2023+CC+Domain+1+Study+guide+by+ThorTeaches Com+v1 1
2023+CC+Domain+1+Study+guide+by+ThorTeaches Com+v1 1
2023+CC+Domain+1+Study+guide+by+ThorTeaches Com+v1 1
We will cover:
▪ The differences between Information security, IT Security, and Cybersecurity.
▪ The CIA triad and IAAA.
▪ Privacy.
▪ Risk and incident management.
▪ Access control.
▪ Governance, management, laws, and regulations.
▪ The ISC2 ethics.
1|Page
https://thorteaches.com/
CC Chapter 1 Lecture notes
Best practices for data in use - clean desk, no shoulder surfing, screen
view angle protector, PC locking (automatic and when leaving).
Strong passwords, multi-factor authentication, masking, access control,
need-to-know, least privilege.
▪ Threats:
Attacks on your encryption (cryptanalysis).
Social engineering.
Key loggers (software/hardware), cameras, steganography.
IOT (Internet of Things) – The growing number of connected devices we
have pose a new threat, they can be a backdoor to other systems.
▪ Threats:
Malicious attacks (DDOS, physical, system
compromise, staff).
Application failures (errors in the code).
Component failure (Hardware).
2|Page
https://thorteaches.com/
CC Chapter 1 Lecture notes
Destruction – Your data or systems have been destroyed or rendered
inaccessible.
⬧ Passwords:
▫ It is always easier to guess or steal passwords than it is to break
the encryption.
▫ We have password policies to ensure they are as secure as
possible.
3|Page
https://thorteaches.com/
CC Chapter 1 Lecture notes
→ They should contain minimum length, upper/lower case
letters, numbers, and symbols, they should not contain
full words or other easy to guess phrases.
→ They have an expiration date, password reuse policy
and minimum use before users can change it again.
→ Common and less secure passwords often contain:
• The name of a pet, child, family member,
significant other, anniversary dates, birthdays,
birthplace, favorite holiday, something related
to a favorite sports team, or the word
"password".
• Winter2023 is not a good password, even if it
does fulfil the password requirements.
▫ Key Stretching – Adding 1-2 seconds to password verification.
▫ If an attacker is brute forcing a password and needs millions of
tries it will become an unfeasible attack.
▫ Brute Force Attacks (Limit number of wrong logins):
▫ Uses the entire key space (every possible key), with enough
time any ciphertext can be decrypted.
▫ Effective against all key based ciphers except the one-time pad,
it would eventually decrypt it, but it would also generate so
many false positives the data would be useless.
▫ Clipping Levels: Clipping levels are in place to prevent
administrative overhead.
→ It allows authorized users who forget or mistype their
password to still have a couple of extra tries.
→ It prevents password guessing by locking the user
account for a certain timeframe (an hour), or until
unlocked by an administrator.
⬧ Password Management:
▫ We covered some password requirements, here are the official
recommendations by the U.S. Department of Defense and
Microsoft.
→ Password history = set to remember 24 passwords.
→ Maximum password age = 90 days.
→ Minimum password age = 2 days (to prevent users from
cycling through 24 passwords to return to their favorite
password again).
→ Minimum password length = 14 characters.
→ Passwords must meet complexity requirements = true.
→ Store password using reversible encryption = false.
4|Page
https://thorteaches.com/
CC Chapter 1 Lecture notes
5|Page
https://thorteaches.com/
CC Chapter 1 Lecture notes
▫ Magnetic Stripe Cards:
→ Swiped through a reader, no circuit.
→ Very easy to duplicate.
⬧ Tokens:
▫ HOTP and TOTP can be either hardware or software based.
▫ Cellphone software applications are more common now.
→ HOTP (HMAC-based One-Time Password):
• Shared secret and incremental counter,
generate code when asked, valid till used.
→ TOTP (Time-based One-Time Password):
• Time based with shared secret, often generated
every 30 or 60 seconds, synchronized clocks are
critical.
6|Page
https://thorteaches.com/
CC Chapter 1 Lecture notes
⬧ FAR (False accept rate) Type 2 error:
▫ Unauthorized user is granted access.
▫ This is a very serious error.
⬧ We want a good mix of FRR and FAR where they meet on the graph is
the CER (Crossover Error Rate), this is where we want to be.
7|Page
https://thorteaches.com/
CC Chapter 1 Lecture notes
▫ The FBI has a database with 52 million facial images and
Homeland Security and U.S. Customs and Border Patrol is
working on adding the iris scans and 170 million foreigner
fingerprints to the FBI’s database.
▫ The compromises of the future will have much more wide-
reaching ramifications than the ones we have seen until now.
Authorization
▪ What are you allowed to access?
▪ We use Access Control models. What and
how we implement depends on the
organization and what our security goals
are.
▪ More on this in later when we cover DAC,
MAC, RBAC, ABAC, and RUBAC.
8|Page
https://thorteaches.com/
CC Chapter 1 Lecture notes
⬧ Clearance: Subjects have Clearance assigned to them.
▫ Based on a formal decision on a subject's current and future
trustworthiness.
▫ The higher the clearance the more in depth the background
checks should be.
⬧ A role is assigned permissions, and subjects in that role are added to the
group, if they move to another position they are moved to the
permissions group for that position.
⬧ It makes administration of 1,000's of users and 10,000's of permissions
much easier to manage.
⬧ The most commonly used form of access control.
⬧ If implemented right, it can also enforce separation of duties and
prevent authorization/privilege creep.
▫ We move employees
transferring within the
organization from one role to
another and we do not just
add the new role to the old
one.
9|Page
https://thorteaches.com/
CC Chapter 1 Lecture notes
▫ Subject (user) – Name, role, ID, clearance, etc.
▫ Object (resource) – Name, owner, and date of creation.
▫ Environment – Location and/or time of access, and threat levels.
⬧ Expected to be used by 70% of large enterprises within the next 5 years,
versus around 25% today.
⬧ Can also be referred to as policy-based access control (PBAC) or claims-
based access control (CBAC).
▪ Non-repudiation.
A user cannot deny having performed a
certain action. This uses both
Authentication and Integrity.
▪ Subject and Object.
Subject – (Active) Most often users but
can also be programs – Subject
manipulates Object.
10 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
Object – (Passive) Any passive data (both physical paper and data) –
Object is manipulated by Subject.
Some can be both at different times, an active program is a subject;
when closed, the data in program can be object.
Privacy:
• Privacy is a human right.
▪ A definition of Privacy:
1. The state or condition of being free from being observed or disturbed by
other people.
2. Freedom from unauthorized intrusion.
• You as a citizen and consumer have the right that your Personally Identifiable
Information (PII) is being kept securely.
• US privacy regulation is a patchwork of laws, some overlapping and some areas with no
real protection.
• EU Law – Strict protection on what is gathered, how it is used and stored.
Risk Management:
Risk Management - Identification:
Risk = Threat * Vulnerability (or likelihood).
We can also use Risk = Threat * Vulnerability *
Impact.
11 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
Risk Assessment.
▪ Quantitative and Qualitative Risk
Analysis.
▪ Uncertainty analysis.
▪ Everything is done using cost-benefit
analysis.
▪ Risk Mitigation/Risk Transference/Risk
Acceptance/Risk Avoidance.
▪ Risk Rejection is NEVER acceptable.
▪ We assess the current countermeasures.
Are they good enough?
Do we need to improve on them?
Do we need to implement
entirely new countermeasures?
12 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
▪ The impact (or consequence) if event actually
occurs rated on an integer scale.
▪ The probability or likelihood of
its occurrence rated
on an integer scale.
▪ The Risk Score (or Risk Rating)
is the multiplication
of Probability and Impact, and
is often used to rank
the risks.
▪ Common mitigation steps (e.g.
within IT projects)
Identify
Analyze
Plan Response
Monitor
Control
13 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
▪ Mitigate the Risk (Reduction) – The laptop encryption/wipe is an example –
acceptable level (Leftover risk = Residual).
▪ Transfer the Risk – The insurance risk approach.
▪ Risk Avoidance – We don’t issue employees laptops (if possible) or we build the
data center in an area that doesn’t flood.
▪ Risk Rejection – You know the risk is there, but you are ignoring it. This is never
acceptable. (You are liable).
▪ Secondary Risk – Mitigating one risk may open up another risk.
14 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
Risk and Control Monitoring and Reporting
▪ The process is ongoing, we have to keep
monitoring both the risk and the controls we
implemented.
▪ This is where we could use the KRIs (Key Risk
Indicators)
▪ We would also use KPIs (Key Performance
Indicators)
▪ It is normal to do the Risk Management
lifecycle on an annual basis and do out-of-
cycle Risk Management on critical items.
15 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
The Ethics of your organization and (ISC)2:
ISC² Code of Ethics
▪ You agree to this before the exam, and the code of ethics is very testable.
▪ Understand the preamble and the 4 ethics canons, but they should not be a
substitute for the ethical judgment of the professional.
▪ Code of Ethics Preamble:
The safety and welfare of society and the common good, duty to our
principles, and to each other, requires that we adhere, and be seen to
adhere, to the highest ethical standards of behavior.
Therefore, strict adherence to this code is a condition of certification.
▪ Code of Ethics Canons:
Protect society, the common good, necessary public trust and
confidence, and the infrastructure.
Act honorably, honestly, justly, responsibly, and legally.
Provide diligent and competent service to principles.
Advance and protect the profession.
▪ Computer Ethics Institute:
Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people’s computer work.
Thou shalt not snoop around in other people’s computer files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which you have not
paid.
Thou shalt not use other people's’ computer resources without
authorization or proper compensation.
Thou shalt not appropriate other people's’ intellectual output.
Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
Thou shalt always use a computer in ways that ensure consideration
and respect for your fellow humans.
16 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
Governance vs. Management:
▪ Governance – This is C-level Executives.
Stakeholder’s needs, conditions and options are evaluated to define:
Balanced agreed-upon enterprise objectives to be achieved.
Setting direction through
prioritization and
decision making.
Monitoring
performance and
compliance against
agreed-upon
direction and
objectives.
Risk appetite –
Aggressive, neutral,
adverse.
▪ Management – How do we get to the destination.
Plans, builds, runs, and monitors activities in alignment with the
direction set by the governance to achieve the objectives.
Risk tolerance – How are we going to practically work with our risk
appetite and our environment.
C-Level Executives (Senior
Leadership) – Ultimately Liable.
▪ CEO: Chief Executive
Officer.
▪ CIO: Chief Information
Officer.
▪ CTO: Chief Technology
Officer.
▪ CSO: Chief Security
Officer.
▪ CISO: Chief Information
Security Officer.
▪ CFO: Chief Financial
Officer.
▪ Normal organizations
obviously have more C-
Level executives, the
ones listed here you need to know.
17 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
Laws and Regulations:
There are a handful types of laws covered on the exam and important to your job as an
IT Security Professional.
▪ Criminal Law:
“Society” is the victim and proof must be “Beyond a reasonable doubt”.
Incarceration, death, and financial fines to “Punish and deter”.
▪ Civil Law (Tort Law):
Individuals, groups or organizations are the victims and proof must be
”The majority of proof”.
Financial fines to “Compensate the victim(s)”.
▪ Administrative Law (Regulatory Law):
Laws enacted by government agencies (FDA Laws, HIPAA, FAA Laws,
etc.)
▪ Private Regulations:
Compliance is required by contract (For instance PCI-DSS).
▪ Customary Law:
Mostly handles personal conduct and patterns of behavior and it is
founded in traditions and customs of the area or region.
▪ Religious Law:
Based on the religious beliefs in that area or country, they often include
a code of ethics and moralities which are required to be upheld.
18 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
GDPR
▪ GDPR is a regulation in EU law on data protection and privacy for all individuals
within the European Union (EU) and the European Economic Area (EEA).
▪ It does not matter where we are based, if we have customers in EU/EEA we
have to adhere to the GDPR.
▪ Violators of the GDPR may be fined up to €20 million or up to 4% of the annual
worldwide turnover of the preceding financial year in case of an enterprise,
whichever is greater.
▪ Restrictions: Lawful Interception, national security, military, police, justice
system
▪ Right to access: Data controllers must be able to provide a free copy of an
individual’s data if requested.
▪ Personal data: Covers a variety of data types including: Names, Email
Addresses, Addresses, Unsubscribe confirmation URLs that contain email and/or
names, IP Addresses.
▪ Right to erasure: All users have a “right to be forgotten”.
▪ Data portability: All users will be able to request access to their data “in an
electronic format”.
▪ Data breach notification: Users and data controllers must be notified of data
breaches within 72 hours.
▪ Privacy by design: When designing data processes, care must be taken to
ensure personal data is secure. Companies must ensure that only data is
“absolutely necessary for the completion of duties”.
▪ Data protection officers: Companies whose activities involve data processing
and monitoring must appoint a data protection officer.
19 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
▪ Action & KPIs:
What do we need to do and how do we know when we achieved it?
Actions, Recourses, Outcomes, Owners, and Timeframes.
▪ Policies – Mandatory.
High level, non-specific.
They can contain “Patches, updates, strong
encryption”
They will not be specific to “OS, encryption
type, vendor Technology”
▪ Standards – Mandatory.
Describes a specific use of technology (All
laptops are W10, 64bit, 8gig memory,
etc.)
▪ Guidelines – non-Mandatory.
Recommendations, discretionary –
Suggestions on how you would do it.
▪ Procedures – Mandatory.
Low level step-by-step guides,
specific.
They will contain “OS,
encryption type, vendor
Technology”
20 | P a g e
https://thorteaches.com/
CC Chapter 1 Lecture notes
➢ Domain 1: What we covered.
This chapter is VERY important because:
▪ Every other knowledge domain build on top of this chapter
▪ This is the foundation.
We talked about:
▪ The differences between Information Security, IT Security, and Cybersecurity.
▪ The CIA triad and IAAA.
▪ Privacy.
▪ Risk and incident management.
▪ Access control.
▪ The (ISC)² ethics.
▪ Governance, management, laws, and regulations.
21 | P a g e
https://thorteaches.com/