Term
|
Definition
Service Level Agreement
centralized Agreement
describes IT service, documents service level targets, and specified the responsibilities of the IT service provider and the customer
|
|
|
Term
|
Definition
Service-level Requirements
Often precedes an SLA
requires for a service from a client viewpoint. Evolves into a draft SLA. |
|
|
Term
What is the standard that covers supply chain management? |
|
Definition
NIST Special Publication 800-161
Supply Chain Risk Management Practices for Federal Information Systems and Organizations |
|
|
Term
What are the threat modeling concepts? |
|
Definition
Visual representations based on Data Flow Diagrams
- PASTA
- TRIKE
Visual representations based on Flow Diagrams
- VAST |
|
|
Term
What is the Threat Modeling Process? |
|
Definition
5 step process
1. Identify security objectives
2. Survey the application/system
3. Decompose it
4. Identify threats
5. Identify vulnerabilities |
|
|
Term
|
Definition
- Confidentiality
- Integrity
- Availability |
|
|
Term
|
Definition
Oversight, and guidance from senior leadership
Policy, standards, baselines, guidelines, and procedures are included
|
|
|
Term
What terms describe the time horizons of planning? |
|
Definition
- Strategic - longer (5 years0
- Tactical - mid/short (6 months to 1 year)
- Operational - shortest (days to weeks) |
|
|
Term
|
Definition
Risk Management Framework
NIST SP 800-37R1 |
|
|
Term
|
Definition
1. Categorize Information System
2. Select security controls
3. Implement security controls
4. Assess security controls
5. Authorize information system
6. Monitor security controls |
|
|
Term
|
Definition
- Operationally Critical Threat Asset and Vulnerability Evaluation
- qualitative methodology
- people, hardware, software, information, and systems
- self-directed & easily modified
|
|
|
Term
|
Definition
- a risk management framework
- Factor Analysis of Information Risk
- designed to address security practice weakness
- allows organizations to speak the same language about risk and talk about risk in a consistent manner |
|
|
Term
|
Definition
Threat Agent Risk Assessment (created by intel)
- distills an immense number of possible information security attacks into a digest
- predictive framework to prioritize areas of concern |
|
|
Term
|
Definition
The process of identifying, evaluating, and preventing or reducing risk |
|
|
Term
|
Definition
The process by which risk management is achieved and includes analyzing an environment for risks, assessing the cost of various countermeasures for each risk, and creating a cost/benefit report for safeguards to present to upper management |
|
|
Term
What are the risk learning levels? |
|
Definition
- Awareness
- Training
- Education |
|
|
Term
|
Definition
Single Loss Expectancy (SLE)
an element of quantitative risk analysis
the cost associated with a single realized risk against a specific asset
SLE = asset value (AV) * exposure factor (EF)
|
|
|
Term
|
Definition
Exposure Factor (EF)
quantitative risk
percentage of loss that an organization would experience if a specific asset were violated by a realized risk |
|
|
Term
|
Definition
Annualized Loss Expectancy
quantitative risk
the possible yearly cost of all instances of a specific realized threat against a specific asset
ALE = Single Loss Expectancy (SLE) * Annualized Rate of occurrence (ARO)
or ALE = SLE * ARO
|
|
|
Term
|
Definition
Annualized Rate of Occurrence (ARO)
quantitative risk
The expected frequency with which a specific threat or risk will occur within a single year
enables you to calculate risk and take proper precautions |
|
|
Term
How do you evaluate a safeguard? |
|
Definition
ALE for the asset if safeguard is implemented
(ALE 1) - (ALE 2) - ACS
ALE before safeguard - ALE after safeguard - Annual Cost of Safeguard = value of the safeguard to the company |
|
|
Term
What are the options for handling risk? |
|
Definition
- reduce risk or risk mitigation
- assign risk, or transfer risk
- accept risk |
|
|
Term
|
Definition
The amount of risk an organization would face if no safeguards were implemented
total risk = threats * vulnerabilities * asset value |
|
|
Term
|
Definition
The risk that management has chosen to accept rather than mitigagte.
total risk - controls gap = residual risk |
|
|
Term
|
Definition
The difference between total risk and residual risk
The amount of risk that is reduced by implementing safeguards |
|
|
Term
What are the types of risk controls? |
|
Definition
- Preventative
- Detective
- Corrective
- Deterrent
- Recovery
- Directive
- Compensation |
|
|
Term
How are security controls implemented? |
|
Definition
- Administrative
- Logical
- Physical |
|
|
Term
What is a security framework? |
|
Definition
- Acts as a reference point
- Provides a common language for communication (culture)
- Allows us to share information and create relevance (also culture) |
|
|
Term
|
Definition
- Information Security governance best practices within an organization
- Control Objectives for Information and Related Technologies
- 4 Domains:
-- Plan and Organize
-- Acquire and Implement
-- Deliver and Support
-- Monitor and Evaluate |
|
|
Term
What are the standard good practices for information security? |
|
Definition
- Security Management
- Critical business applications
- Computer installations
- Networks
- Systems Development
-- Systems Development Life Cycle (SDLC)
-- Software Development Life Cycle (also SDLC) |
|
|
Term
What are the major ISO standards in risk management? |
|
Definition
- ISO 27001 Information Security
- ISO 27002 Code or practice
- ISO 15408 Terminology |
|
|
Term
|
Definition
- Motive
- Opportunity
- Means |
|
|
Term
|
Definition
- a framework that can be used to develop the following architecture types
-- Business architecture
-- Data architecture
-- Applications architecture
-- Technology architecture |
|
|
Term
|
Definition
Failure modes and effects analysis (FMEA)
- a method for determining failure, identifying functional failures, and assessing the causes of failure and their effects through a structured process
- The application of this process to a chronic failure enables one to determine where exactly the failure is most likely to occur |
|
|
Term
|
Definition
Maximum Tolerable Outage (MTO)
Maximum Tolerable Downtime (MTD)
- maximum length of time a business function can be inoperable without causing irreparable harm to the business |
|
|
Term
|
Definition
Business Continuity Planning (BCP)
- quick, calm and efficient response in the event of an emergency
|
|
|
Term
|
Definition
Recovery Time Objective (RTO)
- The amount of time you think you can feasibly recover the function in the event of disruption |
|
|
Term
|
Definition
Business Impact Assessment (BIA)
- Identifies the resources that are critical to an organization's ongoing viability and the threats posed to those resources
- Also assess the likelihood that each threat will actually occur and the impact those occurrences will have on the business |
|
|
Term
What are the sub-tasks in continuity planning? |
|
Definition
- Strategy development
- Provisions and process
- Plan approval
- Plan implementation
- Training and education
p112 |
|
|
Term
|
Definition
Business Impact Assessment (BIA)
1. Gather requirements / information
2. Vulnerability Assessment(s)
3. Analysis
-- Quantitative (ALE = SLE * ARO)
-- Qualitative
4. Communicate findings (consider audience) |
|
|
Term
What are some countermeasures for Confidentiality |
|
Definition
- Encryption
- Traffic Padding
- Strict Access Controls/Authentication
- Data Classification
- Awareness Training |
|
|
Term
What are some countermeasures for Integrity? |
|
Definition
- Strict access controls / authentication
- IDS - encryption
- hashing
- interface restrictions / controls
- input / function checks (validation) |
|
|
Term
What are some countermeasures for Assessability |
|
Definition
- Strict access controls / authentication
- continuous monitoring
- firewalls & routers to prevent DoS / DDoS attacks
- redundant system design
- periodic testing of backup systems |
|
|
Term
|
Definition
Capabilities Maturity Model
Level 1 - Initial
Level 2 - Managed
Level 3 - Defined
Level 4 - Quantitatively Managed
Level 5 - Optimizing
|
|
|
Term
|
Definition
Sherwood Applied Business Security Architecture.
Provides a framework for developing risk-driven enterprise information security and information assurance architectures. It also aids in delivering security infrastructure solutions that support critical business initiatives. |
|
|
Term
|
Definition
- Change control for data
- no unauthorized modification without knowledge and consent of data owner
1. preventing unauthorized subjects from making modifications
2. preventing authorized subjects from making unauthorized modifications
3. maintaining consistency of objects so that they are true and accurate
- Related concepts
-- Accuracy
-- Authenticity
-- Validity
-- Nonrepudiation - user cannot deny having performed an aciton |
|
|
Term
|
Definition
- Keeping good data away from bad actors
- data must be protected in a network, data must be protected at rest, in use, and on the wire
- Related concepts
-- Sensitivity
-- Discretion
-- Criticality
-- Concealment
-- Isolation
|
|
|
Term
|
Definition
- Authorized subjects can access objects in a timely manner without interruption
- Related concepts
-- Usability
-- Accessibility
-- Timeliness
|
|
|
Term
|
Definition
- Responsible for data classification |
|
|
Term
|
Definition
- Responsible for implementing the protections called out by the security policy at the behest/direction of the data owner.
- Performs all activities necessary to provide CIA protection. |
|
|
Term
|
Definition
- Any person who has access to a secured system |
|
|
Term
|
Definition
Anything within the organization that has value and should be afforded CIA protections |
|
|
Term
|
Definition
Dollar value assigned to an asset |
|
|
Term
|
Definition
A potential occurrence that may cause an undesirable outcome vis-a-vis an asset |
|
|
Term
|
Definition
weakness to be exploitedted |
|
|
Term
|
Definition
degree to which you are susceptible to asset loss due to a threat |
|
|
Term
|
Definition
- The possibility or likelihood that a threat will exploit a vulnerability to cause harm to an asset
- Risk = threat * vulnerability |
|
|
Term
|
Definition
The exploitation of a vulnerability by a threat agent (bad actor) |
|
|
Term
|
Definition
- A countermeasure being bypassed or rendered ineffective |
|
|
Term
Quantitative Risk Analysis |
|
Definition
1. Exposure Factor (EF) - % of loss experienced IF a specific asset were attacked
2. Single Loss Expectancy (SLE) - the cost associated with a single realized risk against a single asset
3. Annualized Rate of Occurrence (ARO) - frequency at which a specific risk will be realized over a single year
4. Annualized Loss Expectancy (ALE) - potential yearly cost of all instances of specified threat
5. Asset Value (AV) - $$ amount of asset is worth to the organization
|
|
|
Term
|
Definition
- Identification
- Authentication
- Authorization
- Auditing
- Accountability |
|
|
Term
|
Definition
- Mean Time Between Failures (MTBF) |
|
|
Term
|
Definition
- Mean Time To Restore/Repair
- How long it will take to get a failed product running again
|
|
|
Term
|
Definition
- Recovery Point Objective (RPO)
- The maximum acceptable amount of data loss measured in time.
|
|
|
Term
|
Definition
- Recovery Time Objective (RTO)
- The maximum tolerable amount of time needed to bring all critical systems back online. |
|
|
Term
|
Definition
- Work Recovery Time (WRT)
- The maximum tolerable amount of time that is needed to verify the system and/or data integrity
- Systems are restored after a crisis. WRT is the amount of time necessary to verify things are working correctly. |
|
|
Term
|
Definition
- Maximum Toleratable Downtime (MTD)
- The total amount of time that a business process can be disrupted without causing any unacceptable consequences. |
|
|
Term
|
Definition
- Used for efficiency
- Similar elements are put into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective.
- Simplifies security by enabling you to assign security controls to a group of objects collected by type or function |
|
|
Term
Civilian Data Classification Levels |
|
Definition
- Confidential
- Private
- Sensitive
- Public |
|
|
Term
Government Data Classification Levels |
|
Definition
- Top Secret (Exceptionally Grave Damage)
- Secret (Serious Damage)
- Confidential (Damage)
- Unclassified (No Damage)
|
|
|
Term
What are the security roles and responsiblities? |
|
Definition
- Senior Manager - Management (Ultimately responsible)
- Security Professional - Information Security Team
- Data Owner - Classifies Data
- Data Custodian - Takes care of Day-to-day activities
- User - End User
- Auditor - Responsible for reviewing the data |
|
|
Term
|
Definition
- Threat model developed by Microsoft
- Spoofing
- Tampering
- Repudiation
- Information Disclosure
- Denial of Service
- Escalation of privilege |
|
|
Term
|
Definition
- Threat Model
- Designed to provide a flexible rating solution that is based on the answers of 5 main questions
- Damage potential (How severe the damage likely to be if the threat is realized)
- Reproducibility (How complicated it is for the attacker to reproduce the exploit)
- Exploitability (How hard it is to perform the attack)
- Affected users (How many users are likely to be affected)
- Discoverability (How hard it is for an attacker to discover the weakness)
|
|
|
Term
|
Definition
- Process for Attack Simulation and Threat Analysis (PASTA)
- Threat modeling. Risk centric approach that aims at selecting or developing countermeasures in relation to the value of the assets to be protected.
STEPS
Stage I. Definition of the Objectives (DO) for the Analysis of Risks
Stage II. Definition of the Technical Scope (DTS)
Stage III. Application Decomposition and Analysis (ADA)
Stage IV. Threat Analysis (TA)
Stage V. Weakness and Vulnerability Analysis (WVA)
Stage VI. Attack Modeling & Simulation (AMS)
Stage VII. Risk Analysis & Management (RAM) |
|
|
Term
|
Definition
M - Mitigate
A - Accept
A - Avoid
T - Transfer |
|
|
Term
Types of Risk Management Controls |
|
Definition
Technical, Physical or Administrative.
Preventative, Detective, Corrective, Deterrent, Directive, Compensating, Recovery
-----------------------------------------------------------
- Technical or logical - implemented with technology - passwords, permissions
- Physical - elements you can physically touch; door lock, CCTV
- Administrative - written security policies
-----------------------------------------------------------
- Deterrent - Dogs
- Preventative - attempt to prevent incidents before they occur. Firewalls, guard, audit train
- Detective - IDs security violations after they occur. Reviewing logs, audit train
- Corrective - modify environment after an incident. Anti-virus, fire extinguisher
- Deterrent - Discourage someone from taking an action. A high fence with lights, strict security policy, proxy server
- Directive - Administrative controls that provide direction or guidance
- Compensating - controls used as alternatives to the recommended controls
- Recovery - controls provide methods to recover from an incident |
|
|
Term
|
Definition
- Risk Management Framework (RMF), NIST SP 800-37
- CSIAAM - Cousin Say I Am Ass Master
1. Categorize information systems
2. Select security control
3. Implement Security Control
4. Assess security control
5. Authorize information system
6. Monitor security controls
[image] |
|
|
Term
|
Definition
- Risk assessment
- identify your assets - evaluate them - look at threats and vulnerability - potential for loss - mitigation strategy - implement mitigation strategy - test mitigation strategy - document mitigation strategy |
|
|
Term
Security Policy Life Cycle |
|
Definition
Develop - Plan and Research - Write - Approve - Authorize
Publish - Communicate - Educate
Adopt - - Implement - Monitor - Enforce
Review - - feedback - annual |
|
|
Term
|
Definition
- Business Continuity Management |
|
|
Term
|
Definition
- Import/Export of encrypted goods |
|
|
Term
|
Definition
- US Privacy Law, 4th Amendment
- unlawful to search private property without search warrant |
|
|
Term
European Union Privacy Law |
|
Definition
- Law giving directive outlining privacy measures that must be in place for protecting personal data processed by an information system
- Criteria to be met:
1. Consent
2. Contract
3. Legal Obligation
4. Vital interest of the data subject
5. Balance between the interests of the data holder and the interests of the data
|
|
|
Term
|
Definition
- European Union Global Data Protection Regulation (GDPR)
- Law applies to all organizations that collect data from EU residents or process that information on behalf of someone who collects it
a. Breaches should be informed within 72 hours
b. Centralized data protection authorities
c. Individuals will have access to their own data
d. Data portability to facilitate the transfer of personal information between service providers
e. Right to be forgotten - delete information if it's no longer required
|
|
|
Term
|
Definition
- The ability of a system to suffer a fault but continue to operate.
- RAID, multiple power supplies |
|
|
Term
|
Definition
- Having multiple redundant systems that enable zero downtime or degradation for a single failure.
- Cluster systems, active/standby |
|
|
Term
|
Definition
- ISO 27002 is a supplementary standard that provides advice on how to implement the security controls listed in Annex A of ISO 27001
- Focus on controls
- Provides a code of practice for use by individuals within an organization
"Information Technology-Security Techniques-Information Security Management Systems- Requirements"
|
|
|
Term
|
Definition
- central framework of the ISO 27000 series
- The Standard contains the implementation requirements for an Information Security Management System (ISMS)
"Information Technology - Security Techniques - Code of Practice for Information Security Management"
1. Policy
2. Organization of Information security
3. Asset Management
4. Human Resources security
5. Physical and environmental security
6. Communications and operations management
7. Access Control
8. Information Systems acquisition, development, and maintenance
9. Information security incident management
10. Business Continuity management
11. Compliance |
|
|
Term
ISO 27000 family of standards |
|
Definition
The ISO/IEC 270001 family of standards, also known as the ISO 27000 series, is a series of best practices to help organizations improve their information security. It does this by setting out ISMS (information security management system) requirements.
|
|
|
Term
|
Definition
- Supply Chain Risk Management practices for federal information systems and organizations |
|
|
Term
|
Definition
Guide for conducting risk assessment |
|
|
Term
|
Definition
Risk Management Framework (RMF) for information systems and organizations
A systems lifecycle approach for security |
|
|
Term
|
Definition
Risk Management Guidelines |
|
|
Term
|
Definition
Risk Assessment Techniques |
|
|
Term
|
Definition
- Information Technology Infrastructure Library (ITIL)
- Shows how controls can be implemented for the service management IT processes. 5 lifecycle phases:
1. Service Strategy
2. Service Design
3. Service Transition
4. Service Operation
5. Continual Service Improvement (CSI) |
|
|
Term
|
Definition
- Risk Framework
- examines the effectiveness, efficiency, confidentiality, integrity, availability, compliance, and reliability aspects of the high-level control objectives
- Governance -- Risk -- Compliance |
|
|
Term
|
Definition
- Risk Framework (financial)
- Identifies 5 areas necessary to meet financial reporting and disclosure objects. These include:
a. Control Environment
b. Risk Assessment
c. Control Activities
d. Information and Communication
e. Monitoring |
|
|
Term
Monitoring and Measuring Risk Process Steps |
|
Definition
1. Seek approval
2. Form a risk assessment team
3. analyze data
4. calculate risk
5. countermeasure recommendations |
|
|
Term
Security control assessment methodology |
|
Definition
In Order
1. Reconnaissance
2. Enumeration
3. Vulnerability Analysis
4. Execution / exploitation
5. Document findings |
|
|
Term
Types of vulnerability Assessments |
|
Definition
a. vulnerability
b. penetration
c. application
d. DoS / DDoS
e. WAR.. driving, walking, dialing, etc.
f. Wireless
g. Social Engineering
h. telephone |
|
|
Term
Risk Assessment / analysis |
|
Definition
Step 1 - prepare for assessment
Step 2 - Conduct assessment
a. ID threat source and events
b. ID vulnerabilities and predisposing conditions
c. determine likelihood of occurrence
d. determine magnitude of impact
e. determine risk
Step 3 - communicate results
Step 4 - Maintain assessment
NIST SP 800-30
pg 23 |
|
|
Term
|
Definition
Remaining risk(s) after all countermeasures/controls have been applied |
|
|
Term
|
Definition
(control)
Mechanism applied to minimize risk
minimize = mitigate
|
|
|
Term
|
Definition
What a threat will cost
(quantitative/qualitative) |
|
|
Term
|
Definition
chance something might happen |
|
|
Term
|
Definition
1. Avoid
2. Accept
3. Transfer
4. Mitigate |
|
|
Term
Countermeasure selection and implementation |
|
Definition
- Cost
- Effectiveness
- Appropriateness |
|
|
Term
|
Definition
1. Protect society, the commonwealth, and the infrastructure
2. Act honorably, honestly, justly, responsibly, and legally
3. Provide diligent and competent service to principals
4. Advance and protect the profession
pg 862 |
|
|
Term
|
Definition
- International traffic in arms regulations (ITAR): regulated specifically designed military and defense items--US Munitions List (USML)
- Export Administration Regulations (EAR): commercial use, but military applications--commerce control list (CCL)
- Export Controls to Nuclear proliferation countries
- Encryption submitted to Commerce Dept beofre export |
|
|
Term
|
Definition
- Organization for Economic Cooperation and Development (OECD)
- 8 Core Principles
1. Collection Limitation
2. Data Quality
3. Purpose specification
4. Use limitation
5. Security safeguards
6. Openness
7. Individual participation (Opt in)
8. Data controller accountability |
|
|
Term
|
Definition
- Protects published or unpublished original works
- Author's life plus 50 years
- Rights:
1. Reproduce work in any form
2. Adapt or derive more works from it
3. Make and distribute copies
4. Perform it in public
5. Display or exhibit in public |
|
|
Term
|
Definition
- A set of exclusive rights granted by a sovereign state for a limited time (typically 20 years from the date of application)
- Exclusive rights for a time period |
|
|
Term
|
Definition
- Making "secret" information public |
|
|
Term
|
Definition
an occurrence or event that has a negative outcome |
|
|
Term
|
Definition
Some sort of occurrence or event |
|
|
Term
|
Definition
- Prudent man rule - doing what a reasonable person would do in a given situation
|
|
|
Term
|
Definition
- Oversight, guidance
- The management of Due Care
- Doing the right thing at the right time for the right reason |
|
|
Term
|
Definition
- Payment Card Industry Data Security Standard (PCI DSS)
- Install/Maintain firewall for cardholder data
- Do not use vendor-supplied system passwords
- Protect cardholder data
- Encrypt
- Protect all systems
- Develop and maintain secure systems/applications
- Restrict access
- ID and authenticate access
- Track and monitor access
- Test security |
|
|
Term
Identity Theft and Assumption Act |
|
Definition
- 1998
- Crime to steal identity
- 15 year and $250,000 |
|
|
Term
|
Definition
- Family Educational Rights and Privacy Act (FERPA)
- Specialized privacy bill for schools that receive federal funding
- Privacy rights for parents and 18 y/o students
-- Right to inspect education records
-- Right to request corrections of errors
- Schools may not release information from student records without authorization |
|
|
Term
|
Definition
- 2001
- Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act
- Response to 911
- Broadened powers if kaw enforcement and intelligence agencies
- Wiretapping blanket authorizations
- ISP may volunteer information subpoena for user info
- Amended CFAA with more severe penalties
- USA Freedom Act - June 2015
|
|
|
Term
|
Definition
- Gramm-Leach-Bliley Act (GLBA) 1999
- Reduced barriers between banks, insurance comp and credit providers
- Relaxed standards created a new privacy concern
- Defined how - what data will be shared |
|
|
Term
|
Definition
- Children's Online Privacy Protection Act (COPPA) 1998
- Requires web owners to display notice of types of information it collects and what it does with it
- Parents opportunity to review
- Parents consent for under 13 |
|
|
Term
|
Definition
- Health Information Technology for Economic and Clinical Health Act (HITECH) 2009
- Updated HIPAA privacy and security
- New regulations for business associates
-- Business Associate Agreement (BAA)
- Data breach notification |
|
|
Term
|
Definition
- Health Insurance Portability and Accountability Act (HIPAA) 1996
- Governed health care privacy and security
-- Health maintenance org (HMO)
-- Hospitals, physicians, insurance
- Rights of individual |
|
|
Term
|
Definition
- Extends definition of property to include proprietary economic information
- Theft considered industrial or corporate theft
- 1996 |
|
|
Term
|
Definition
- Communications Assistance for Lw Enforcement Act (CALEA) 1994
- Required communications carriers to make wiretaps possible for law enforcement with court orders
|
|
|
Term
|
Definition
- Electronic Communications Privacy Act (ECPA) 1986
- Crime to invade the privacy of an individual
-- Email, voicemail, cell phone conversations |
|
|
Term
Types of Licensing Agreements |
|
Definition
- Contractual licensing agreement - written contract often for high-price or specialized software
- shrinkwrap license - written on outside of package
- click through - during install required to accept terms
- Cloud service - extreme version of click through |
|
|
Term
Economic Espionage Act of 1996 |
|
Definition
- Protects trade secrets
- stealing trade secrets = $500,000 fine and 15 years prison with intent to benefit foreign government or agent
-- other circumstances $250,000 and 10 years |
|
|
Term
|
Definition
- Intellectual Property of inventors
-- invention must be new, useful, and not obvious
- Patent trolls |
|
|
Term
|
Definition
- a recognized sign, device, slogan or logo used to identify a company or it's products
- Not similar to another trademark
- Not descriptive of the goods and services that you will offer
- Register with US Patent and Trademark Office (USPTO)
- 10 years, renew 10 years |
|
|
Term
Digital Millennium Copyright Act |
|
Definition
- Digital Millennium Copyright Act (DMCA) 1998
- Complies with terms of 2 World Intellectual Property Organization (WIPO) treaties
- Prohibits attempts to circumvent copyright protection mechanisms (e.g. CD, DVD)
- Limits ISP liabilities
- Exempts caching, search engines, storage on network by individual user
- Backup copies are allowed
- Spells out application to streaming services |
|
|
Term
National Cybersecurity Protection Act |
|
Definition
- 2014
- DHS charged to stand up National Cybersecurity and Communications Integration Center
- Interface between federal agencies and civilian organizations for sharing cyber security risks, incidents, analysis and warnings |
|
|
Term
Cybersecurity Enhancement Act |
|
Definition
- 2014
- NIST responsible for cybersecurity standards
-- Produces 800 series special publications
-- NIST SP800-53 Security and privacy control for federal information systems and organizations
-- NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
-- NIST Cybersecurity Framework (CSF) voluntary risk based framework
|
|
|
Term
|
Definition
- Confusing name... identical acronym
- Federal Information Systems MODERNIZATION Act (FISMA) [vice management]
- Centralized federal cybersecurity with DHS
-- Except Defense-related and ODNI |
|
|
Term
|
Definition
- Confusing name... identical acronym
- Federal Information Systems MANAGEMENT Act (FISMA) [vice modernization]
- Federal agencies implement information security program
- Requires government to include contractors
- Replaced Computer Security Acto fo 1987 and Government Information Security Reform Act of 2000
- NIST responsible for FISMA guidelines
-- Periodic assessment of risk, testing, and evaluation
-- Risk addressed through lifecycle of information systems
-- Training, continuity of operations
|
|
|
Term
National Information Infrastructure Protection Act of 1996 |
|
Definition
- Another amendment to CFAA
- Broadens to include computer systems used in international commerce
- Extends protections to portions of infrastructure: railroads, pipelines, electric grid
- Any act that causes damage treated as a felony |
|
|
Term
|
Definition
- Computer Abuse Amendments Act of 1994
- Makes Illegal:
-- Creation of malicious code that damages computer systems
-- Modified CFAA to cover any computer used in interstate commerce
-- Allows imprisonment of offenders, regardless of intent
-- Legal authorities for victims to pursue civil action |
|
|
Term
|
Definition
- Computer Fraud and Abuse Act (CFAA)
- Makes it a crime to:
-- Access classified or financial information without authorization or in excess of authorization
-- Access federal computer without authorization
-- Use a federal computer to perpetrate fraud
-- Cause malicious damage to federal computer
-- Modify medical records when it slows treatement
-- Traffic in passwords across state lines
-- $5,000 in damages |
|
|
Term
|
Definition
- Criminal law
- Civil law
- Administrative Law |
|
|
Term
Personnel Security Policies and Procedures |
|
Definition
- Candidate screening and hiring
- Employment agreements and policies
- Onboarding and termination processes
- Vendor, consulting, and contractor agreements and controls
- Compliance policy requirements
- Privacy policy requirements
Job rotation, separation of duties, need to know, least priviledge, NDA |
|
|
Term
|
Definition
- Business Continuity
1. Develop and document scope and plan
- Senior management support, scope, resources, timeline
2. Business Impact Analysis (BIA)
- Determine impact of disrupting event
- Criticality, estimated downtime (MTD)
- Evaluate external and internal resources |
|
|
Term
|
Definition
Any passive data within the system: documents, physical paper, database, tables, text files, etc. |
|
|
Term
|
Definition
- an active entity on a data system |
|
|
Term
|
Definition
- Real evidence: tangible or physical objects
- Direct evidence: testimony provided by witnesses
- Circumstantial evidence
- Hearsay evidence constitutes second-hand evidence
- Secondary evidence consists of copies of original documents... computer logs might be this |
|
|
Term
|
Definition
4 Step Process
1. Project scope and planning
2. Business Impact Assessment (BIA)
3. Continuity Planning
4. Approval and implementation |
|
|