CRISC

Course
Time
6 hours 30 minutes
Difficulty
Advanced
CEU/CPE
7

Video Transcription

00:02
since we're specifically focusing in this course on risk and information system controls, let's go ahead and look at some information security basics just to make sure that we're all on the same page. So when we talk about the goals of information, security were always looking at three main elements.
00:21
Confidentiality, integrity and availability.
00:25
It's a matter of fact. Sometimes you'll hear this referred to as the security triad,
00:30
confidentiality, integrity and availability.
00:34
So when we're looking at confidentiality, excuse me when we're looking confidentiality we're looking to prevent against unauthorized disclosure of information,
00:46
unauthorized disclosure of information. I want to keep my secret secret,
00:52
and some threats would be against confidentiality. Probably the biggest one today is social engineering. Social engineering is at the core of most of the major compromises you hear whether it's tricking someone into giving out more information than they should on the phone,
01:10
persuading them to click on a link on an email,
01:11
go to a certain sighting in her passwords, right social engineering starts and really is the key element in most attacks on confidentiality. It's almost always the starting point.
01:29
Training our people is really our best solution to mitigate social engineering, But we can also do things like enforced separation of duties. I can't tell you information I don't know. So if you ask me the server room, you might the severing password.
01:44
I might be willing to give it to you, but I don't have it because that's not my job. Separation of beauties is helpful. We also have to enforce policies and audit those policies. Conduct assessments. I want to send out
01:57
digital emails that don't that have attachments that aren't digitally signed. Who's opening? Those that's gonna help me know where I need to focus my training as we move forward.
02:09
Media reuse is another way. Reusing thumb drives hard drives. Well, we have to have in a hardware that's properly sanitized, destroy data remnants if it's and destroy the device if it's holding highly sensitive top secret information. Otherwise Ciro's ations help,
02:30
and then we have eavesdropping. And when we talk about eavesdropping in this course, we're not talking about me listening in to your phone call. We're talking about the fact that I have a protocol analyzer connected to your network. I'm capturing traffic. I'm examining the traffic in anything in plain text. I can see. So we refer to that is sniffing,
02:50
but its proper term is eavesdropping and two ways to mitigate problems with sniffing in crypt your data
02:58
and keep sensitive information off the network altogether.
03:04
Now we have integrity, challenges and
03:07
integrity is going to give us a guarantee that information or system has not been modified. Okay, so that system, when we talk about system integrity, we're gonna make sure that our system performs as designed without introduction of any sort of
03:25
additional code or software or
03:29
manipulation off the system.
03:30
So the system runs as it should. We have system integrity, and we would talk about things like internal and external integrity. You know, the system says I had five widgets on the shelf that I should have five, which it's on the shelf internal and external consistency
03:47
now data integrity. When we get that integrity assurance, we get the insurance it hasn't been modified, hasn't been corrupted, unintentionally or maliciously modified. Later, we'll talk about those solutions, but
04:02
hashes and message digests are good ways to detect against corruption.
04:09
If we want assurance against malicious modification than a digital signatures, what's gonna be most helpful to us
04:16
all? right. And then we have our compromises of availability and our goal with availability. We want timely access to resource is
04:27
well, in order to get timely access to resource is we have to have redundant systems. We must have redundancy. So in fact, we should have redundancy, redundancy
04:38
and redundancy.
04:40
All right, we want to get rid of the single point of failure. We want fault, tolerance, and we wanted to be comprehensive.
04:46
So we want fault. Tolerance for our dad are hard drive servers, links, power, all of those different elements. We want redundancy
04:59
now. Other things that will help us in the realm of security is identity and access management.
05:05
Making sure that we have a means of guaranteeing that our users properly identify, authenticate, get authorized and audit
05:17
based on what they're, um,
05:20
function is on the network. So we do that through making sure our accounts or provisioned properly user accounts were created in the proper fashion. As redundantly as I won't say is, we're definitely but reducing redundancy. So I'll create a user account, one location, and I'd like that user account
05:41
to be replicated
05:43
to my other identity servers.
05:46
Then what's a user has an account.
05:47
They try to access a resource in their challenge to provide their identity and authentication.
05:55
Their identity makes a claim. So often a user name is your identity. I claim to be admitted,
06:01
and then authentication is proving it. And I may have to prove that with smart card, I may have to prove it with a password with biometrics. Whatever proof is chosen and we really want multi factor authentication something you know in something you have something you have in something, you are something you are in something you know.
06:23
We want to choose
06:24
multiple types of authentication
06:27
than authorization. What rights and permissions air you allowed to do based on your identity.
06:32
And then, of course, we want auditing so that we can track activities to users, and we get that accountability
06:41
And then last but not least, when I'm ready to leave the organization, I need my account de provisions. We always make sure those credentials air revoked after someone leaves the organization.
06:55
Non repudiation is another security concern with non repudiation. It's actually easier for me to tell you well know non repudiation means that a user can't dispute having sent a message nor the contents of the message. So I'm just using this for email, so I can't say, Oh, I didn't send that message.
07:15
But I also can't say, Well, I sent the message, but it's been changed in transit,
07:19
so we want assurance of authenticity and an assurance of integrity. The two of those give us not repudiation.
07:30
Classifications of data is another way that we protect our information by labeling the degree of value that the asset has. So when we use classification, we can use that for the military and use top secret Secret confidential. Or we can use classification in business and
07:49
confidential and private and so on.
07:53
But which ever form of classification we use. When we classify, we think about the three C's cost classify control
08:03
cost. What's the value of the assets?
08:05
Classify it based on predetermined criteria that reflect the value of the dad.
08:13
Okay, so I figure out what it's worth and then my organization have had should have standards for different value data, how they should be classified.
08:22
My organization should also have standards for based on the classification, what controls are applied to the death,
08:30
so figure out its cost classified accordingly and put security controls in place accordingly as well

Up Next

CRISC

This course on Certified in Risk and Information Systems Control is for IT and business professionals who develop and maintain information system controls, and whose job revolves around security operations and compliance.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor