Thor's+Study+Guide+ +CISM+Domain+4
Thor's+Study+Guide+ +CISM+Domain+4
Thor's+Study+Guide+ +CISM+Domain+4
2|Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
• We talk about incidences management; how we plan, test, and prepare for incidences and
disasters.
• The plans we make; our BCP, DRP and many other BCP sub plans (COOP, OEP, CIRP, …).
• How we build those plans from our BIA (Business Impact Analysis).
• We look at supply, personnel, and infrastructure redundancy.
• The different types of disaster Recovery sites.
• What we do after a disruption.
• Forensics: Digital, spinning disk, network, and software forensics.
• Data remanence and destruction.
• Then we finish Domain 4 by looking at malware, programming concepts, and personnel security.
• This should be what you are tested on for Domain 4 until the next planned CISM curriculum
change in 2027.
Administrative Security
Incident management
• Involves the monitoring and detection of security events on our systems, and how we react in
those events.
• It is an administrative function of managing and protecting computer assets, networks, and
information systems.
• The primary purpose is to have a well understood and predictable response to events and
computer intrusions.
• We have very clear processes and responses, and our teams are trained in them and know what to
when an event occurs.
• Incidents are very stressful situations, it is important staff knows exactly what to do, that they
have received ongoing training and understand the procedures.
• Incidences and events can generally be categorized in 3 classes:
o Natural: Hurricanes, floods, earthquakes, blizzards, anything that is caused by nature.
o Human: Done intentionally or unintentionally by humans, these are by far the most
common.
o Environmental: This is not nature, but the environments we work in, the power grid, the
internet connections, hardware failures, software flaws, …
• Event:
o An observable change in state, this is neither negative nor positive, it is just something has
changed.
o A system powered on, traffic from one segment to another, an application started.
• Alert:
o Triggers warnings if certain event happens.
3|Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
o This can be traffic utilization above 75% or memory usage at 90% or more for more than 2
minutes.
• Incident:
o Multiple adverse events happening on our systems or network, often caused by people.
• Problem:
o Incidence with an unknown cause, we would follow similar steps to incidence response.
o More time would be spent on root cause analysis, we need to know what happened so we
can prevent it from happening again, this could be a total internet outage or server crash.
• Inconvenience (Non-disasters):
o Non-disruptive failures, hard disk failure, 1 server in a cluster is down, …
• Emergency (Crisis):
o Urgent, event with the potential for loss of life or property.
• Disaster:
o Our entire facility is unusable for 24 hours or longer.
o If we are geographically diverse and redundant, we can mitigate this a lot.
o Yes, a snowstorm can be a disaster.
• Catastrophe:
o Our facility is destroyed.
• We most common use an 8-step lifecycle.
1. Preparation.
2. Detection (Identification).
3. Response (Containment).
4. Mitigation (Eradication).
5. Reporting.
6. Recovery.
7. Remediation.
8. Lessons Learned (Post-incident Activity,
Postmortem, or Reporting).
• Preparation:
o This is all the steps we take to prepare for
incidences.
o We write the policies, procedures, we train our
staff, we procure the detection soft/hardware, we give our incidence response team the
tools they need to respond to an incident.
o The more we train our team, the better they will handle the response, the faster we
recover, the better we preserve the crime scene (if there is one), the less impactful an
incident will be.
• Detection:
o Events are analyzed to determine if they might be a security incident.
o If we do not have strong detective capabilities in and around our systems, we will most
likely not realize we have a problem until long after it has happened.
o The earlier we detect the events, the earlier we can respond, IDS's can help us detect,
where IPS's can help us detect and prevent further compromise.
o The IDS's and IPS's can help us detect and prevent on a single network segment, we also
need something that can correlate all the information from the entire network.
4|Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
• Response:
o The response phase is when the incident response team begins interacting with affected
systems and attempts to keep further damage from occurring as a result of the incident.
o This can be taking a system off the network, isolating traffic, powering off the system, or
however our plan dictates to isolate the system to minimize both the scope and severity
of the incident.
o Knowing how to respond, when to follow the policies and procedures to the letter and
when not to, is why we have senior staff handle the responses.
o We make bit level copies of the systems, as close as possible to the time of incidence to
ensure they are a true representation of the incident.
o IT Security is there to help the business, it may not be the choice of senior management to
disrupt business to contain or analyze, it is ultimately a decision that is made by them.
o We stop it from spreading, but that is it, we contain the event.
• Mitigation:
o We understand the cause of the incident so that the system can be reliably cleaned and
restored to operational status later in the recovery phase.
o Organizations often remove the most obvious sign of intrusion on a system or systems but
miss backdoors and other malware installed in the attack.
o The obvious sign is often left to be found, where the actual payload is hidden. if that is
detected or assumed, we often just rebuild the system from scratch and restore
application files from a known good backup, but not system files.
o To ensure the backup is good, we need to do root cause analysis, we need a timeline for
the intrusion, when did it start?
o If it is from a known vulnerability we patch. If it's a newly discovered vulnerability we
mitigate it before exposing the newly built system to the outside again.
o If anything, else can be learned about the attack, we can add that to our posture.
o Once eradication is complete, we start the recovery phase.
• Reporting:
o We report throughout the process beginning with the detection, and we start reporting
immediately when we detect malicious activity.
o The reporting has 2 focus areas: technical and non-technical.
o The incident handling teams report the technical details of the incident as they start the
incident handling process, but they also notify management of serious incidents.
o The procedures and policies will outline when which level of management needs to be
informed and involved, it is commonly forgotten until later and can be a RPE (Resume
Producing Event).
o Management will also involve other departments if needed, this could be legal, PR or
whomever has been identified in the policies or procedures.
• Recovery:
o We carefully restore the system or systems to operational status.
o When the system is ready for reinsertion is determined by the business unit responsible
for the system.
o We closely monitor the rebuilt or cleaned system carefully, it is possible the attackers’ left
backdoors, or we did not remove all the infected sectors.
5|Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
o Often the system(s) are reinserted off peak hours to minimize the effect of the system(s)
still being infected, or they can be introduced in a controlled sandbox environment to see
if the infection persists.
• Remediation:
o The remediation happens during the mitigation phase, where vulnerabilities on the
impacted system or systems are mitigated.
o Remediation continues after mitigation and becomes broader; this can be patching all
systems with the same vulnerability or change how the organization authenticates.
• Lessons Learned:
o This phase is often overlooked, we removed the problem, we have implemented new
controls and safeguards.
o We can learn a lot from lessons learned, not just about the specific incidence, but how
well we handle them, what worked, what didn't.
o How can we as an organization grow and become better next time, we have another
incidence? While we may have fixed this one vulnerability there are potentially 100's of
new ones we know nothing about yet.
o At the end of lessons learned we produce a report to senior management, with our
findings, we can only make suggestions, they are ultimately in charge (and liable).
o Often after major incidents organizations shift to a top-down approach and will listen
more to IT Security.
o The outcome and changes of the Lessons Learned will then feed into our preparation.
• Root-Cause Analysis:
o We attempt to determine the underlying weakness or vulnerability that allowed the
incident to happen.
o If we do not do the root-cause analysis, we will most likely face the same problem again.
o We need to fix the vulnerability on the system(s) that were affected, but also on any
system in the organization that has that particular vulnerability or set of vulnerabilities.
o We could have a weak password policy and weak encryption, that could be the root cause
of a system compromise, we then would implement countermeasures to remove the
vulnerability.
o If we do nothing and just fix the problem, the root of the issue still persists, that is what
we need to fix.
6|Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
Older versions of NIST 800-34 had these steps as a framework for building our BCP/DRP, they are still very
applicable.
• Project Initiation: We start the project, identify stakeholders, get C-level approval, and formalize
the project structure.
• Scope the Project: We identify exactly what we are trying to do and what we are not.
• Business Impact Analysis: We identify and prioritize critical systems and components.
• Identify Preventive Controls: We identify the current and possible preventative controls we can
deploy.
• Recovery Strategy: How do we recover efficiently? What are our options? DR site, system restore,
cloud, ...
• Plan Design and Development: We build a specific plan for recovery from a disaster, procedures,
guidelines, and tools.
• Implementation, Training, and Testing: We test the plan to find gaps and we train staff to be able
to act on the plan.
• BCP/DRP Maintenance: It is an iterative process. Our organization develops, adds systems,
facilities or technologies and the threat landscape constantly changes, we have to keep improving
and tweaking our BCP and DRP.
7|Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
o We need top-down IT security in our organization (the exam assumed we have that).
o In serious disasters, it will be Senior Management or someone from our legal department
that will talk to the press.
o Most business areas often feel they are the most important area and because of that their
systems and facilities should receive the priority, senior management being ultimately
liable and the leaders of our organization, obviously have the final say in priorities,
implementations, and the plans themselves.
BCP/DRP’s are often built using the waterfall project management methodology.
Personnel
• Personnel Shortages (Human/Nature/Environmental):
o In our BCP, we also have to ensure that we have redundancy for our personnel and how
we handle cases where we have staff shortages.
o If we have 10% of our staff, how impacted is our organization?
o This can be caused by natural events (snow, hurricane) but is more commonly caused by
the flu or other viruses.
o Pandemics:
▪ Organizations should identify critical staff by position not by name and have it on
hand for potential epidemics. <Insert your own COVID-19 work experiences here.>
o Strikes:
▪ A work stoppage caused by the mass refusal of employees to work.
▪ Usually takes place in response to employee grievances.
▪ How diminished of a workforce can we have to continue to function?
o Travel:
▪ When our employees travel, we need to ensure both they and our data is safe.
▪ That may mean avoiding certain locations, limiting what they bring of hardware
and what they can access from the remote location.
▪ If they need laptops/smartphones, we use encryption, device monitoring, VPNs,
and all other appropriate measures.
8|Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
DR/BCP/EOP Post-disaster
(emergency recovery plan
Operations
plan)
• We have looked at the first 2 before, for now we will focus on Response and Recovery.
o Response: How we react in a disaster, following the procedures.
▪ How we respond and how quickly we respond is essential in Disaster Recovery.
▪ We assess if the incident we were alerted to or discovered is serious and could be
a disaster, the assessment is an iterative process.
• The more we learn and as the team gets involved, we can assess the
disaster better.
▪ We notify appropriate staff to help with the incident (often a call tree or
automated calls), inform the senior management identified in our plans and if
indicated by the plan communicate with any other appropriate staff.
o Recovery: Reestablish basic functionality and get back to full production.
▪ We act on our assessment using the plan.
▪ At this point all key stakeholders should be involved, we have a clearer picture of
the disaster and take the appropriate steps to recover. This could be DR site,
system rebuilds, traffic redirects, …
9|Page
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
• Recovery Strategy: How do we recover efficiently? What are our options? DR site, system restore,
cloud, ...
• Plan Design and Development: We build a specific plan for recovery from a disaster, procedures,
guidelines, and tools.
• Implementation, Training, and Testing: We test the plan to find gaps and we train staff to be able
to act on the plan.
• BCP/DRP Maintenance: It is an iterative process. Our organization develops, adds systems,
facilities or technologies and the threat landscape constantly changes, we have to keep improving
and tweaking our BCP and DRP.
• Senior management needs to be involved and committed to the BCP/DRP process; without that it
is just lip service.
o They need to be part of at least the initiation and the final approval of the plans.
o They are responsible for the plan, they own the plan and since they are ultimately liable,
they must show due-care and due-diligence.
o We need top-down IT security in our organization (the exam assumed we have that).
o In serious disasters, it will be Senior Management or someone from our legal department
that will talk to the press.
o Most business areas often feel they are the most important area and because of that their
systems and facilities should receive the priority, senior management being ultimately
liable and the leaders of our organization, obviously have the final say in priorities,
implementations, and the plans themselves.
• BCP/DRP’s are often built using the waterfall project management methodology, we will cover it
in the next domain.
• The BCP team has sub-teams responsible for rescue, recovery, and salvage in the event of a
disaster or disruption.
o Rescue Team (Activation/Notification):
▪ Responsible for dealing with the disaster as it happens. Evacuates employees,
notifies the appropriate personnel (call trees) pulls the network from the infected
server or shuts down systems, and initial damage assessment.
o Recovery Team (Failover):
▪ Responsible for getting the alternate site up and running as fast as possible or for
getting the systems rebuilt.
▪ We get the most critical systems up first.
o Salvage Team (Failback):
▪ Responsible for returning our full infrastructure, staff and operations to our
primary site or a new facility if the old site was destroyed.
▪ We get the least critical systems up first; we want to ensure the new sites is ready
and stable before moving the critical systems back.
10 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
11 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
Recovery Strategies
• From our MTD we can determine our approach to how we handle disasters and the safeguards we
put in place to mitigate or recover from them.
o Redundant Site:
▪ Complete identical site to our production, receives a real time copy of our data.
▪ Power, HVAC, Raised floors, generators, …
▪ If our main site is down the redundant site will automatically have all traffic fail
over to the redundant site.
▪ The redundant site should be geographically distant and have staff at it.
▪ By far the most expensive recovery option, end users will never notice the fail
over.
o Hot Site:
▪ Similar to the redundant site, but only houses critical applications and systems,
often on lower spec’d systems.
12 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
▪ Still often a smaller but a full data center, with redundant UPS’s, HVAC’s, ISP’s,
generators, …
▪ We may have to manually fail traffic over, but a full switch can take an hour or
less.
▪ Near or real-time copies of data.
o Warm Site:
▪ Similar to the hot site, but not with real or near-real time data, often restored
with backups.
▪ A smaller but full data center, with redundant UPS’s, HVAC’s, ISP’s, generators, …
▪ We manually fail traffic over, a full switch and restore can take 4-24+ hrs.
o Cold Site:
▪ A smaller but full data center, with redundant UPSs’, HVAC’s, ISP’s, generators, …
▪ No hardware or backups are at the cold site, they require systems to be acquired,
configured and applications loaded and configured.
▪ This is by far the cheapest, but also longest recovery option, can be weeks+.
o Reciprocal Agreement Site:
▪ Your organization has a contract with another organization that they will give you
space in their data center in a disaster event and vice versa.
▪ This can be promised space or some racks with hardware completely segmented
off the network there.
o Mobile Site:
▪ Basically, a data center on wheels, often a container or trailer that can be moved
wherever by a truck.
▪ Has HVAC, fire suppression, physical security, (generator)… everything you need in
a full data center.
▪ Some are independent with generator and satellite internet; others need power
and internet hookups.
o Subscription/Cloud Site:
▪ We pay someone else to have a minimal or full replica of our production
environment up and running within a certain number of hours (SLA).
▪ They have fully built systems with our applications and receive backups of our
data, if we are completely down, we contact them, and they spin the systems up
and apply the latest backups.
▪ How fast and how much is determined by our plans and how much we want to
pay for this type of insurance.
13 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
14 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
o Call Trees:
▪ Each user in the tree calls a small number of people.
▪ The calling tree is detailed in the communications plan and should be printed out
and at the home of staff, assume we have no network or system access.
▪ Starts from the bottom up and then top down.
▪ The staff that discovers the incident calls their manager or director; they then
contact someone at a senior level (often the CEO).
▪ The CEO calls the rest of the C-level leadership, they call their directors and
managers, and the managers call their staff.
▪ Obviously only where it is appropriate and needed for the recovery effort or if
staff is directly impacted by the disaster.
▪ Should be done with 2-way confirmation, managers/directors should confirm to
their C-level executive that they did get a hold of the identified staff.
▪ Automated call trees are often a better idea than manual ones, notifying people
of the disaster is one of those things that tends to get forgotten.
▪ They are hosted at a remote location, often on SaaS, and key personnel that are
allowed to declare a disaster can activate them.
• Offsite copies and plans:
o We keep both digital and physical copies of all our plans at offsite locations, assume we
can’t access our data or our facilities. Relying on memory is a bad idea.
o We also keep critical business records in the same manner.
• EOC (Emergency Operations Center):
o A central temporary command and control facility responsible for our emergency
management, or disaster management functions at a strategic level during an emergency.
o It ensures the continuity of operation of our organization.
o We place the EOC in a secure location if the disaster is impacting a larger area.
15 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
o It is natural for key employees to move on, find a new job, retire, or win the lottery.
o If we do not prepare for it, we can cripple our organization.
o Can be mitigated with training and job rotation.
16 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
• Auditing:
o A 3rd party ensures that the plan is being followed, understood and the measures in the
plan are effective.
• For most of our plans we need to provide training for our staff on how they react and handle their
piece of the plan.
o We train evacuations, fire safety, CPR, first aid, and for the DRP the teams with
responsibilities needs to feel comfortable performing their tasks.
o If an employee is expected to restore a system from tape and they have never done it is
time to train them.
▪ Do they know how to get the restore tapes (they are of course not kept on
premises)?
o Does the UPS fail over automatically or does someone have to flip the switch, does every
data center employee know how to do that?
o It is each functional unit's responsibility they are ready for a disaster; they need to provide
the training (they are taught it), in the end what we need is awareness (they actively use
it).
o This is also where we would do as much as possible for the people redundancy.
▪ New staff is trained on our systems as well as the emergency protocols and how
to perform their tasks.
▪ If we only have one server administrator, we better hope he is not on vacation
when our incident happens.
After a Disruption
• Once we have had and recovered from a disruption or we have done our failover test, we do a
lessons learned.
• Lessons Learned:
o This phase is often overlooked, we removed the problem, we have implemented new
controls and safeguards.
o We can learn a lot from lessons learned, not just about the specific incidence, but how
well we handle them, what worked, what didn’t.
o What happened and didn’t happen is less important than how we improve for next time.
o We do not place blame, the purpose is improving.
17 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
o How can we as an organization grow, and become better next time we have another
incidence? While we may have fixed this one vulnerability, there are potentially 100’s of
new ones we know nothing about yet.
o The outcome and changes of Lessons Learned will then feed into our preparation and
improvement of our BCP and DRP.
• We only use our BCP/DRP's when our other countermeasures have failed.
• This makes the plans even more important. (Remember 72% of business with major data loss
closed).
• When we make and maintain the plans there are some common pitfalls we want to avoid:
o Lack of senior leadership support
o Lack of involvement from the business units
o Lack of critical staff prioritization
o Too narrow scope
o Inadequate telecommunications and supply chain management
o Lack of testing
o Lack of training and awareness
o Not keeping the BCP/DRP plans up to date, or no proper versioning controls
BCP/DRP Frameworks
• When building or updating our BCP/DRP plans, we can get a lot of guidance from these
frameworks, and just like the other standards and frameworks we use we often tailor and tweak
them to fit the needs of our organization.
• NIST 800-34:
o Provides instructions, recommendations, and considerations for federal information
system contingency planning. Contingency planning refers to interim measures to recover
information system services after a disruption.
• ISO 22301:
o Societal security, Business continuity management systems, specifies a management
system to manage an organization's business continuity plans, supported by ISO 27031.
• ISO/IEC-27031:
o Societal security, Business continuity management systems – Guidance, which provides
more pragmatic advice concerning business continuity management
18 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
Digital Forensics
Digital (Computer) Forensics:
• Focuses on the recovery and investigation of material found in digital devices, often in relation to
computer crime.
• Closely related to incident response, forensics is based on gathering and protecting the evidence,
where incidents responses are how we react in an event breach.
• We preserve the crime scene and the evidence, we can prove the integrity of it at a later needed
time, often court.
• The Forensic Process:
o Identify the potential evidence, acquire the evidence, analyze the evidence, make a
report.
o We need to be more aware of how we gather our forensic evidence, attackers are
covering their tracks, deleting the evidence and logs.
o This can be through malware that is only in volatile memory, if power is shut off (to
preserve the crime scene), the malware is gone, and the evidence is lost.
o Rather than shutting the system down, we can if considered safe disconnect it from the
network and take bit by bit copies of the memory, drives, running processes and network
connection data.
• The evidence we collect must be accurate, complete, authentic, convincing, admissible.
• Identification: Identify the evidence, what is left behind.
• Preservation:
o Everything is documented, chain of custody: Who had it when? What was done? When
did they do it?
o Pull the original, put it in write protected machine, we make a hash.
o We only do examinations and analysis on bit level copies; we confirm they have the same
hash as the original before and after examination
• Collection:
o We examine and analyze the data, again document everything.
o We handle the evidence as little as possible.
o Work from most volatile to least volatile, starting with the RAM and ending with the hard
disks.
• We use our incidence response plan:
o This can include getting our HR and Legal departments involved.
o We ensure our evidence is acquired in a legal manner. Remember the US Constitution 4th
amendment.
▪ The right of the people to be secure in their persons, houses, papers, and effects,
against unreasonable searches and seizures, shall not be violated.
o Anything subpoenaed, search warranted, turned over voluntarily and in exigent
circumstances (immediate danger of being destroyed), can allow law enforcement to
bypass the 4th amendment.
• Examination: Find the facts and document them, collecting the data.
19 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
https://thorteaches.com/study/
20 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
21 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
22 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
It is common to do multiple types of data destruction on sensitive data (both degaussing and disk
crushing/shredding).
23 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
▪ An attacker might be able to erase all log files on a compromised host, network-
based evidence might be the only evidence available for forensic analysis.
o The second type relates to law enforcement.
▪ In this case analysis of captured network traffic can include tasks such as
reassembling transferred files, searching for keywords and parsing human
communication such as emails or chat sessions.
• Systems used to collect network data for forensics use usually come in two forms:
o Catch-it-as-you-can:
▪ All packets passing through a certain traffic point are captured and written to
storage with analysis being done subsequently in batch mode.
▪ This approach requires large amounts of storage.
o Stop, look, and listen:
▪ Each packet is analyzed in a basic way in memory and only certain information is
saved for future analysis.
▪ This approach requires a faster processor to keep up with incoming traffic.
• Embedded Device Forensics:
o We have for decades analyzed and investigated standard systems, traffic, and hardware,
but embedded devices are a new player.
o They include SSDs, GPSs, cell phones, PDA, and much more.
o They can contain a lot of information, but how do we safely retrieve it while keeping the
integrity of the data?
o We talked about how the IoT (Internet of Things) can be a security concern, but all the
devices can also hold a wealth of information.
▪ Where does the GPS say the car, phone or person was at a certain time?
▪ When did the AC turn on? Can we assume someone was home at that time?
• Forensic examiners may have to be able to access, interpret and analyze embedded devices in
their investigation.
• Forensic software analysis:
o Comparing and/or reverse engineering software.
o Reverse engineering malware is one of the most common examples.
o Investigators often have a binary copy of a malware program and try to deduce what it
does.
o Common tools are disassemblers and debuggers.
• Software forensics can also refer to intellectual property infringement, for the exam this is not the
type we talk about.
• Egress Monitoring:
o Done to prevent data exfiltration both logically and physically.
o For logical egress monitoring, we can use DLP systems.
▪ This can be both network-based and endpoint DLP systems.
▪ Even if the data is encrypted and we can’t decrypt it, we can still prevent the
egress from our network.
24 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
o For physical egress monitoring, we could use guards, make sure the trash and any other
way things can be physically removed from our organization are monitored and secured.
• Electronic Discovery (E-discovery):
o The discovery in legal proceedings, litigation, government investigations, or Freedom of
Information Act requests, where the information is in electronic format.
o Considered different from paper information because of its intangible form, volume,
transience, and persistence.
o Usually accompanied by metadata that is not found in paper documents and that can play
an important part as evidence.
o The preservation of metadata from electronic documents creates special challenges to
prevent spoliation.
o Can be very costly and take a lot of time with the amounts of data we store. Proper
retention for backups can reduce this as well as what we back up.
o The Electronic Discovery Reference Model (EDRM):
▪ Information governance, identification, preservation, collection, processing,
review, analysis, production, and presentation.
0-day Attacks
0-day Vulnerabilities
• Vulnerabilities not generally known or discovered, the first time an attack is seen is considered day
0, hence the name.
• From when a vulnerability is discovered it is now only a short timespan before patches or
signatures are released on major software.
• With millions of lines of code in a lot of software and the 1% errors we talked about there will
always be new attack surfaces and vulnerabilities to discover. The only real defense against the 0-
day exploits is defense in depth and when discovered immediate patching as soon as it is
available, and we have tested it in our test environments. Most signatures in IDS/IPS and anti-virus
auto update as soon as new signatures are available.
• 0-day Vulnerability: The vulnerability that has not been widely discovered and published.
• 0-day Exploit: Code that uses the 0-day vulnerability.
• 0-day Attack: The actual attack using the code.
• The Stuxnet worm that targeted Iran's nuclear centrifuges used 4 unique 0-day exploits
(previously unheard of).
• It was developed over 5+ years and estimated to have cost 100's of millions of dollars.
• Stuxnet has three modules:
o A worm that executes all routines related to the main payload of the attack.
o A link file that automatically executes the propagated copies of the worm.
o A rootkit responsible for hiding all malicious files and processes, preventing detection of
Stuxnet.
• It is introduced to the target environment by an infected USB flash drive.
• The worm then propagates across the network, scanning for Siemens Step7 software on
computers controlling a PLC, if both are not present, Stuxnet becomes dormant inside the
computer, it will still replicate the worm.
25 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
• If both are present, Stuxnet introduces the infected rootkit onto the PLC and Step7 software,
modifying the codes and giving unexpected commands to the PLC while returning a loop of normal
operations system values feedback to the users.
26 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
Programming Concepts
• Machine Code:
o Software executed directly by the CPU, 0's and 1's understood by the CPU.
• Source Code:
o Computer programming language, written in text and is human understandable,
translated into machine code.
• Assembler Languages:
o Short mnemonics like ADD/SUB/JMP, which are matched with the full-length binary
machine code; assemblers convert assembly language into machine language. A
disassembler does the reverse.
• Compiler Languages:
o Translates the higher-level language into machine code and saves, often as executables,
compiled once and run multiple times.
• Interpreted Languages:
o Similar to compiler languages but interprets the code each time it is run into machine
code.
• Bytecode:
o An interpreted code, in intermediary form, converted from source code to interpreted,
but still needs to be converted into machine code before it can run on the CPU.
• Procedural Languages (Procedure-oriented):
o Uses subroutines, procedures, and functions.
• Object-oriented Programming (OOP):
o Based on the concept of objects, which may contain data, in the form of fields, often
known as attributes, and code, in the form of procedures, often known as methods.
o An object's procedures can access and often modify the data fields of the objects with
which they are associated.
o In OOP, computer programs are designed by making them out of objects that interact with
one another.
• 4th Generation languages (4GL):
o Fourth-generation languages are designed to reduce programming effort and the time it
takes to develop software, resulting in a reduction in the cost of software development.
o Increases the efficiency by automating the creation of machine code.
o Often uses a GUI, drag, and drop, and then generating the code, often used for websites,
databases, and reports.
• Programming Languages and Generations:
o 1st generation: Machine Code
o 2nd Generation: Assembler languages
o 3rd Generation: C, C++, Java, Python, PHP, Perl, C#, BASIC, Pascal, Fortran, ALGOL, COBOL,
o 4th Generation: ABAP, Unix Shell, SQL, PL/SQL, Oracle Reports, R, …
o 5th Generation: Prolog, OPS5, Mercury, …
• CASE (Computer-Aided Software Engineering):
o Similar to and were partly inspired by computer-aided design (CAD) tools used for
designing hardware products.
o Used for developing high-quality, defect-free, and maintainable software.
27 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
o Often associated with methods for the development of information systems together with
automated tools that can be used in the software development process.
o CASE software is classified into 3 categories:
▪ Tools support specific tasks in the software life cycle.
▪ Workbenches combine two or more tools focused on a specific part of the
software life cycle.
▪ Environments combine two or more tools or workbenches and support the
complete software life cycle.
• Top-Down Programming:
o Starts with the big picture, then breaks it down into smaller segments.
o An overview of the system is formulated, specifying, but not detailing, any first-level
subsystems.
o Each subsystem is then refined in yet greater detail, sometimes in many additional
subsystem levels, until the entire specification is reduced to base elements.
o Procedural programming leans toward Top-Down, you start with one function and add to
it.
• Bottom-Up Programming:
o Piecing together of systems to build more complex systems, making the original systems a
sub-system of the overarching system.
o The individual base elements of the system are first specified in great detail, they are then
linked together to form larger subsystems, which then in turn are linked, sometimes in
many levels, until a complete top-level system is formed.
o OOP leans tends toward Bottom-Up, you start by developing your objects and build up.
• Software Release:
o Open source:
▪ We release the code publicly, where it can be tested, improved, and corrected,
but it also allows attackers to find the flaws in the code.
o Closed Source:
▪ We release the software, but keep the source code a secret, may be sound
business practice, but can also be security through obscurity.
o Proprietary Software:
▪ Software protected by intellectual property and/or patents, often used
interchangeably with Closed Source software, but it really is not. It can be both
Open and Closed Source software.
▪ Any software not released into the public domain is protected by copyright.
o Free Software:
▪ Freeware:
• Actually, free software, it is free of charge to use.
▪ Shareware:
• Fully functional proprietary software that is initially free to use.
• Often for trials to test the software, after 30 days you have to pay to
continue to use.
▪ Crippleware:
• Partially functioning proprietary software, often with key features
disabled.
28 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
• Software Licenses:
o Open-source software can be protected by a variety of licensing agreement.
▪ GNU (General Public License) also called GPL:
• Guarantees end users the freedom to run, study, share and modify the
software.
• A copyleft license, which means that derivative work can only be
distributed under the same license terms.
▪ BSD (Berkeley Software Distribution):
• A family of permissive free software licenses, imposing minimal
restrictions on the use and redistribution of covered software.
• This is different than copyleft licenses, which have reciprocity share-alike
requirements.
▪ Apache:
• Software must be free, distribute, modify, and distribute the modified
software.
• Requires preservation of the copyright notice and disclaimer.
Database Security
• Polyinstantiation (Alternative Facts) – Two (or more) instances of the same file depending on who
accesses it.
o The real information may be available to subjects with Top Secret clearance, but different
information will be available to staff with Secret or lower clearance.
• Aggregation is a collection or gathering of data together for the purpose of statistical analysis.
(You see the bigger picture rather than the individual pieces of data).
• Inference requires deducing from evidence and reasoning rather than from explicit statements.
• Data mining is the computing process of discovering patterns in large data sets.
o It uses methods combining machine learning, statistics, and database systems.
• Data Analytics is looking at what normal operations look like, then allowing us to identify abuse
more proactively from insider threats or compromised accounts.
We mitigate the attacks with Defense in Depth (again) – We secure the building, the entrances, the
doors, the network, the servers, the OS, the DB, screen the employees, … We have solid policies,
procedures, standards, and guidelines.
29 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
Malware
Malware
• Malware (Malicious Code) - This is the catch-all name for any malicious software used to
compromise systems or data.
o Viruses - require some sort of human interaction and are often transmitted by USB sticks
or other portable devices.
o When the program is executed, it replicates itself by inserting its own code into other
programs.
▪ Macro (document) Viruses: Written in Macro Languages, embedded in other
documents (Word, Outlook).
▪ Boot Sector Viruses: Infect the boot sector or the Master Boot Record, ensuring
they run every time the PC boots.
▪ Stealth Viruses: Try to hide themselves from the OS and antivirus software.
▪ Polymorphic Viruses: Change their signature to avoid the antivirus signature
definitions.
▪ Multipart (Multipartite) Viruses: Spread across multiple vectors. They are often
hard to get rid of because even if you clean the file infections, the virus may still
be in the boot sector and vice-versa.
• Worms - spread through self-propagation - they need no human interaction; they do both the
payload damage and replicate through aggressive network use (also makes them easier to spot).
• Trojans - malicious code embedded in a program that is normal. This can be games, attachments,
website clicks, etc.
• Rootkits - Replace some of the OS/Kernel with a malicious payload. User rootkits work on Ring 3
and Kernel rootkits on Ring 0.
• Logic Bombs - Malicious code that executes at a certain time or event - they are dormant until the
event (IF/THEN).
o IF Bob is not getting an annual bonus over $10,000, THEN execute malicious code.
o IF date and time is 5/15/2022 00:02:12, THEN execute malicious code.
• Packers – Programs to compress *.exe files, which can be used to hide malware in an executable,
neutral technology.
• Antivirus Software - tries to protect us against malware.
o Signature based - looks for known malware signatures - MUST be updated constantly.
o Heuristic (Behavioral) based - looks for abnormal behavior - can result in a lot of false
positives.
• Server (Service) Side Attacks:
o Attacks directly from an attacker to a target.
o Defense in Depth can mitigate some of these.
o The term "Server" does not mean only servers, just that the attack is directly aimed at the
end target. (They come to you).
• Client-Side Attacks:
o The client initiates, then gets infected with malicious content usually from web browsers
or instant messaging applications. (You go to them).
o Since most firewalls protect inbound mostly, client-side attacks are often more successful.
30 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
OWASP
• OWASP (Open Web Application Security Project) 2021 - has a Top 10 of the most common web
security issues.
o A01:2021-Broken Access Control
o A02:2021-Cryptographic Failures
o A03:2021-Injection
o A04:2021-Insecure Design
o A05:2021-Security Misconfiguration
o A06:2021-Vulnerable and Outdated Components
o A07:2021-Identification and Authentication Failures
o A08:2021-Software and Data Integrity Failures
o A09:2021-Security Logging and Monitoring Failures
o A10:2021-Server-Side Request Forgery
• XML (Extensible Markup Language) is a markup language designed as a standard way to encode
documents and data.
o It is similar to HTML, but more universal.
o It is mainly used for Web but does not have to be, it can be used to store application
configuration, output from auditing tools, and many other things.
• SOA (Service-Oriented Architecture) is a style of software design where services are provided to
the other components by application components, through a communication protocol over a
network.
o The basic principles of service-oriented architecture are independent of vendors,
products, and technologies.
o SOA is intended to allow multiple different applications to be consumers of services.
31 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISM® Domain 4
Personnel Safety
Personnel Safety is always most important
• You may like your servers more but save the co-worker first. (This is very testable).
• Organizations should have clear policies, procedures, and standards for evacuations.
• Evacuation routes should be clearly marked and known by all staff.
• Meeting points should be established (can also stop staff from reentering the building looking for
a coworker who is already somewhere else outside).
• Evacuation roles are established; a pre-appointed person ensures all staff is out of the building
and another is the meeting point leader.
• Plans are in place for disabled employees (elevators are not working at this time).
• Fire/evacuation drills are held quarterly or annually.
• All exit doors (or special emergency-only doors) have the “panic bar” (crash bar).
• Just like in the data center, we have warning sirens and lights throughout the building to alert staff
to exit.
• In Domain 4 we talked about incidences management; how we plan, test, and prepare for
incidences and disasters.
• The plans we make; our BCP, DRP and many other BCP sub plans (COOP, OEP, CIRP, …).
• How we build those plans from our BIA (Business Impact Analysis).
• We looked at supply, personnel and infrastructure redundancy.
• The different types of disaster Recovery sites.
• What we do after a disruption.
• Forensics: Digital, spinning disk, network and software forensics.
• Data remanence and destruction.
• Then we finished Domain 4 by looking at malware, programming concepts, and personnel
security.
• This should be what you are tested on for Domain 4 until the next planned CISM curriculum
change in 2027.
32 | P a g e
https://thorteaches.com/