Risk Management   (52) 
GOAL - Determine impact of the threat and risk of threat occurring  
The primary goal of risk management is to reduce risk to an 
acceptable level. 
Step 1 – Prepare for Assessment (purpose, scope, etc.) 
Step 2 – Conduct Assessment 
- 
- 
- 
- 
- 
ID threat sources and events 
ID vulnerabilities and predisposing conditions 
Determine likelihood of occurrence 
Determine magnitude of impact 
Determine risk 
Step 3 – Communicate Risk/results 
Step 4 – Maintain Assessment/regularly 
Types of Risk  
Inherent chance of making an error with no controls in place 
Control chance that controls in place will prevent, detect or control 
errors  
Detection chance that auditors won’t find an error  
Residual risk remaining after control in place  
Business concerns about effects of unforeseen circumstances  
Overall combination of all risks aka Audit risk Preliminary 
Security Examination (PSE): Helps to gather the elements that 
you will need when the actual Risk Analysis takes place.  
ANALYSIS Steps: Identify assets, identify threats, and calculate 
risk. 
ISO 27005 – deals with risk 
 
Risk Assessment Steps (60) 
Four major steps in Risk assessment? 
Prepare, Perform, Communicate, Maintain 
 
Qualitative (57) 
 
Approval – 
Form Team –  
Analyze Data – 
Calculate Risk – 
Countermeasure Recommendations - 
 
REMEMBER HYBRID! 
.Ethics (33) 
Just because something is legal doesn’t make it right.  
Within the ISC context: Protecting information through CIA  
 ISC2 Code of Ethics Canons  
- 
- 
- 
- 
Protect society, the commonwealth, and the 
infrastructure.  
Act honorably, honestly, justly, responsibly, and legally.  
Provide diligent and competent service to principals.  
Advance and protect the profession.  
 Internet Advisory Board (IAB)  
Ethics and Internet (RFC 1087)  
Don’t compromise the privacy of users. Access to and use of 
Internet is a privilege and should be treated as such  
It is defined as unacceptable and unethical if you, for example, gain 
unauthorized access to resources on the internet, destroy integrity, 
waste resources or compromise privacy.   
 
Business Continuity plans development (38)  
- 
- 
- 
Defining the continuity strategy 
Computing strategy to preserve the elements of HW/SW/ 
communication lines/data/application 
Facilities: use of main buildings or any remote facilities 
People: operators, management, technical support persons  
Supplies and equipment: paper, forms HVAC 
Documenting the continuity strategy 
 
BIA (39) 
Goal: to create a document to be used to help understand what 
impact a disruptive event would have on the business  
Gathering assessment material  
 
- 
- 
Org charts to determine functional relationships  
Examine business success factors  
Vulnerability assessment  
- 
- 
- 
Identify Critical IT resources out of critical 
processes, Identify disruption impacts and 
Maximum, Tolerable Downtime (MTD)  
Loss Quantitative (revenue, expenses for 
repair) or Qualitative (competitive edge, 
public embarrassment). Presented as low, 
high, medium.  
Develop recovery procedures   
Analyze the compiled information  
 
- 
- 
Document the process Identify inter-
dependability  
Determine acceptable interruption periods  
Documentation and Recommendation 
 
RTO
 
 
Quantitative Risk Analysis (58) 
-  Quantitative VALUES!!   
- 
SLE (single Loss Expectancy) = Asset Value * Exposure 
factor (% loss of asset)  
ALE (Annual loss expectancy)  = SLE * ARO  
(Annualized Rate of occurrence)  
- 
Accept, mitigate(reduce by implementing controls calculate costs-), 
Assign (insure the risk to transfer it), Avoid (stop business activity) 
Loss= probability * cost 
Residual risk - where cost of applying extra countermeasures is 
more than the estimated loss resulting from a threat or vulnerability 
(C > L). Legally the remaining residual risk is not counted when 
deciding whether a company is liable.  
Controls gap - is the amount of risk that is reduced by 
implementing safeguards. A formula for residual risk is as follows: 
total risk – controls gap = residual risk 
RTO – how quickly you need to have that application’s information 
available after downtime has occurred 
RPO -Recovery Point Objective: Point in time that application data 
must be recovered to resume business functions; AMOUNT OF 
DATA YOUR WILLING TO LOSE 
MTD -Maximum Tolerable Downtime: Maximum delay a business 
can be down and still remain viable  
MTD minutes to hours: critical  
MTD 24 hours: urgent  
MTD 72 hours: important 
MTD 7 days: normal  
               MTD 30 days non-essential 
PLAN 
Accept  
Build Risk Team 
Review 
Once in 100 years = ARO of 0.01 
SLE is the dollar value lost when an asset is successfully attacked 
Exposure Factor  ranges from 0 to 1 
NO – ALE is the annual % of the asset lost when attacked – NOT 
 
Determination of Impact  (61) 
Life, dollars, prestige, market share 
 
Risk Response  (61) 
Risk Avoidance – discontinue activity because you don’t want to 
accept risk 
Risk Transfer – passing on the risk to another entity 
Risk Mitigation –  elimination or decrease in level of risk 
Risk Acceptance – live with it and pay the cost 
Background checks – mitigation, acceptance, avoidance 
 
 
Accountability 
Auditability 
Source trusted and known 
Cost-effectiveness 
Security 
Protection for CIA of assets 
Other issues created? 
Risk Framework Countermeasures (63) 
- 
- 
- 
- 
- 
- 
- 
If it leaves residual data from its function 
 
Controls (68) 
Primary Controls (Types) – (control cost should be less than the 
value of the asset being protected) 
Administrative/Managerial Policy 
- 
- 
Preventive: hiring policies, screening security awareness 
(also called soft-measures!)  
Detective: screening behavior,  job rotation, review of 
audit records  
Technical (aka Logical)  
- 
- 
- 
- 
Preventive: protocols, encryption, biometrics 
smartcards, routers, firewalls  
Detective: IDS and automatic generated violation 
reports, audit logs, CCTV(never preventative)    
Preventive: fences, guards, locks  
Detective: motion detectors, thermal detectors video 
cameras 
Physical (Domain 5) – see and 
touch 
- 
Fences, door, lock, windows etc. 
Prime objective - is to reduce the effects of security threats and 
vulnerabilities  to a tolerable level   
Risk analysis - process that analyses threat scenarios and 
produces a representation of the estimated Potential loss  
Main Categories of Access Control (67) 
- 
- 
- 
- 
- 
- 
- 
Directive: specify rules of behavior 
Deterrent: discourage people, change my mind 
Preventative: prevent incident or breach 
Compensating: sub for loss of primary controls 
Detective: signal warning, investigate 
Corrective: mitigate damage, restore control 
Recovery: restore to normal after incident 
Control  
Accuracy  
Security  
Consistency  
Preventive  
Data checks, 
validity 
checks  
Labels, traffic 
padding, 
encryption  
DBMS, data 
dictionary  
Detective  
Corrective  
Cyclic  
Redundancy  
IDS, audit 
trails  
Comparison  
tools  
Checkpoint, 
backups  
Emergency 
response  
Database 
controls  
Functional order in which controls should be used. Deterrence, 
Denial, Detection, Delay 
Penetration Testing (77) 
Testing a networks defenses by using the same techniques as 
external intruders  
 Scanning and Probing – port scanners  
• 
• 
• 
• 
Demon Dialing – war dialing for modems  
Sniffing – capture data packets  
Dumpster Diving – searching paper disposal areas  
Social Engineering – most common, get information by 
asking  
Penetration testing  
Blue team - had knowledge of the organization, can be done 
frequent and least expensive  
Red team - is external and stealthy  
White box - ethical hacker knows what to look for, see code as a 
developer 
Grey Box - partial knowledge of the system, see code, act as a 
user 
Black box - ethical hacker not knowing what to find  
  
4 stages: planning, discovery, attack, reporting 
vulnerabilities exploited: kernel flaws, buffer overflows, 
symbolic links, file descriptor attacks  
other model: footprint network (information gathering) port 
scans, vulnerability mapping, exploitation, report scanning 
tools are used in penetration tests  
flaw hypotheses methodology = operation system penetration 
testing  
 
Egregious hole – tell them now! 
 
Strategies - External, internal, blind, double-blind 
 
Categories – zero, partial, full knowledge tests 
 
Pen Test Methodology    (79) 
Recon/discover -  
Enumeration -  
vulnerability analysis -  
execution/exploitation -  
document findings/reporting -  SPELL OUT AND DEFINE!!!! 
 
Control Assessment    76 
Look at your posture 
 
Deming Cycle  (83) 
Plan – ID opportunity & plan for change 
Do – implement change on small scale 
Check – use data to analyze results of change 
Act – if change successful, implement wider scale, if fails begin 
cycle again 
 
 
 
Terms  
Wire Tapping eavesdropping on communication -only legal with 
prior consent or warrant  
Data Diddling act of modifying information, programs, or 
documents to commit fraud, tampers with INPUT data  
Privacy Laws data collected must be collected fairly and 
lawfully and used only for the purpose it was collected.  
Water holing – create a bunch of websites with similar names 
Work Function (factor): the difficulty of obtaining the clear text 
from the cipher text as measured by cost/time   
Fair Cryptosystems - In this escrow approach, the secret keys 
used in a communication are divided into two or more pieces, each 
of which is given to an independent third party. When the 
government obtains legal authority to access a particular key, it 
provides evidence of the court order to each of the third parties and 
then reassembles the secret key. 
SLA – agreement between IT service provider and customer, 
document service levels, divorce; how to dissolve relationship 
SLR (requirements) – requirements for a service from client 
viewpoint 
Service level report – insight into a service providers ability to 
deliver the agreed upon service quality 
Legislative drivers?    
FISMA(federal agencies)  
Phase 1 categorizing, selecting minimum controls, assessment  
Phase 2: create national network of secures services to assess  
 
 
Identification of Threat   (86) 
Individuals must be qualified with the appropriate level of training.  
- 
- 
- 
- 
- 
Develop job descriptions 
Contact references 
Screen/investigate background 
Develop confidentiality agreements 
Determine policy on vendor, contractor, consultant, and 
temporary staff access 
DUE DILIGENCE 
 
Software Licenses (91) 
Public domain - available for anyone to use 
Open source - source code made available with a license in which 
the copyright holder provides the rights to study, change, and 
distribute the software to anyone  
Freeware - proprietary software that is available for use at no 
monetary cost. May be used without payment but may usually not 
be modified, re-distributed or reverse-engineered without the 
author's permission 
 
Assurance (92) 
Degree of confidence in satisfaction of security requirements  
Assurance = other word for security 
THINK OUTSIDE AUDIT 
 
Successful Requirements Gathering 92 
Don’t assume what client wants 
Involve users early 
Define and agree on scope 
MORE 
 
Security Awareness   (96) 
Technical training to react to situations, best practices for Security 
and network personnel; Employees, need to understand policies 
then use presentations and posters etc. to get them aware 
Formal security awareness training – exact prep on how 
to do things 
 
 
 
 
Information classification (110) 
Categorization – Process of determining the impact of loss of CIA 
of information to an organization. Identifies the value of the data to 
the organization. Not all data has same value, demonstrates 
business commitment to security, Identify  which information is 
most sensitive and vital  
Criteria - Value, age, useful life, personal association  
Levels  
Government, military   
Unclassified (have FOUO also)  
Sensitive but unclassified  
Confidential (some damage)  
Secret (Serious damage) (Can have Country specific 
- 
- 
- 
- 
restrictions also – NZAUS SECRET for New Zealand, 
Australia and US secret) 
- 
Top Secret (Grave damage)  
Private sector (113) 
Public; used by public or employees 
Company Confidential; viewed by all employees but 
Company Restricted – restricted to a subset of 
Private; Ex. SSN, credit card info., could cause 
- 
- 
not for general use 
- 
employees 
- 
damage 
- 
Proprietary; trade secrets 
- 
Confidential; cause exceptionally grave damage, 
Sensitive; internal business 
TS = Confidential/Prop, Secret = Private, Confidential = sensitive 
Security policies, standards & guidelines (119)   
Policies first and highest level of documentation  
  
Very first is called Senior management Statement of Policy,  
Stating importance, support and commitment 
Types  
- 
Regulatory (required due to laws, regulations, 
compliance and specific industry standards!)  
Advisory (not mandatory but strongly suggested 
Informative to inform the reader  
- 
- 
  
Information policy - classifications and defines level of access 
and method to store and transmit information  
Security policies - authenticates and defines technology used to 
control information access and distribution  
SYSTEM security policy - lists hardware / software to be used 
and steps to undertake to protect infrastructure  
  
Standards - Specify use of specific technologies in a uniform way  
Guidelines - same as standards but not forced to follow  
Procedures - detailed steps to perform a task  
Baseline - minimum level of security  
Security planning - involves security scope, providing security 
management responsibilities and testing security measures for 
effectiveness. Strategic 5 years Tactical shorter than strategic 
Operational day to day, short term  
 
 
 
Data Classification Policy   (111) 
Does data need to be encrypted? 
-  Who will have access to data? 
How is the data to be secured? 
- 
- 
How long is data to be retained? 
-  What method(s) should be used to dispose of data? 
- 
-  What is the appropriate use of the data? 
Proper Assess Man REQUIRES  (113) 
1. Inventory Management – all things 
2. Configuration Management - +patching 
IT Asset Management (ITAM)   (114) 
Full life cycle management of IT assets 
- 
- 
- 
CMBD; holds relationships between system components 
– incidents, problems, known error, changes, and 
releases 
Single repository 
Organizationally aligned      -scalable 
US-EU (Swiss) Safe Harbor (124)    
The EU Data Protection Directive To be replaced, in 2018, by the 
General Data Protection Regulation (GDPR) 
Bridge differences in approach and provide a streamlined means 
for U.S. organizations to comply with European Commissions. 
STRENGTHING INDIVIDUALS RIGHTS 
Data obtained fairly and lawfully 
Data only used for original purpose 
Adequate, relevant, and not excessive to purpose 
Accurate and up to date 
Accessible to the subject 
Kept secure 
Destroyed after purpose is complete 
- 
- 
- 
- 
- 
- 
- 
Directive on Data Protection; Seven Tenets 
- 
- 
- 
- 
- 
- 
- 
Notice; data subjects should be given notice when their 
data is being collected 
Choice; data should not be disclosed without the data 
subject’s consent 
Onward Transfer; data subjects should be informed as 
to who is collecting their data 
Security; collected data should be kept secure from any 
potential abuses 
Data Integrity; reliable, only stated purpose 
Access; data subjects should be allowed to access their 
data and make corrections to any inaccurate data 
Enforcement; accountability, data subjects should have 
a method available to them to hold data collectors 
accountable for not following the above principles 
NOT REASON or RETENTION TIME 
US Org is Data Processors when they classify and handle data, 
EU company would be Business/Mission owners, US org. would 
also be Data Administrators 
Data processors have responsibility to protect privacy of data 
Dpt. of Commerce holds list of participants 
Can transfer to non-Safe Harbor entities with permission 
FTC – overseas compliance framework for organizations wishing 
to use personal data of EU citizens 
Self-certify but Dpt. Of Transportation or FTC can enforce 
Gramm/Leach/Bailey Act delaying application to financial markets 
Roles and responsibilities    
Senior Manager ultimate responsibility  
Information security Officer functional responsibility  
Ensure policies etc. are written by app. Unit 
Implement/operate CIRTs 
Provide leadership for security awareness 
Communicate risk to senior management 
Stay abreast of current threats and technology 
- 
- 
- 
- 
- 
Security Analyst Strategic, develops policies and guidelines 
Data Ownership   (128) 
Data Life - Creation, use, destruction(subservient to security 
policy) 
Data/Information Owner  
- 
- 
- 
- 
- 
- 
- 
- 
- 
- 
- 
- 
Ultimate organizational responsibility for data 
Categorize systems and data, determine level of 
classification  
Required controls are selected for each classification 
Select baseline security standards 
Determine impact information has on organization 
Understand replacement cost (if replaceable) 
Determine who needs the information and 
circumstances for release 
Determine when information should be destroyed 
Responsible for asset  
Review and change classification  
Can delegate responsibility to data custodian  
Authorize user privileges  
Data Custodian Responsibilities (129) 
Day-to-day tasks, grants permission to users in DAC 
Adhere to data policy and data ownership guidelines 
Ensure accessibility, maintain and monitor security 
Dataset maintenance, , archiving 
Documentation, including updating 
QA, validation and audits 
Run regular backups/restores and validity of them  
Insuring data integrity and security (CIA)  
- 
- 
- 
- 
- 
- 
- 
- 
-  Maintaining records in accordance to classification  
- 
- 
Applies user authorization  
Implement security controls 
System Owners - Select security controls 
Administrators 
- 
Assign permission to access and handle data 
End-user  
-  Uses information as their job  
-  Follow instructions in policies and guidelines  
- 
- 
Due care (prevent open view by e.g. Clean desk)  
Use corporation resources for corporation use  
Auditor examines security controls 
 
QC & QA (131)    
QC – assessment of quality based on internal standards 
QA – assessment of quality based on standards external to the 
process and involves reviewing of the activities and quality control 
processes. 
 
Benefits of Data Standards  (134)    
Increased data sharing  
 
Considerations (134)    
Borders 
Encryption 
 
Data Modeling  (135)    
Smallest bits of information the Db will hold – granularity 
When do we replace – then think about next one 
CRITICAL = AVAILABILITY 
Data Remanence (140)    
Residual physical representation of data that has been in some 
way erased. PaaS deals with it best in Cloud 
Remanence -  Residual data left on media after erase attempts 
Remove unwanted remnant data from magnetic tapes 
- 
- 
- 
- 
Physical destruction 
Degaussing 
Overwriting 
NOT Reformatting  
Sanitizing – Series of processes that removes data, ensures data 
is unrecoverable by any means. Removing a computer from 
service and disposed of. All storage media removed or destroyed.  
Degaussing – AC erasure; alternating magnetic fields , DC 
erasure; unidirectional magnetic field or permanent magnet, can 
erase tapes 
Erasing – deletion of files or media, removes link to file, least 
effective 
Overwriting/wiping/shredding – overwrites with pattern, may 
miss 
Zero fill – wipe a drive and fill with zeros 
Clearing – Prepping media for reuse at same level. Removal of 
sensitive data from storage devices in such a way that the data 
may not be reconstructed using normal system functions or 
utilities. May be recoverable with special lab equipment. Data just 
overwritten. 
Purging– More intense than clearing. Media can be reused in 
lower systems. Removal of sensitive data with the intent that the 
data cannot be reconstructed by any known technique. 
Destruction – Incineration, crushing, shredding, and disintegration 
are stages of this  
Encrypt data is a good way to secure files sent through the 
internet 
SSD Data Destruction (142) 
- 
- 
- 
- 
NIST says to “disintegrate” 
SSD drives cannot be degaussed, space sectors, bad 
sectors, and wear space/leveling may hide 
nonaddressable data, encrypt is the solution  
Erase encryption key to be unreadable 
Crypto erase, sanitization, targeted overwrite (best) 
 
Buy high quality media – value of data exceeds cost of media 
Sanitation is business normal, not destruction for costs reasons 
Reuse - Downgrading equipment for reuse will probably be more 
expensive than buying new  
Metadata – helps to label data and prevent loss before it leaves 
the organization,  
Data mart - metadata is stored in a more secure container   
Baselines (154)    
Select based on the data classification of the data stored/handled 
-  Which parts of enterprise can be protected by the same 
baseline? 
Should baseline be applied throughout whole 
enterprise? 
At what security level should baseline aim? 
- 
- 
How will the controls be determined? 
Baseline – Starting point that can be tailored to an organization 
for a minimum security standard. Common security configurations, 
Use Group Policies to check and enforce compliance 
 
Scoping and Tailoring (157)    
Narrows the focus and of the architecture to ensure that 
appropriate risks are identified and addressed.  
Scoping – reviewing baseline security controls and selecting only 
those controls that apply to the IT system you’re trying to protect. 
Tailoring – modifying the list of security controls within a baseline 
so that they align with the mission of the organization. 
Supplementation – adding assessment procedures or 
assessment details to adequately meet the risk management 
needs of the organization. 
 
Link vs. End to End Encryption (174) 
Link - is usually point to point EVERYTHING ENCRYPTED 
“Black pipe, black oil, black ping pong balls” all data is encrypted, 
normally did by service providers 
End to End – You can see ALL BUT PAYLOAD, normally done by 
users 
YOU CAN LAYER THESE ENCRYPTION TYPES 
Email is not secured unless encrypted 
NETSCAPE INVENTED SSL, SSLv3 still used 
USE TLSv1.2 now for test 
PGP = GnuPG (GNP)– not rely on open  
S/MIME – secure email 
Nice to Know    
Classifying Costs – cost are not a factor in classifying data but 
are in controls 
FTP and Telnet are unencrypted! SFTP and SSH provide 
encryption to protect data and credentials that are used to log in 
Record Retention Policies – how long data retained and 
maintained 
Removable Media – use strong encryption, like AES256, to 
ensure loss of media does not result in data breach 
Personnel Retention – Deals with the knowledge that employees 
gain while employed.  
Record Retention – retaining and maintaining information for as 
long as it’s needed 
Label Data – to make sure data is identifiable by its classification 
level. Some label all media that contains data to prevent reuse of 
Public media for sensitive data. 
Data in RAM is Data in use. 
CIS – Center for Internet Security; creates list of security controls 
for OS, mobile, server, and network devices 
Standards Selection (158 - 185) 
NIST – National Institute of Standards and Technology 
NIST SP 800 series -  address computer security in a variety of 
areas 
800-14 NIST SP – GAPP for securing information technology 
systems 
800-18 NIST – How to develop security plans 
800-27 NIST SP - Baseline for achieving security, five lifecycle 
planning phases (defined in 800-14), 33 IT security principles 
- 
- 
- 
- 
- 
Initiation 
Development/Acquisition 
Implementation 
Operation/Maintenance 
Disposal 
800-88 - NIST guidelines for sanitation and disposition, prevents 
data remanence 
800-122 - NIST Special Publication – defines PII as any 
information that can be used to trace a person identity such as 
SSN, name, DOB, place of birth, mother’s maiden name 
800-137 - build/implement info security continuous monitoring 
program: define, establish, implement, analyze and report,  
800-145 - cloud computing 
FIPS – Federal Information Processing Standards; official series of 
publications relating to standards and guidelines adopted under the 
FISMA, Federal Information Security Management Act of 2002. 
FIPS 199 – Standards for categorizing information and information 
systems. 
FIPS 200 – minimum security requirements for Federal information 
and information systems 
DOD 8510.01 – establishes DIACAP 
ISO 15288 – International systems engineering standard covering 
processes and life cycle stages 
- 
- 
- 
- 
Agreement 
Organization Project-enabling 
Technical Management 
Technical 
 
Nice to Know    
COPPA – California Online Privacy Protection Act, operators of 
commercial websites post a privacy policy if collecting personal 
information on CA residents 
Curie Temperature – Critical point where a material’s intrinsic 
magnetic alignment changes direction. 
Dar – Data at rest; inactive data that is physically stored, not RAM, 
biggest threat is a data breach, full disk encryption protects it 
(Microsoft Bitlocker and Microsoft EFS, which use AES, are  apps) 
DLP – Data Loss/Leakage Prevention, use labels to determine the 
appropriate control to apply to data. Won’t modify labels in real-
time. 
ECM – Enterprise Content Management; centrally managed and 
controlled 
Non-disclosure Agreement – legal agreement that prevents 
employees from sharing proprietary information  
PCI-DSS – Payment and Card Industry – Security Standards 
Council; credit cards, provides a set of security controls /standards 
Watermark – embedded data to help ID owner of a file, digitally 
label data and can be used to indicate ownership. 
 
 
Systems Engineering & Modeling (194) 
Common Criteria ISO 15408 - Structured methodology for 
documenting security requirements, documenting and 
validating **** 
A SECURITY PRODUCT MAY BE CERTIFIED 
Defines a protection profile that specifies the security 
requirements and protections of a product that is to be evaluated. 
Organized around TCB entities. Evaluation Assurance Levels 
(EAL)   
  
EAL0 –Inadequate assurance  
EAL1 –Functionally tested  
EAL2 –Structurally tested  
EAL3 –Methodically tested and checked  
EAL4 –Methodically designed, tested and reviewed  
EAL5 –Semi formally designed and tested  
EAL6 –Semi formally verified design and tested  
EAL7 –Formally verified design and tested  
- 
- 
- 
- 
- 
- 
- 
- 
 
Target of Evaluation (TOE):  the product  
  
Protection Profile (PP): set of security requirements for a category 
of products that meet specific consumer security needs 
  
Security Target (ST): identifies the security properties of TOE  
  
Security  Functional  Requirements  (SFRs):  Specific  individual 
security functions  
 
Engineering Principles for IT Security (194) 
NIST SP 800-27 
 
 
 
Initiation; need expressed, purpose documented, impact 
assessment 
Development/Acquisition; system designed, purchased, 
programmed, developed or constructed. 
Implementation; system tested and installed, certification 
and accreditation 
  Operation/Maintenance; performs function, security 
operations, audits 
Disposal; disposition of information, HW and SW 
 
Physical controls are your first line of defense, and people are 
your last. 
 
ISO/IEC 21827:2008 SSE-CMM (Maturity Model) 
(196) 
 
BIGGEST JUMP IN MATURITY MODEL? 2 – 3. FROM 
REACTIVE TO PROACTIVE 
 
 OS Kernel () 
Loads & runs binary programs, schedules task swapping, 
allocates memory & tracks physical location of files on computers 
hard disk, manages IO/OP requests from software, & translates 
them into instructions for CPU 
 Common System Components (198) 
Primary Storage – is a temporary storage area for data entering  
and leaving the CPU   
Random Access Memory (RAM) – is a temporary holding place 
for data used by the operating systems.  It is volatile; meaning if it 
is turned off the data will be lost.  Two types of RAM are dynamic 
and static.  Dynamic RAM needs to be refreshed from time to time 
or the data will be lost. Static RAM does not need to be refreshed.  
Read-Only Memory (ROM) – is non-volatile, which means when a 
computer is turned off the data is not lost; for the most part ROM 
cannot be altered.  ROM is sometimes referred to as firmware. 
Erasable and Programmable Read-Only Memory (EPROM) is non-
volatile like ROM, however EPROM can be altered.   
Process states:  
Stopped; process finishes or must be terminated 
- 
-  Waiting; the process is ready for continued execution but 
is waiting for a device or access request 
Running; executes on the CPU and keeps going until it 
finishes, its time slice expires, or it is blocked  
Ready;  process prepared to execute when CPU ready 
- 
- 
Multitasking – execute more than one task at the same 
time  
Multiprocessing – more than one CPU is involved.  
Multi-Threading: execute different parts of a program 
simultaneously   
Single state machine – operates in the security environment at 
the  
highest level of classification of the information within the 
computer. In other words, all users on that system must have 
clearance to access the info on that system.   
Multi-state machine – can offer several security levels without risk 
of compromising the system’s integrity.   
CICS – complex instructions. Many operations per instruction. Less 
number of fetches  
RISC – reduced instructions. Simpler operations per instruction. 
More fetches.  
Software  
1 GL: machine language (used directly by a computer)  
2GL: assembler  
3GL: FORTRAN. Basic pl/1 and C++  
4GL: Natural / focus and SQL  
5GL: Prolog, lisp artificial intelligence languages based on logic  
 
 Memory Protection (200) 
Segmentation – dividing a computer’s memory into segments. 
Protection Keying – Numerical values, Divides physical memory 
up into particular sized blocks, each of which has an associated 
numerical value called a protection key. 
Paging – divides memory address space into even size blocks 
called pages. To emulate that we have more RAM than we have. 
SYSTEM KERNAL KNOWS THE LOCATION OF THE PAGE FILE 
DEP, Data Execution Prevention – a system-level 
memory protection feature that is built into the OS 
DEP prevents code from being run from data pages 
such as the default heap, stacks, and memory pools.  
ITIL (208) 
The ITIL Core includes five publications addressing the overall life 
cycle of systems. ITIL as a whole identifies best practices that an 
organization can adopt to increase overall availability, and the 
Service Transition publication addresses configuration 
management and change management processes. 
- 
- 
- 
- 
- 
Service Strategy 
Service Design 
Service Transition 
Service Operations 
Continuous Service Improvement 
Types of Security Models (210) 
Defining allowed interactions between subjects (active parties) and 
objects (passive parties) at a particular moment in time. 
State Machine Model – describes a system that is always secure 
no matter what state it is in. If all aspects of a state meet the 
requirements of the security policy, that state is considered 
secure. A transition occurs when accepting input or producing 
output. A transition always results in a new state (also called a 
state transition). A secure state machine model system always 
boots into a secure state, maintains a secure state across all 
transitions, and allows subjects to access resources only in a 
secure manner compliant with the security policy.  
Information Flow Model – focuses on the flow of information. 
Information flow models are based on a state machine model. The 
Bell-LaPadula and Biba models are both information flow models. 
Information flow models don’t necessarily deal with only the 
direction of information flow; they can also address the type of 
flow. Information flow models are designed to prevent 
unauthorized, insecure, or restricted information flow, often 
between different levels of security (these are often referred to as 
multilevel models). The information flow model also addresses 
covert channels by specifically excluding all non-defined flow 
pathways. 
Noninterference Model – is loosely based on the information flow 
model. However, instead of being concerned about the flow of 
information, the noninterference model is concerned with how the 
actions of a subject at a higher security level affect the system 
state or the actions of a subject at a lower security level. Basically, 
the actions of subject A (high) should not affect the actions of 
subject B (low) or even be noticed by subject B. The 
noninterference model can be imposed to provide a form of 
protection against damage caused by malicious programs such as 
Trojan horses.      Southerland Model 
 Techniques for Ensuring CIA 
Confinement – to restrict the actions of a program. Simply put, 
process confinement allows a process to read from and write to 
only certain memory locations and resources. This is also known 
as sandboxing. 
Bounds – a process consist of limits set on the memory addresses 
and resources it can access. The bounds state the area within 
which a process is confined or contained. 
Isolation – When a process is confined through enforcing access 
bounds that process runs in isolation. Process isolation ensures 
that any behavior will affect only the memory and resources 
associated with the isolated process. 
Models (211) 
MATRIX  
- 
- 
- 
- 
- 
Provides access rights to subjects for objects  
Access rights are read, write and execute  
Columns are ACL’s  
Rows are capability lists  
Supports discretionary access control   
BELL-LAPADULA = MAC  SUBJECTS/OBJECTS/CLEARANCES/ 
- 
- 
- 
- 
- 
- 
- 
- 
- 
- 
Confidentiality model   
developed by DOD, thus classification  
Cannot read up (simple e=read security rule)  
Cannot write down (* property rule AKA CONFINEMENT 
PROPERTY). Exception is a trusted subject.  
Uses access matrix to specify discretionary access control  
Use need to know principle  
Strong star rule: read and write capabilities at the same 
level  
First mathematical model defined  
tranquility principle in Bell-LaPadula prevents security 
level of subjects from being changed once they are created 
Bell-LaPadula is concerned with preventing information flow 
from a high security level to a low security level.  
 
BIBA – MAC “if I in it INTEGRITY MODEL” 
Models (211) (cont) 
Graham-Denning  
- 
focused on relationship between subjects and objects 
 
TAKE-GRANT  
- 
- 
uses a direct graph to specify the rights that subjects can 
transfer to objects or that subjects can take from other 
subjects  
Uses STATES and STATE TRANSTIONS  
 
- 
- 
- 
- 
- 
- 
- 
- 
Integrity model   
Cannot read down (simple e=read integrity rule)  
Simple integrity property 
cannot write up (* integrity)  
lattice based (least upper bound, greatest lower bound, flow 
policy)  
subject at one level of integrity cant invoke subject at a 
higher level of integrity  
Biba is concerned with preventing information flow from a 
low security level to a high security level.  
Focus on protecting objects from external threat 
 CLARK WILSON  
integrity model  
Cannot be tampered, logged, and consistency  
Enforces segregation of duty  
Requires auditing  
Commercial use  
- 
- 
- 
- 
- 
-  Works with SCI Constrained Data items, data item whose 
- 
- 
integrity is to be preserved  
Access to objects only through programs  
An integrity verification procedure (IVP) is a procedure that 
scans data items and confirms their integrity. 
 
Information flow model  
- 
Each object is assigned a security class and value, and 
information is constrained to flow in the directions that are 
permitted by the security policy. Thus flow of information 
from one security level to another. (Bell & Biba) 
Brewer and Nash  
- 
The Chinese Wall model provides a dynamic access 
control depending on user’s previous actions. This model 
prevents conflict of interests from members of the same 
organization to look at information that creates a conflict of 
another member of that organization.   
  
Lipner Model – Confidentiality and Integrity, BLP + Biba 
                 1st Commercial Model 
 
 
Composition Theories 
Some other models that fall into the information flow category build on 
the notion of how inputs and outputs between multiple systems relate 
to one another— which follows how information flows between 
systems rather than within an individual system. These are called 
composition theories because they explain how outputs from one 
system relate to inputs to another system.  
There are three recognized types of composition theories:  
- 
- 
- 
Cascading: Input for one system comes from the output of 
another system. 
Feedback: One system provides input to another system, 
which reciprocates by reversing those roles (so that system 
A first provides input for system B and then system B 
provides input to system A).  
Hookup: One system sends input to another system but 
also sends input to external entities. 
MAC – Subjects are labelled as to their level of clearance. Objects are 
labelled as to their level of classification or sensitivity.  
Subjects – Users(perform work task), Data Owners(protect data), and 
Data Custodians (classify and protect data) 
 
ITSEC (216) 
- 
- 
- 
refers to any system being evaluated as a target of 
evaluation (TOE). 
does not rely on the notion of a TCB, and it doesn’t require 
that a system’s security components be isolated within a 
TCB.  
includes coverage for maintaining targets of evaluation after 
changes occur without requiring a new formal evaluation. 
Certification and Accreditation (216) 
Certification – is evaluation of security features and safeguards if 
it meets requirements. Certification is the comprehensive 
evaluation of the technical and nontechnical security features of an 
IT system and other safeguards made in support of the 
accreditation process to establish the extent to which a particular 
design and implementation meets a set of specified security 
requirements. 
Accreditation – the formal declaration by the designated 
approving authority (DAA) that an IT system is approved to operate 
in a particular security mode using a prescribed set of safeguards 
at an acceptable level of risk. Once accreditation is performed, 
management can formally accept the adequacy of the overall 
security performance of an evaluated system. 
System accreditation – a major application or general support 
system is evaluated. 
Site accreditation – the applications and systems at a specific, 
self-contained location are evaluated.  
Type accreditation – an application or system that is distributed to 
a number of different locations is evaluated. 
Product Evaluation Models (216) 
Trusted Computer System Evaluation Criteria   
TCSEC: (Orange book) From the U.S. DoD, it evaluates operating 
systems, application and systems. It doesn’t touch the network 
part. It only addresses confidentiality!     
ITSEC  TCSEC  Explanation 
1 
2 
3 
4 
5 
6 
7 
D 
C1 
C2 
B1 
B2 
B3 
A 
 minimal protection, any systems that fails 
higher levels   
DAC; (identification, authentication, 
resource protection). 
DAC; Controlled access protection (object 
reuse, protect audit trail).   
MAC; (security labels) based on Bell 
LaPadula security model. Labeled security 
(process isolation, devices 
MAC; Structured protection (trusted path, 
covert channel analysis). Separate 
operator/admin roles. Configuration 
management  
MAC; security domain (trusted recovery, 
Monitor event and notification).   
MAC; Formal, verified protection 
Operational assurance requirements for TCSEC are:  
- 
- 
- 
- 
- 
System Architecture  
System Integrity  
Covert Channel analysis  
Trusted Facility Management  
Trusted recovery  
Rainbow series:   
Red = trusted network,  Orange = TCSEC evaluation  
Brown = trusted facilities management 
dcsmmmTan = audit, Aqua = glossary.   
Green = password management  
Information Technology Security Evaluation Criteria    
ITSEC: it is used in Europe only, not USA. Addresses CIA. Unlike 
TCSEC it evaluates functionality and assurance separately. 
Assurance from E0 to E6 (highest) and F1 to F10 (highest). 
Therefore a system can provide low assurance and high 
functionality or vice-versa.