SlideShare a Scribd company logo
1 of 64
Download to read offline
CNIT 125:
Information Security
Professional
(CISSP
Preparation)
Ch 2. Security and Risk
Management (Part 2)
Updated 9-25-17
2
Legal and Regulatory Issues
Major Legal Systems
• Civil Law
• Laws and statutes determine what is allowed
• Precedents and particular case rulings carry
less weight than under common law
• Common Law
• Used in the USA, Canada, the UK, and former
British colonies
• Significant emphasis on particular cases and
precedents as determinants of laws
• The major legal system in the CISSP exam
Religious and Customary Law
• Religious Law
• Mainly Sharia (Islamic religious law)
• Customary Law
• Customs or practices that are commonly
accepted and treated as law
• Closely related to Best Practices
• Less important
Criminal and Civil Law
• Criminal Law
• Victim is society itself
• Enforced by police
• Punishment is often prison time
• Proof must be beyond a reasonable doubt
• Civil Law (Tort Law)
• Injury resulting from failure to provide due care
• Victim is an individual
• Enforced by lawsuits
• Result is financial damages paid to victim
• Burden of proof: preponderance of the evidence
(more likely than not)
Administrative Law
• Also called Regulatory Law
• Specify rules and punishments for regulated
industries
• Examples
• FCC regulations
• HIPAA security mandates
• FDS regulations
• FAA regulations
Liability
• Due Care
• Also called Duty of Care
• Prudent Man Rule
• Businesses should do what a prudent
man would do
• Best Practices
• Due Diligence
• The management of due care
• Follows a formal process
Legal Aspects of Investigations
Evidence
• Real evidence
• Physical objects like hard drives, USB drives,
etc.
• Direct evidence
• Witness testimony about what that person
experienced directly
• Circumstantial evidence
• Indirect evidence of guilt
• Can support other evidence, but usually
inadequate for conviction alone
Evidence
• Corroborative evidence
• Additional support for a fact that may be
called into question
• Hearsay
• Secondhand evidence
• Normally inadmissible in court
• Exceptions:
• Business records and computer-generated
evidence
• Computer forensic hard disk and memory
images are original evidence, not hearsay
Evidence
• Best evidence
• Original documents, not copies
• The actual hard drive used
• Etc.
• Secondary evidence
• Copies of documents
• Log files may be considered secondary or
original
• Evidence integrity
• Typically ensured by MD5 or SHA-1 hash
Chain of Custody
• Evidence must be
protected from
tampering
• A list of names of
people who can
testify that they
protected the
evidence
Reasonable Searches
• Fourth amendment protects citizens from
unreasonable search and seizure by the
government
• Illegally obtained evidence is inadmissible in
court
• Most searches require probable cause and
a search warrant
Exceptions
• These searches don't require a warrant
• Objects in plain sight
• At a public checkpoint
• Exigent circumstances
• Immediate threat to human life or of
evidence being destroyed
Agents of Law Enforcement
• Private citizens are not part of the
government, so the fourth amendment does
not apply, unless:
• Private citizens who carry out investigations
on behalf of law enforcement, they are
acting under the color of law enforcement
or agents of law enforcement
• Then the fourth amendment applies
Should You Call Law Enforcement?
• Companies often avoid involving law
enforcement
• Makes cases simpler, avoids publicity
Entrapment and Enticement
• Entrapment
• Law enforcement agent persuades someone
to commit a crime when
• The person otherwise had no intention to
commit a crime
• Enticement
• Law enforcement agent makes conditions
favorable for a crime
• Person is already intent on committing a crime
Computer Crime
• Computer as target
• DoS, installing malware to send spam
• Computer as a tool
• Stealing secrets from a database
• Stealing credit card numbers
• Espionage
• Harassment
• Attribution
• Difficult to prove who did a crime
Intellectual Property
• Trademark
• Name, logo, or symbol used for marketing
• Unregistered ™ or Registered ®
• Patent
• Grants a monopoly for an invention
• Copyright ©
• Restricts copying creative work
• Software typically covered by copyright
• Fair sale & fair use are allowed
Intellectual Property
• Licenses
• End-User License Agreement (EULA)
• Trade secrets
• Special sauce
• Protected by non-disclosure agreements
(NDAs) & non-compete agreements
(NCAs)
Intellectual Property Attacks
• Software piracy
• Copyright infringement
• Corporate espionage
• Cybersquatting & Typosquatting
• Using a domain close to a company's
domain, like yahoo.net or yahooo.com
Privacy
• Confidentiality of personal information
• EU Data Protection Directive
• Individuals must be notified how their data
is used & allowed to opt out
• OECD Privacy Guidelines
• Organization for Economic Cooperation
and Development
• Includes EU, USA, Mexico, AU & more
EU-US Safe Harbor
• Part of EU Data Protection Directive
• Sending personal data from EU to other
countries is forbidden
• Unless the receiving country adequately
protects its data
• The USA lost this privilege in Oct. 2015
because of the Snowden leaks
• Replacement agreement should be reached
next week (Link Ch 1d, Jan. 25, 2016)
International Cooperation
• Council of Europe Convention on
Cybercrime
• Includes most EU countries and the USA
• Promotes cooperation
Import / Export Restrictions
• USA restricted exports of cryptographic
technology in the 1990s
• Restrictions have been relaxed since then
Important Laws and Regulations
HIPAA
• Health Insurance Portability and
Accountability Act
• Guidance on Administrative, Physical, and
Technical safeguards
• For Protected Health Information (PHI)
CFAA
• Computer Fraud and Abuse Act
• Protects government and financial
computers
• Including every computer on the Internet
(probably not the law's original intent)
• It's a crime to exceed your authorization to
use such a computer
ECPA & The PATRIOT Act
• Electronic Communications Privacy Act
• Protected electronic communications from
warrantless wiretapping
• Weakened by the PATRIOT Act
• The PATRIOT Act
• A response to 9/11 attacks
• Greatly expanded law enforcement's
electronic monitoring capabilities
GLAB & SOX
• Gramm-Leach-Bailey Act
• Forces financial institutions to protect
customer financial information
• Sarbanes-Ox;ey Act
• Response to ENRON scandal
• Regulatory compliance mandates for
publicly traded companies
• Ensures financial disclosure and auditor
independence
PCI-DSS
• Payment Card Industry Data Security
Standard
• Self-regulation by major vendors
• Mandates security policy, devices, controls,
and monitoring to protect cardholder data
US Breach Notification Laws
• 47 states require notification
• No federal law yet
• Safe harbor for data that was encrypted at
time of compromise
34
Security and 3rd Parties
Service Provider Contractual Security
• Service Level Agreements (SLA)
• Identify key expectations vendor must
meet
• Attestation
• Third party review of the service provider
to determine security posture
• Includes SAS 70 (old), ISO 27001, and
PCI-DSS
Pentests & Procurement
• Right to Penetration Test / Audit
• Allows the originating organization to
perform these security tests on a vendor
• Procurement
• Purchasing products or services
• Considering security before purchase is
best
Other Concepts
• Vendor Governance
• Ensure that vendor provides sufficient quality
• Acquisitions
• Purchasing a company to add to an existing
company
• Can disrupt security
• Divestitures
• Splitting a company into parts
• May result in duplicate accounts and other risks
38
Ethics
(ISC)^2 Code of Ethics
• Four Canons
• Protect society, the commonwealth, and
the infrastructure
• Act honorably, honestly, justly, responsibly,
and legally
• Provide diligent and competent service to
principals
• Advance and protect the profession
Ethics Complaint
Accusation
Verdict
43
Information Security
Governance
x
Personnel Security
• Security Awareness and Training
• Background Checks
• Employee Termination
• Must use fair process
• Vendor, Consultant and Contractor Security
• Outsourcing and Offshoring
• Can lower Total Cost of Ownership
• May improve security
• Privacy and regulatory issues
• Must perform risk analysis first
46
Access Control Defensive
Categories and Types
Access Control Types
• Preventive
• Detective
• Corrective
• Recovery
• Deterrent
• Compensating
Access Control Types
• Preventive
• Prevents actions, such as limited
privileges
• Detective
• Alerts during or after an attack, like video
surveillance
• Corrective
• Corrects a damaged system or process,
like antivirus removing a suspicious file
Access Control Types
• Recovery
• Restores functionality after a security incident, such
as restoring from backups
• Deterrent
• Scares away attackers, like a "Beware of Dog" sign
• Compensating
• Additional control to compensate for weakness in
other controls
• e. g. reviewing server logs to detect violations of the
Computer Use Policy (an administrative control)
Access Control Categories
• Administrative
• Policy, procedure, or regulation
• Technical
• Software, hardware, or firmware
• Physical
• Locks, security guards, etc.
51
52
Risk Analysis
Risk Analysis
• Assets
• Valuable resources to protect
• Threat
• A potentially harmful occurrence
• Vulnerability
• A weakness
Risk = Threat x Vulnerability
• Earthquake risk is the same in Boston and
San Francisco
• Boston
• Earthquakes are rare, but buildings are old
and vulnerable
• San Francisco
• Earthquakes are common, but buildings
are newer and safer
Impact
• Severity of the damage in dollars
• Risk = Threat x Vulnerability x Impact
• Human life is considered near-infinite impact
Total Cost of Ownership (TCO)
• Of a mitigating safeguard includes
• Upfront costs
• Annual cost of maintenance
• Staff hours
• Maintenance fees
• Software subscriptions
Return on Investment (ROI)
• Amount of money saved by implementing a
safeguard
• If Total Cost of Ownership is less than
Annualized Loss Expectancy, you have a
positive ROI
Risk Choices
• Accept the risk
• Mitigate the risk
• Transfer the risk
• Risk avoidance
Quantitative and Qualitative Risk
Analysis
• Quantitative
• Uses hard metrics, like dollars
• Qualitative
• Use simple approximate values
• Or categories like High, Medium, Low
NIST 9-Step Risk Analysis Process
63
Types of Attackers
Types of Attackers
• Hackers
• Black hat, white hat, gray hat
• Script kiddies
• Outsiders
• Outside the company
• Insiders
• Hacktivists
• Bots
• Phishing

More Related Content

What's hot

3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecuritySam Bowne
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and TestingSam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingSam Bowne
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)Sam Bowne
 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)Sam Bowne
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)Sam Bowne
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
 
CNIT 125 Ch 4. Security Engineering (Part 1)
CNIT 125 Ch 4. Security Engineering (Part 1)CNIT 125 Ch 4. Security Engineering (Part 1)
CNIT 125 Ch 4. Security Engineering (Part 1)Sam Bowne
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementSam Bowne
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
 

What's hot (20)

3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset Security
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
CNIT 125 Ch 4. Security Engineering (Part 1)
CNIT 125 Ch 4. Security Engineering (Part 1)CNIT 125 Ch 4. Security Engineering (Part 1)
CNIT 125 Ch 4. Security Engineering (Part 1)
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 

Similar to CNIT 125: Ch 2. Security and Risk Management (Part 2)

12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeBoyarMiller
 
Trade Secret Theft – Protecting the Crown Jewels
Trade Secret Theft – Protecting the Crown JewelsTrade Secret Theft – Protecting the Crown Jewels
Trade Secret Theft – Protecting the Crown JewelsWinston & Strawn LLP
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptxjohn6938
 
GDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentGDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentAllen Woods
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensicRahul Badekar
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...ImageSoft
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessHostingCon
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.pptharshbj1801
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 

Similar to CNIT 125: Ch 2. Security and Risk Management (Part 2) (20)

12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
 
Trade Secret Theft – Protecting the Crown Jewels
Trade Secret Theft – Protecting the Crown JewelsTrade Secret Theft – Protecting the Crown Jewels
Trade Secret Theft – Protecting the Crown Jewels
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptx
 
GDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentGDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal Environment
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
 
Gdpr
GdprGdpr
Gdpr
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 

More from Sam Bowne

3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

CNIT 125: Ch 2. Security and Risk Management (Part 2)

  • 1. CNIT 125: Information Security Professional (CISSP Preparation) Ch 2. Security and Risk Management (Part 2) Updated 9-25-17
  • 3. Major Legal Systems • Civil Law • Laws and statutes determine what is allowed • Precedents and particular case rulings carry less weight than under common law • Common Law • Used in the USA, Canada, the UK, and former British colonies • Significant emphasis on particular cases and precedents as determinants of laws • The major legal system in the CISSP exam
  • 4. Religious and Customary Law • Religious Law • Mainly Sharia (Islamic religious law) • Customary Law • Customs or practices that are commonly accepted and treated as law • Closely related to Best Practices • Less important
  • 5. Criminal and Civil Law • Criminal Law • Victim is society itself • Enforced by police • Punishment is often prison time • Proof must be beyond a reasonable doubt • Civil Law (Tort Law) • Injury resulting from failure to provide due care • Victim is an individual • Enforced by lawsuits • Result is financial damages paid to victim • Burden of proof: preponderance of the evidence (more likely than not)
  • 6.
  • 7. Administrative Law • Also called Regulatory Law • Specify rules and punishments for regulated industries • Examples • FCC regulations • HIPAA security mandates • FDS regulations • FAA regulations
  • 8. Liability • Due Care • Also called Duty of Care • Prudent Man Rule • Businesses should do what a prudent man would do • Best Practices • Due Diligence • The management of due care • Follows a formal process
  • 9. Legal Aspects of Investigations
  • 10. Evidence • Real evidence • Physical objects like hard drives, USB drives, etc. • Direct evidence • Witness testimony about what that person experienced directly • Circumstantial evidence • Indirect evidence of guilt • Can support other evidence, but usually inadequate for conviction alone
  • 11. Evidence • Corroborative evidence • Additional support for a fact that may be called into question • Hearsay • Secondhand evidence • Normally inadmissible in court • Exceptions: • Business records and computer-generated evidence • Computer forensic hard disk and memory images are original evidence, not hearsay
  • 12. Evidence • Best evidence • Original documents, not copies • The actual hard drive used • Etc. • Secondary evidence • Copies of documents • Log files may be considered secondary or original • Evidence integrity • Typically ensured by MD5 or SHA-1 hash
  • 13. Chain of Custody • Evidence must be protected from tampering • A list of names of people who can testify that they protected the evidence
  • 14. Reasonable Searches • Fourth amendment protects citizens from unreasonable search and seizure by the government • Illegally obtained evidence is inadmissible in court • Most searches require probable cause and a search warrant
  • 15. Exceptions • These searches don't require a warrant • Objects in plain sight • At a public checkpoint • Exigent circumstances • Immediate threat to human life or of evidence being destroyed
  • 16. Agents of Law Enforcement • Private citizens are not part of the government, so the fourth amendment does not apply, unless: • Private citizens who carry out investigations on behalf of law enforcement, they are acting under the color of law enforcement or agents of law enforcement • Then the fourth amendment applies
  • 17. Should You Call Law Enforcement? • Companies often avoid involving law enforcement • Makes cases simpler, avoids publicity
  • 18. Entrapment and Enticement • Entrapment • Law enforcement agent persuades someone to commit a crime when • The person otherwise had no intention to commit a crime • Enticement • Law enforcement agent makes conditions favorable for a crime • Person is already intent on committing a crime
  • 19. Computer Crime • Computer as target • DoS, installing malware to send spam • Computer as a tool • Stealing secrets from a database • Stealing credit card numbers • Espionage • Harassment • Attribution • Difficult to prove who did a crime
  • 20. Intellectual Property • Trademark • Name, logo, or symbol used for marketing • Unregistered ™ or Registered ® • Patent • Grants a monopoly for an invention • Copyright © • Restricts copying creative work • Software typically covered by copyright • Fair sale & fair use are allowed
  • 21. Intellectual Property • Licenses • End-User License Agreement (EULA) • Trade secrets • Special sauce • Protected by non-disclosure agreements (NDAs) & non-compete agreements (NCAs)
  • 22. Intellectual Property Attacks • Software piracy • Copyright infringement • Corporate espionage • Cybersquatting & Typosquatting • Using a domain close to a company's domain, like yahoo.net or yahooo.com
  • 23. Privacy • Confidentiality of personal information • EU Data Protection Directive • Individuals must be notified how their data is used & allowed to opt out • OECD Privacy Guidelines • Organization for Economic Cooperation and Development • Includes EU, USA, Mexico, AU & more
  • 24. EU-US Safe Harbor • Part of EU Data Protection Directive • Sending personal data from EU to other countries is forbidden • Unless the receiving country adequately protects its data • The USA lost this privilege in Oct. 2015 because of the Snowden leaks • Replacement agreement should be reached next week (Link Ch 1d, Jan. 25, 2016)
  • 25. International Cooperation • Council of Europe Convention on Cybercrime • Includes most EU countries and the USA • Promotes cooperation
  • 26. Import / Export Restrictions • USA restricted exports of cryptographic technology in the 1990s • Restrictions have been relaxed since then
  • 27. Important Laws and Regulations
  • 28. HIPAA • Health Insurance Portability and Accountability Act • Guidance on Administrative, Physical, and Technical safeguards • For Protected Health Information (PHI)
  • 29. CFAA • Computer Fraud and Abuse Act • Protects government and financial computers • Including every computer on the Internet (probably not the law's original intent) • It's a crime to exceed your authorization to use such a computer
  • 30. ECPA & The PATRIOT Act • Electronic Communications Privacy Act • Protected electronic communications from warrantless wiretapping • Weakened by the PATRIOT Act • The PATRIOT Act • A response to 9/11 attacks • Greatly expanded law enforcement's electronic monitoring capabilities
  • 31. GLAB & SOX • Gramm-Leach-Bailey Act • Forces financial institutions to protect customer financial information • Sarbanes-Ox;ey Act • Response to ENRON scandal • Regulatory compliance mandates for publicly traded companies • Ensures financial disclosure and auditor independence
  • 32. PCI-DSS • Payment Card Industry Data Security Standard • Self-regulation by major vendors • Mandates security policy, devices, controls, and monitoring to protect cardholder data
  • 33. US Breach Notification Laws • 47 states require notification • No federal law yet • Safe harbor for data that was encrypted at time of compromise
  • 35. Service Provider Contractual Security • Service Level Agreements (SLA) • Identify key expectations vendor must meet • Attestation • Third party review of the service provider to determine security posture • Includes SAS 70 (old), ISO 27001, and PCI-DSS
  • 36. Pentests & Procurement • Right to Penetration Test / Audit • Allows the originating organization to perform these security tests on a vendor • Procurement • Purchasing products or services • Considering security before purchase is best
  • 37. Other Concepts • Vendor Governance • Ensure that vendor provides sufficient quality • Acquisitions • Purchasing a company to add to an existing company • Can disrupt security • Divestitures • Splitting a company into parts • May result in duplicate accounts and other risks
  • 39. (ISC)^2 Code of Ethics • Four Canons • Protect society, the commonwealth, and the infrastructure • Act honorably, honestly, justly, responsibly, and legally • Provide diligent and competent service to principals • Advance and protect the profession
  • 44. x
  • 45. Personnel Security • Security Awareness and Training • Background Checks • Employee Termination • Must use fair process • Vendor, Consultant and Contractor Security • Outsourcing and Offshoring • Can lower Total Cost of Ownership • May improve security • Privacy and regulatory issues • Must perform risk analysis first
  • 47. Access Control Types • Preventive • Detective • Corrective • Recovery • Deterrent • Compensating
  • 48. Access Control Types • Preventive • Prevents actions, such as limited privileges • Detective • Alerts during or after an attack, like video surveillance • Corrective • Corrects a damaged system or process, like antivirus removing a suspicious file
  • 49. Access Control Types • Recovery • Restores functionality after a security incident, such as restoring from backups • Deterrent • Scares away attackers, like a "Beware of Dog" sign • Compensating • Additional control to compensate for weakness in other controls • e. g. reviewing server logs to detect violations of the Computer Use Policy (an administrative control)
  • 50. Access Control Categories • Administrative • Policy, procedure, or regulation • Technical • Software, hardware, or firmware • Physical • Locks, security guards, etc.
  • 51. 51
  • 53. Risk Analysis • Assets • Valuable resources to protect • Threat • A potentially harmful occurrence • Vulnerability • A weakness
  • 54. Risk = Threat x Vulnerability • Earthquake risk is the same in Boston and San Francisco • Boston • Earthquakes are rare, but buildings are old and vulnerable • San Francisco • Earthquakes are common, but buildings are newer and safer
  • 55. Impact • Severity of the damage in dollars • Risk = Threat x Vulnerability x Impact • Human life is considered near-infinite impact
  • 56.
  • 57.
  • 58. Total Cost of Ownership (TCO) • Of a mitigating safeguard includes • Upfront costs • Annual cost of maintenance • Staff hours • Maintenance fees • Software subscriptions
  • 59. Return on Investment (ROI) • Amount of money saved by implementing a safeguard • If Total Cost of Ownership is less than Annualized Loss Expectancy, you have a positive ROI
  • 60. Risk Choices • Accept the risk • Mitigate the risk • Transfer the risk • Risk avoidance
  • 61. Quantitative and Qualitative Risk Analysis • Quantitative • Uses hard metrics, like dollars • Qualitative • Use simple approximate values • Or categories like High, Medium, Low
  • 62. NIST 9-Step Risk Analysis Process
  • 64. Types of Attackers • Hackers • Black hat, white hat, gray hat • Script kiddies • Outsiders • Outside the company • Insiders • Hacktivists • Bots • Phishing