SlideShare a Scribd company logo
1 of 40
Download to read offline
CNIT 125:
Information Security
Professional
(CISSP
Preparation)
Ch 3. Asset Security
Classifying Data
Labels
ā€¢ Governments
ā€¢ Confidential, Secret, Top Secret
ā€¢ Threats to national necurity
ā€¢ SBU (Sensitive But Unclassified)
ā€¢ Sensitive but not a matter of national
security, like employee health records
ā€¢ For Official Use Only (FOUO)
ā€¢ Private Sector
ā€¢ "Internal Use Only", "Company Proprietary"
Security Compartments
ā€¢ Sensitive Compartmented Information
(SCI)
ā€¢ Highly sensitive information
ā€¢ Examples (not testable)
ā€¢ HCS, COMINT (SI), GAMMA (G),
TALENT KEYHOLE (TK)
ā€¢ Compartments require a documented
and approved need to know in additional
to a normal clearance such as top secret
Clearance
ā€¢ Formal determination whether a user can be
trusted with a specific level of information
ā€¢ Considers both current and future
potential trustworthiness
ā€¢ Issues: debt, drug or alcohol abuse,
personal secrets
ā€¢ Most common reasons for denying
clearance
ā€¢ Drug use and foreign influence
Formal Access Approval
ā€¢ Documented approval from the data
owner for a subject to access certain
objects
ā€¢ Requires the subject to understand all
the rules and requirements for accessing
data
ā€¢ And consequences if the data is lost,
destroyed, or compromised
Need to Know
ā€¢ Most systems rely on least privilege
ā€¢ Rely on users to police themselves by
following policy and only attempting to
access information they need to know
Sensitive Information/Media Security
ā€¢ Sensitive Information
ā€¢ Requires protection
ā€¢ Resides on media
ā€¢ Primary storage and backup storage
ā€¢ Policies must cover
ā€¢ Handling
ā€¢ Storage
ā€¢ Retention
Ownership
Business or Mission Owners
ā€¢ Senior management
ā€¢ Create information security program
ā€¢ Ensure that it is properly staffed, funded,
and given organizational priority
ā€¢ Responsible for ensuring that assets are
protected
Data Owners
ā€¢ Also called "information owner"
ā€¢ Management employee responsible for
ensuring that specific data is protected
ā€¢ Determine sensitivity labels and frequency of
backup
ā€¢ Data owner does management
ā€¢ Custodians perform actual hands-on
protection of data
ā€¢ NOTE: this is different from the "Owner" in a
Discretionary Access Control system
System Owner
ā€¢ Manager responsible for the physical
computers that house data
ā€¢ Hardware, software, updates, patches,
etc.
ā€¢ Ensure physical security, patching,
hardening, etc.
ā€¢ Technical hands-on responsibilities are
delegated to Custodians
Custodian
ā€¢ Provides hands-on protection of data
ā€¢ Perform backups, patching configuring
antivirus software, etc.
ā€¢ Custodian follows detailed orders
ā€¢ Does not make critical decisions on
how data is protected
Users
ā€¢ Must comply with policies, procedures,
standards, etc.
ā€¢ Must not write doen passwords or
share accounts, for example
ā€¢ Must be made aware of risks,
requirements, and penalties
Data Controller and Data Processors
ā€¢ Data Controllers
ā€¢ Create and manage sensitive data
ā€¢ Human Resources employees are often
data controllers
ā€¢ Data Processors
ā€¢ Manage data on behalf of data
controllers
ā€¢ Ex: outsourced payroll company
Data Collection Limitation
ā€¢ Organizations should collect the
minimum amount of sensitive data that is
required
Memory and Remanence
Data Remanence
ā€¢ Data that remains on storage media after
imperfect attempts to erase it
ā€¢ Happens on magnetic media, flash
drives, and SSDs
Memory
ā€¢ None of these retain memory for long
after power is shut off
ā€¢ RAM is main memory
ā€¢ Cache memory
ā€¢ Fast memory on the CPU chip (level 1
cache) or
ā€¢ On other chips (Level 2 cache)
ā€¢ Registers
ā€¢ Part of the CPU
RAM and ROM
ā€¢ RAM is volatile
ā€¢ Data vanishes after power goes off
ā€¢ ROM is not volatile
ā€¢ Cold Boot Attack
ā€¢ Freezing RAM can make the data last
longer without power, up to 30 min. or
so
DRAM and SRAM
ā€¢ Static Random Access Memory (SRAM)
ā€¢ Fast and expensive
ā€¢ Dynamic Random Access Memory
(DRAM)
ā€¢ Slower and cheaper
Firmware
ā€¢ Small programs that rarely change
ā€¢ Ex: BIOS (Basic Input-Output System)
ā€¢ Stored in ROM chips
Types of ROM Chips
ā€¢ PROM (Programmable Read Only Memory) --
write-once
ā€¢ Programmable Logic Device (PLD)
ā€¢ Field-programmable
ā€¢ Types include
ā€¢ EPROM (Erasable Programmable Read
Only Memory)
ā€¢ EEPROM (Electrically Erasable
Programmable Read Only Memory)
ā€¢ Flash Memory
Flash Memory
ā€¢ USB thumb drives
ā€¢ A type of EEPROOM
ā€¢ Written by sectors, not byte-by-byte
ā€¢ Faster than EEPROMs
ā€¢ Slower than magnetic disks
Solid State Drives (SSDs)
ā€¢ Combination of EEPROM and DRAM
ā€¢ SSDs use large block sizes
ā€¢ Blocks are virtual; the computer doesn't
know the physical location of the blocks
ā€¢ Bad blocks are replaced silently by the
SSD controller
ā€¢ Empty blocks are erased by the
controller in a "garbage collection"
process
Cleaning SSDs
ā€¢ Overwriting data from the computer is
ineffective
ā€¢ Cannot access all the blocks
ā€¢ The SSD controller may have an ATA
Erase command
ā€¢ But there's no way to verify its work
ā€¢ It makes no attempt to clean "bad"
blocks
Two Ways to Securely Erase an SSD
ā€¢ Physically destroy the drive
ā€¢ Turn on encryption before the drive is
ever used
ā€¢ That ensures that even the bad blocks
are encrypted
ā€¢ To erase it, delete the key
ā€¢ iPhones work this way
ā€¢ Proven effective in practice
Data Destruction
Overwriting
ā€¢ Deleting a file does not erase its contents
ā€¢ You must write on top of the sectors it
used
ā€¢ Also called shredding or wiping
ā€¢ A single pass is enough for a magnetic
hard drive
Degaussing
ā€¢ Exposing a magnetic disk or tape to high
magnetic field
ā€¢ Can be a secure erase if performed
properly
Destruction
ā€¢ Physically destroy the storage media
ā€¢ More secure than overwriting
ā€¢ Paper shredders destroy printed data
Determining Data Security Controls
Certification and Accreditation
ā€¢ Certification
ā€¢ A system meets the requirements of
the data owner
ā€¢ Accreditation
ā€¢ Data owner accepts the certification
Standards and Control Frameworks
ā€¢ PCI-DSS
ā€¢ OCTAVE
ā€¢ Operationally Critical Threat, Asset,
and Vulnerability Evaluation
ā€¢ From Carnegie Mellon U
ā€¢ ISO 27000 Series
ā€¢ Used to be ISO 17799
ā€¢ International standard, very detailed
and expensive to implement
Standards and Control Frameworks
ā€¢ COBIT
ā€¢ Control Objectives for Information and
related Technology
ā€¢ From ISACA (Information Systems Audit
and Control Association)
ā€¢ A governance model
ā€¢ ITIL
ā€¢ Information Technology Infrastructure
Library
ā€¢ Framework for IT service management
Scoping and Tailoring
ā€¢ Scoping
ā€¢ Determining which portions of a standard
an organization will use
ā€¢ If there's no wireless, wireless is "out of
scope"
ā€¢ Tailoring
ā€¢ Customizing a standard for an organization
ā€¢ Controls selection, scoping, and
compensating controls
Protecting Data in Motion
and Data at Rest
Drive and Tape Encryption
ā€¢ Protect data at rest, even after physical
security is breached
ā€¢ Recommended for all mobile devices and
mobile media
ā€¢ Whole-disk encryption is recommended
ā€¢ Breach notification laws exclude lost
encrypted data
Media Storage and Transportation
ā€¢ Store backup data offsite
ā€¢ Use a bonded and ensured company for
offsite storage
ā€¢ Secure vehicles and secure site
ā€¢ Don't use informal practices
ā€¢ Like storing backup media at an
employee's house
Protecting Data in Motion
ā€¢ Standards-based end-to-end encryption
ā€¢ Like an IPSec VPN

More Related Content

What's hot

3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
Ā 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
Ā 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
Ā 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecuritySam Bowne
Ā 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and TestingSam Bowne
Ā 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity ManagementKarthikeyan Dhayalan
Ā 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
Ā 
7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
Ā 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
Ā 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)Sam Bowne
Ā 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
Ā 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingSam Bowne
Ā 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)Sam Bowne
Ā 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architectureKarthikeyan Dhayalan
Ā 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)Sam Bowne
Ā 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
Ā 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset SecurityHamed Moghaddam
Ā 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
Ā 

What's hot (20)

3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Ā 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Ā 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
Ā 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
Ā 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
Ā 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
Ā 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Ā 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
Ā 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
Ā 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
Ā 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
Ā 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
Ā 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
Ā 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
Ā 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
Ā 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
Ā 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
Ā 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
Ā 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset Security
Ā 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Ā 

Viewers also liked

CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingSam Bowne
Ā 
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecuritySam Bowne
Ā 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)Sam Bowne
Ā 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
Ā 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
Ā 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
Ā 
CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)Sam Bowne
Ā 
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)Sam Bowne
Ā 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: CryptographySam Bowne
Ā 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection SystemsSam Bowne
Ā 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web ServersSam Bowne
Ā 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
Ā 
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsSam Bowne
Ā 
CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringSam Bowne
Ā 
CNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection MechanismsCNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection MechanismsSam Bowne
Ā 
CNIT 127 Ch 2: Stack overflows on Linux
CNIT 127 Ch 2: Stack overflows on LinuxCNIT 127 Ch 2: Stack overflows on Linux
CNIT 127 Ch 2: Stack overflows on LinuxSam Bowne
Ā 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewSam Bowne
Ā 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewSam Bowne
Ā 
Ch 6: Enumeration
Ch 6: EnumerationCh 6: Enumeration
Ch 6: EnumerationSam Bowne
Ā 
CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro Sam Bowne
Ā 

Viewers also liked (20)

CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
Ā 
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development Security
Ā 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
Ā 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
Ā 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
Ā 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
Ā 
CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)
Ā 
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
Ā 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: Cryptography
Ā 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
Ā 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
Ā 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
Ā 
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
Ā 
CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
Ā 
CNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection MechanismsCNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection Mechanisms
Ā 
CNIT 127 Ch 2: Stack overflows on Linux
CNIT 127 Ch 2: Stack overflows on LinuxCNIT 127 Ch 2: Stack overflows on Linux
CNIT 127 Ch 2: Stack overflows on Linux
Ā 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
Ā 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
Ā 
Ch 6: Enumeration
Ch 6: EnumerationCh 6: Enumeration
Ch 6: Enumeration
Ā 
CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro
Ā 

Similar to CISSP Prep: Ch 3. Asset Security

CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
Ā 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
Ā 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
Ā 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
Ā 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx9905234521
Ā 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologySam Bowne
Ā 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
Ā 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsKarthikeyan Dhayalan
Ā 
Digital Media Storage.pptx
Digital Media Storage.pptxDigital Media Storage.pptx
Digital Media Storage.pptxLydiahkawira1
Ā 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
Ā 
Data security
Data securityData security
Data securitysbmiller87
Ā 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
Ā 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaResilient Systems
Ā 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
Ā 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
Ā 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
Ā 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
Ā 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationSecurity 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationPrecisely
Ā 

Similar to CISSP Prep: Ch 3. Asset Security (20)

CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
Ā 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
Ā 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ā 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
Ā 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
Ā 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis Methodology
Ā 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
Ā 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Ā 
Digital Media Storage.pptx
Digital Media Storage.pptxDigital Media Storage.pptx
Digital Media Storage.pptx
Ā 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
Ā 
Data security
Data securityData security
Data security
Ā 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
Ā 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Ā 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Ā 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Ā 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Ā 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
Ā 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
Ā 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationSecurity 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Ā 
CF.ppt
CF.pptCF.ppt
CF.ppt
Ā 

More from Sam Bowne

Cyberwar
CyberwarCyberwar
CyberwarSam Bowne
Ā 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
Ā 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
Ā 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
Ā 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
Ā 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
Ā 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
Ā 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
Ā 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
Ā 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
Ā 
10 RSA
10 RSA10 RSA
10 RSASam Bowne
Ā 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
Ā 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
Ā 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
Ā 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
Ā 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
Ā 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
Ā 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
Ā 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
Ā 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
Ā 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
Ā 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Ā 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
Ā 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Ā 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Ā 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Ā 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Ā 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Ā 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Ā 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Ā 
10 RSA
10 RSA10 RSA
10 RSA
Ā 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Ā 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
Ā 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Ā 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Ā 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Ā 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Ā 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Ā 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Ā 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Ā 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
Ā 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
Ā 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
Ā 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
Ā 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
Ā 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
Ā 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
Ā 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
Ā 
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...Nguyen Thanh Tu Collection
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
Ā 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
Ā 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
Ā 
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
Ā 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
Ā 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
Ā 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Ā 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
Ā 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
Ā 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
Ā 
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Ā 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
Ā 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
Ā 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Ā 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
Ā 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
Ā 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
Ā 
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Ā 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Ā 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Ā 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
Ā 
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
Ā 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
Ā 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
Ā 

CISSP Prep: Ch 3. Asset Security

  • 3. Labels ā€¢ Governments ā€¢ Confidential, Secret, Top Secret ā€¢ Threats to national necurity ā€¢ SBU (Sensitive But Unclassified) ā€¢ Sensitive but not a matter of national security, like employee health records ā€¢ For Official Use Only (FOUO) ā€¢ Private Sector ā€¢ "Internal Use Only", "Company Proprietary"
  • 4. Security Compartments ā€¢ Sensitive Compartmented Information (SCI) ā€¢ Highly sensitive information ā€¢ Examples (not testable) ā€¢ HCS, COMINT (SI), GAMMA (G), TALENT KEYHOLE (TK) ā€¢ Compartments require a documented and approved need to know in additional to a normal clearance such as top secret
  • 5. Clearance ā€¢ Formal determination whether a user can be trusted with a specific level of information ā€¢ Considers both current and future potential trustworthiness ā€¢ Issues: debt, drug or alcohol abuse, personal secrets ā€¢ Most common reasons for denying clearance ā€¢ Drug use and foreign influence
  • 6. Formal Access Approval ā€¢ Documented approval from the data owner for a subject to access certain objects ā€¢ Requires the subject to understand all the rules and requirements for accessing data ā€¢ And consequences if the data is lost, destroyed, or compromised
  • 7. Need to Know ā€¢ Most systems rely on least privilege ā€¢ Rely on users to police themselves by following policy and only attempting to access information they need to know
  • 8. Sensitive Information/Media Security ā€¢ Sensitive Information ā€¢ Requires protection ā€¢ Resides on media ā€¢ Primary storage and backup storage ā€¢ Policies must cover ā€¢ Handling ā€¢ Storage ā€¢ Retention
  • 10. Business or Mission Owners ā€¢ Senior management ā€¢ Create information security program ā€¢ Ensure that it is properly staffed, funded, and given organizational priority ā€¢ Responsible for ensuring that assets are protected
  • 11. Data Owners ā€¢ Also called "information owner" ā€¢ Management employee responsible for ensuring that specific data is protected ā€¢ Determine sensitivity labels and frequency of backup ā€¢ Data owner does management ā€¢ Custodians perform actual hands-on protection of data ā€¢ NOTE: this is different from the "Owner" in a Discretionary Access Control system
  • 12. System Owner ā€¢ Manager responsible for the physical computers that house data ā€¢ Hardware, software, updates, patches, etc. ā€¢ Ensure physical security, patching, hardening, etc. ā€¢ Technical hands-on responsibilities are delegated to Custodians
  • 13. Custodian ā€¢ Provides hands-on protection of data ā€¢ Perform backups, patching configuring antivirus software, etc. ā€¢ Custodian follows detailed orders ā€¢ Does not make critical decisions on how data is protected
  • 14. Users ā€¢ Must comply with policies, procedures, standards, etc. ā€¢ Must not write doen passwords or share accounts, for example ā€¢ Must be made aware of risks, requirements, and penalties
  • 15. Data Controller and Data Processors ā€¢ Data Controllers ā€¢ Create and manage sensitive data ā€¢ Human Resources employees are often data controllers ā€¢ Data Processors ā€¢ Manage data on behalf of data controllers ā€¢ Ex: outsourced payroll company
  • 16. Data Collection Limitation ā€¢ Organizations should collect the minimum amount of sensitive data that is required
  • 18. Data Remanence ā€¢ Data that remains on storage media after imperfect attempts to erase it ā€¢ Happens on magnetic media, flash drives, and SSDs
  • 19. Memory ā€¢ None of these retain memory for long after power is shut off ā€¢ RAM is main memory ā€¢ Cache memory ā€¢ Fast memory on the CPU chip (level 1 cache) or ā€¢ On other chips (Level 2 cache) ā€¢ Registers ā€¢ Part of the CPU
  • 20. RAM and ROM ā€¢ RAM is volatile ā€¢ Data vanishes after power goes off ā€¢ ROM is not volatile ā€¢ Cold Boot Attack ā€¢ Freezing RAM can make the data last longer without power, up to 30 min. or so
  • 21. DRAM and SRAM ā€¢ Static Random Access Memory (SRAM) ā€¢ Fast and expensive ā€¢ Dynamic Random Access Memory (DRAM) ā€¢ Slower and cheaper
  • 22. Firmware ā€¢ Small programs that rarely change ā€¢ Ex: BIOS (Basic Input-Output System) ā€¢ Stored in ROM chips
  • 23. Types of ROM Chips ā€¢ PROM (Programmable Read Only Memory) -- write-once ā€¢ Programmable Logic Device (PLD) ā€¢ Field-programmable ā€¢ Types include ā€¢ EPROM (Erasable Programmable Read Only Memory) ā€¢ EEPROM (Electrically Erasable Programmable Read Only Memory) ā€¢ Flash Memory
  • 24. Flash Memory ā€¢ USB thumb drives ā€¢ A type of EEPROOM ā€¢ Written by sectors, not byte-by-byte ā€¢ Faster than EEPROMs ā€¢ Slower than magnetic disks
  • 25. Solid State Drives (SSDs) ā€¢ Combination of EEPROM and DRAM ā€¢ SSDs use large block sizes ā€¢ Blocks are virtual; the computer doesn't know the physical location of the blocks ā€¢ Bad blocks are replaced silently by the SSD controller ā€¢ Empty blocks are erased by the controller in a "garbage collection" process
  • 26. Cleaning SSDs ā€¢ Overwriting data from the computer is ineffective ā€¢ Cannot access all the blocks ā€¢ The SSD controller may have an ATA Erase command ā€¢ But there's no way to verify its work ā€¢ It makes no attempt to clean "bad" blocks
  • 27. Two Ways to Securely Erase an SSD ā€¢ Physically destroy the drive ā€¢ Turn on encryption before the drive is ever used ā€¢ That ensures that even the bad blocks are encrypted ā€¢ To erase it, delete the key ā€¢ iPhones work this way ā€¢ Proven effective in practice
  • 29. Overwriting ā€¢ Deleting a file does not erase its contents ā€¢ You must write on top of the sectors it used ā€¢ Also called shredding or wiping ā€¢ A single pass is enough for a magnetic hard drive
  • 30. Degaussing ā€¢ Exposing a magnetic disk or tape to high magnetic field ā€¢ Can be a secure erase if performed properly
  • 31. Destruction ā€¢ Physically destroy the storage media ā€¢ More secure than overwriting ā€¢ Paper shredders destroy printed data
  • 33. Certification and Accreditation ā€¢ Certification ā€¢ A system meets the requirements of the data owner ā€¢ Accreditation ā€¢ Data owner accepts the certification
  • 34. Standards and Control Frameworks ā€¢ PCI-DSS ā€¢ OCTAVE ā€¢ Operationally Critical Threat, Asset, and Vulnerability Evaluation ā€¢ From Carnegie Mellon U ā€¢ ISO 27000 Series ā€¢ Used to be ISO 17799 ā€¢ International standard, very detailed and expensive to implement
  • 35. Standards and Control Frameworks ā€¢ COBIT ā€¢ Control Objectives for Information and related Technology ā€¢ From ISACA (Information Systems Audit and Control Association) ā€¢ A governance model ā€¢ ITIL ā€¢ Information Technology Infrastructure Library ā€¢ Framework for IT service management
  • 36. Scoping and Tailoring ā€¢ Scoping ā€¢ Determining which portions of a standard an organization will use ā€¢ If there's no wireless, wireless is "out of scope" ā€¢ Tailoring ā€¢ Customizing a standard for an organization ā€¢ Controls selection, scoping, and compensating controls
  • 37. Protecting Data in Motion and Data at Rest
  • 38. Drive and Tape Encryption ā€¢ Protect data at rest, even after physical security is breached ā€¢ Recommended for all mobile devices and mobile media ā€¢ Whole-disk encryption is recommended ā€¢ Breach notification laws exclude lost encrypted data
  • 39. Media Storage and Transportation ā€¢ Store backup data offsite ā€¢ Use a bonded and ensured company for offsite storage ā€¢ Secure vehicles and secure site ā€¢ Don't use informal practices ā€¢ Like storing backup media at an employee's house
  • 40. Protecting Data in Motion ā€¢ Standards-based end-to-end encryption ā€¢ Like an IPSec VPN