Shared Flashcard Set

Details

CISSP (ElementK) Operational Security
CISSP, Element K 2nd Edition, Lesson 10
18
Computer Science
Professional
11/19/2009

Additional Computer Science Flashcards

 


 

Cards

Term
Operational Security
Definition
  • structured process of denying advesaries to critical info
Term
OPSEC Process
Definition
  1. ID Critical Information
  2. Analyze Threat
  3. Analyze Vulnerabilities
  4. Assess risk
  5. Apply suitbale OPSEC measures
Term
OPSEC Roles (3)
Definition
  1. User safeguard info; protect credentials
  2. System Admin implement operational environment for applications & users; AVAILABILITY; backup & restore, maintenance
  3. Security Admin pw maintenance, review logs, FW admins, review SW updates, maintain audit logs
Term
OPSEC Protection Areas (4)
Definition
  1. Security Clearance

  2. PW/PW Mgt issue pw, how often change, enforce strong pw
  3. Account Characteristics usernames, pw, age limits, account status, user groups like Admin/Server Operators/Account Operators/Print Operators
  4. Special Privileges need to know & least privilege, advice from owners
Term
Security Profiles
Definition
  • description of security relevent elements about each user in system
  • username
  • group memberships
  • PW strength, requirements
Term
OPSEC Best Practices (6)
Definition
  1. Redundancy
  2. Fault tolerance
  3. Backup and restore
  4. Material safeguarding safeguarding classified info; AC
  5. Material Destruction
  6. Material Reuse
Term
OPSEC Control Categories
Definition
  • Preventive
  • Detective
  • Corrective
  • Directive
  • Recovery
  • Deterrent
  • Compensating
Term
OPSEC Control Methods
Definition
  • SoD
  • Need to Know
  • Least Priv
  • Job Rotation
  • Mandatory Vacations
  • Antivirus Mgt
  • Audit
  • Closed Shop
  • Change Ctrl
Term
Security Auditing
Definition
  • practice of recording sec.-relevant events in audit file for future analysis
  • internal/ext
  • system/app/user-level
  • admin enables
  • admin selects events
  • record in log
Term
Clipping Levels
Definition
  • reduce log size
  • eliminates more media storage
  • set limit on # of logs for incident
Term
Security Audit Events
Definition
  1. ID Event
  2. Time of Event
  3. ID of individual/process causing event

System logs:

  • login attempt
  • login success/fail
  • logouts
  • applicatin accessing
  • file creations/deletions/modificaitons
  • account creation/modification/deletion

Application/DB Audit Logs:

  • transaction processed
  • data status before/after transactions
  • transaction failures/backout
Term
Security Monitoring
Definition
  • practice of monitoring operations controls to ID abnormal computer activity
  • IDS/Penetration Testing/Violation Processing
Term
Violation Analysis
Definition
  • tracks anomalies in user activity
  • also known as violation processing/tracking
  • uses clipping levels
Term
Violation Factors
Definition
  • source
  • frequency
  • severity
  • response
Term
Security Threats
Definition
  • disclosure
  • destruction
  • interruption of service
  • corruption/modification
  • theft
  • espionage
  • hacker/crackers
  • malicious code
Term
Unauthorized Access is . . .
Definition
security violation
Term
Security Violation Types (2)
Definition
  1. Physical unauth access to facility/theft/damage/disconnect electric&com
  2. Logical pw crack/man-in-middle/insert virus/pw compromising/social engineering
Term
Attack Responsiveness
Definition
  • System cleaning clean of attack to return to operational state (trusted recovery);virus removal/restore/reload SW & data
  • Assessing training/awareness
  • Evaluating protection updating security policies; testing current security
  • Vulnerability testing ID system flaws
Supporting users have an ad free experience!