Wireless dynamic-share-key (WPA,WPA2)
- OS Hardening
-
Perimeter Network
- Firewall
- NAT
-
VPN
- IPSec
- Mode
- Transport
- Tunnel
- Key Management
- Internet Security Association and Key Management Protocol(ISAKMP) (link) <http://en.wikipedia.org/wiki/ISAKMP>
- Diffie-Hellman (link) <http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange>
- Packet Type
- Authentication Header (AH)
- Encryption Security Payload (ESP)
- IDS
- IPS
- Subtopic
-
Information Security Management
-
Information Security Framework
-
xxxx
- Assessment
- Policy
- Implement
- Security Education Training Awareness
- Audit Monitor
-
ISO
- Plan
- Do
- Check
- Ack
-
COBIT
- P,O
- A, I
- D, S
- M
-
Security Policy
-
Implementation
- Gaining-buy-in
- Education
-
Contingency Plan
- IRP
-
DRP
- Alternate Sites
- Mirror Site
- Hot Site
- Warm Site
- Cold Site
- BCP
-
Professionalism
- Certified Information Systems Security Professional (CISSP)
- The Information Systems Security Architecture Professional (ISSAP)
- Information Systems Security Engineering Professional (ISSEP)
- Information Systems Security Management Professional (ISSMP)
- Certified Information Security Manager (CISM)
- GIAC
-
Forensic
-
Acquisition
-
Valatile
- Disk
- Thumb Drive
- CD/DVD
- etc
-
Non-Valatite
- RAM
- Buffer
- Network Status
-
Hint
- Opened Machine, Don't Close
- Closed Machine, Dont OPEN
- Don't Save on Evidence
-
Evidence Collection and Protection
- HASH
- Chain-of-Custody
- Static-Bag
-
Dupplicate
- Bit-by-Bit
-
Analysis
- Index, Hash Collection
- Keyword
- Timeline
-
Hint
- USE Write-Blocker with ALL Evidence
- Security Program