CISSP Session 04
CISSP Session 04
the CISSP
Bootcamp
Your instructor:
Michael J Shannon
CISSP #42221 / #524169,
CCNP-Security, PCNSE7,
AWS Certified Security – Specialty, Class will begin at 10:00
OpenFAIR, and A.M. Central Standard
ITIL 4 Managing Professional Time (CST)
• Connected token
• Must be connected/inserted into computer
• Automatically transmits authentication data
once connected
• Contactless token
• Needs to be near the computer
• Bluetooth/NFC
• Mobile device tokens
• TOTP Software installed on phone
Authentication Smart
Cards
• Contains authentication information
credentials in an encrypted form
• Smart cards
• Contact or contactless
• Contains a microprocessor chip
• Memory cards
• Like a smart card but no microprocessor
• Key cards
• Contact-based
• Contains magnetic strip that holds
information
Fingerprint Identification
Biometric
• Fingerprints remain constant throughout life
MFA • In over 140 years of fingerprint comparison worldwide, no two
fingerprints have ever been found to be alike, not even those of
identical twins
• Fingerprint identification involves comparing the pattern of
ridges and furrows on the fingertips, as well as the minutiae
points of a specimen print with a database of prints on file
• Good fingerprint scanners have been installed in pads. Phones,
and PDAs so the scanner technology is also easy
• This solution might not be suitable in industrial applications
since it requires clean hands
Facial Recognition
Biometric
• Face recognition is one of the most flexible as it functions even
MFA when the subject is unaware of being scanned
• The fastest growing and prevalent form of identification
• It offers the ability to search through masses of people who
spend only seconds in front of a facial scanner (a digital camera)
• Face recognition systems work by methodically analyzing explicit
features that are common to every person’s face:
• The distance between the eyes
• Width of the nose
• Position of cheekbones, jaw line, chin and so forth
• These numerical quantities are then combined into a single code
that uniquely identifies each person
Hand Geometry
Biometric
• Hand geometry readers work in harsh environments
MFA • They do not require clean conditions and forms a very
small dataset
• It is not regarded as an intrusive kind of test
• It is often the authentication method of choice in industrial
environments
Ocular Recognition
Biometric
• Retina scan
MFA • There is no known way to replicate a retina as the pattern of the
blood vessels at the back of the eye is unique and stays the same
for a lifetime
• It requires about 15 seconds of careful concentration to take a
good scan
• Retina scan remains a standard in military and government
installations
• Iris scan
• An iris scan also offers unique biometric data that is difficult to
duplicate and stays the same for a lifetime
• The iris scan is considered more invasive that the retina scan
• Both are similarly difficult to make (especially for children or the
infirm)
Physical Signatures
Biometric
• A signature is another example of biometric data that is
MFA easy to gather
• Collecting signature data is not physically intrusive
• Digitized signatures are sometimes used, but usually have
insufficient resolution to ensure authentication
• Physical signatures are rapidly being replaced by digital
signatures with internet transactions and contracts
Voice Analysis
Biometric
• Like facial recognition, voice biometrics offers a way to
MFA authenticate identity without the subject's knowledge
• However, it is easier to fake using a tape or digital
recording combined with audio editing software
• It is very difficult to fool a trained analyst or AI system by
imitating another person's voice
Biometric
Performance
Different metrics can be used to
rate the performance of a
biometric factor
False Acceptance Rate (FAR) - the probability (usually
a percentage) that the system incorrectly authorizes a
non-authorized person, due to incorrectly matching
the biometric input with a template.
False Rejection Rate (FRR) - the probability that the
system incorrectly rejects access to an authorized
person, due to failing to match the biometric input
with a template.
Crossover Error Rate (CER) - the graph that displays
the rate where both accept and reject error rates are
equal
Exploits and Malware
• (L2) Begin with switch configuration best practices – wireless access points and controllers
• (L3) Ensure proper routing peer authentication and complete advantage of all firewall and
sensor capabilities
• Evaluate server configuration (web, e-mail, ftp, SP, and content)
• Ensure endpoint configuration focuses on least privilege access controls – privileged vs.
nonprivileged users
• Remove/disable any and all unnecessary features
• Examine all custom code
Gap Analysis
• A gap is the difference between
the implemented existing controls
and the predetermined control
objectives
• Gap analysis is the outcome of
corporate security strategy and
governance
• Current countermeasures should
be established according to the
organization's risk appetite
Gap Analysis
• Foundation for the fundamental
information security initiative
action plans and programs
• Conducted in a reusable and
repeatable method to assess and
report on efficacy of executed
controls
• Focus will be on established
metrics such as key performance
indicators (KPIs) and key goal
indicators (KGIs)
Expert Judgment
• Internal subject matter experts
• Risk register and lessons learned
(LL) database
• Historical documentation
• Compliance experts
• External expert judgment
• Third-party consultants
• Cyber insurance providers
• Legal expertise
• Internal vs. external
• In-house vs. third party
BCP
• Warm site
• A location that is set up with needed
equipment
• No configuration or resources
• Configurations need to be done and
restored
• Hot site
• Duplicate of the main site that is ready
immediately
Recovery Sites
Based on budget and size
• Exclusive site
• Only for you
• You pay the full fee to have it reserved for you
• If you need it, you have access to it
• Time-shared
• For multiple companies
• Companies share the fee to have it reserved
for them
• If one company needs it, they have access
to it
• What if both need it at the same time?
Business Continuity
Exercises
• Plan Review (Read-through)
• Tabletop
• Walkthrough (Exercise)
• Simulation
• Parallel
• Full Interruption
Backups and Restores
• Full
• Incremental
• Differential
• Snapshots
Full Backups
The main ransomware countermeasure
• Backs up everything regardless of
archive bit being set or not
• Clears the archive bit once the backup
completes
• It takes the longest to back up
• Depends on how much has to be backed
up
and DRP to • Incident response plans (IRPs) may include some business
continuity and disaster recovery initiatives
the Incident
• It involves the same level of executive management
Response support and signoff
Plan • There's a need to understand at what point the incident
triggers the BCP and/or DRP
• Groups of cyber investigators aggressively seek out threats
on a network or system – often as compliance auditors
• They attempt to quickly recognize anomalies and discover
historic patterns in data and Indicators of Compromise
(IoCs) to counter cybercriminals and mitigate threats
Hunt Teams • Team members often dig through data to fix security
problems, replicate bugs, and repair vulnerabilities in code
• Big data security analytics often generates metrics for
collecting, organizing, storing, analyzing, and visualizing
results
• Perform root-cause analysis
• Examine and determine the core reasons for any incident
or failure
• Phases: collect, record, analyze, and then recommend
Post-incident • An after-action report is any type of retroactive analysis of
a series of goal-oriented activities plans generally by the
Response originators of the exercises
• Analytical AARs have three key goals:
• Identifying problematic issues and areas for improvement
• Recommending measures to counteract challenges
• Finding "lessons learned"
Forensic
Investigation
Why perform forensics?