Documente Academic
Documente Profesional
Documente Cultură
Operations Security
Domain #9
Computer Operations
Threats to Operations
Disclosure
Destruction
Loss of system and network capabilities
Corruption and Modification
Theft
Espionage
Hackers/Crackers
Malicious Code
Issues
Backup Maintenance
Change workstation/location
Used to improve security
Preventive control
Can deter or mitigate undesirable actions
Detective control
Verifies whether a control has been successful
Corrective control
Used to reverse the effects of an unwanted
activity
Examples
Directive policies, standards, laws
Preventive firewalls, authentication,
access controls, antivirus software
Detective audit trails, logs, CCTV, CRC
Corrective incident handling, fire
extingiuishers
Vulnerability Testing
Things to agree upon
Goals of the assessment
Written agreement from management
Explaining testing ramifications
Understand results are just a snapshot
Steps in Testing
Reconnaissance
Obtain info either passively or actively
Sniffing, eavesdropping, ARIN, Whois, etc.
Scanning
ID systems that are running and active services
Ping sweeps and port scans
Gaining Access
Exploiting vulnerabilities to gain access
Buffer overflow, brute force
More Steps
Maintaining Access
Uploading software to ensure reentry
Trojan Horse, backdoor
Covering Tracks
Hide ones malicious activities
Delete system and application logs
Honeypots
Usually placed in DMZ
Should not be connected to internal network
Marking
Handling
Storing
Destruction
Declassification
Continuity of Operations
Fault Tolerance
Software
Hardware
Data Protection
RAID 0, 1, 5, 10
Redundant Communications
Phone, Broadband, Wireless, Satellite
Auditing
Auditing Basics
Logs, monitors, and triggers
Accountability, Compliance
Audit trails
Sampling and clipping levels
External auditors
Monitoring Tools
Warning banners
Keystroke monitoring
Traffic analysis
CCTV
More Terms
Ethical Hacking
War dialing
Radiation monitoring
Dumpster diving
Social engineering
Physical Security
Threats
Physical Damage
Theft of Assets
Interruption of Service
Disclosure of Proprietary Information
Natural Disaster
Vandalism
Terrorism
Administration Controls
Facility construction
Site management
Personnel controls
Emergency procedures
Awareness training
Technical Controls
Access controls
Alarms
CCTV/Monitors
HVAC
Power Supplies
Fire detection and suppression