Security + - Risk Management

Description

Primeiro modulo do curso Udemy
Maicon Alencar
Mind Map by Maicon Alencar, updated more than 1 year ago
Maicon Alencar
Created by Maicon Alencar almost 5 years ago
11
0

Resource summary

Security + - Risk Management
  1. Aula 2 - The CIA - Confidentiality, integrity, Availability
    1. Objetivos da Segurança da Informação
      1. THE CIA // O CID
        1. Confidencialidade
          1. Visualização / manuseio de dados
            1. Manter os dados secretos de quem não precisa acessá-los
          2. Integridade
            1. Enviar / Transmitir / Receber / Guardar
              1. Nenhuma alteração/deleção sem autorização pode ocorrer
            2. Disponibilidade
              1. Garantir que informaçao esteja disponivel
                1. Acesso de um usuário autorizado
              2. Complementar o CID
                1. Accountability & Audition
                  1. Logging
                    1. Quem acessou esse arquivo?
                      1. Quem fez esta alteração?
                    2. Non Repudiation
                      1. Usuario
                        1. Não pode negar que fez tal ação. Ele não pode apagar rastros
                2. Quick Review
                  1. The goal of security is Defined as CIA
                    1. CIA stands for confidentiality, integrity, and availability
                      1. Dont forget auditing, accountability and non-repudiation
                3. Aula 3 - Threat Actors
                  1. Attributes
                    1. Internal? / External?
                      1. What is the intention? What's the goal?
                        1. How Sophisticated is? More sophisticated = more dangerous
                          1. Using open user inteligence? It means, facebook, twitter, shodan, etc etc
                          2. Types of Threat Actors
                            1. Script kiddies
                              1. easily blocked
                                1. Dont have sophistication
                                  1. Use Pre-made tools
                                    1. Trivial attack knowledge
                                    2. Hacktivist
                                      1. Motivation/intent/ ideology
                                      2. Organized crime
                                        1. Group of people working togetter
                                          1. money
                                        2. Nation States / Advanced Persistent Threat (APT)
                                          1. probably the biggest issue
                                            1. Big resources
                                              1. Big sophistication
                                                1. between governments
                                                2. Insiders
                                                  1. somebody who is in the structure of company
                                                    1. not always an employee
                                                    2. has access to information
                                                      1. who can access asset
                                                      2. Competitors
                                                        1. between organizations
                                                          1. Its like coca cola vs pepsi
                                                          2. less common today
                                                      3. Aula 4 - What is Risk?
                                                        1. Assets
                                                          1. Computers
                                                            1. equipments
                                                              1. plants
                                                                1. people
                                                                  1. intangible things
                                                                  2. Vulnerabilities
                                                                    1. weakness to an asset
                                                                      1. leaves it open to bad things happening to it
                                                                        1. example
                                                                          1. default user name in a server
                                                                            1. server room unlocked
                                                                              1. garbage in street with confidential data
                                                                        2. Threats
                                                                          1. Action
                                                                            1. Negative event that exploits a vulnerability
                                                                              1. Example
                                                                                1. someone reads the garbage
                                                                                  1. someone unauthorized running into your server room
                                                                                    1. someone unauthorized get access to your server
                                                                              2. method to Protect our stuff from bad things
                                                                                1. Likelihood
                                                                                  1. The level of certainty (certeza) that something will happen
                                                                                    1. two ways to measure
                                                                                      1. Quantitative likelihood
                                                                                        1. numbers, statistics, historic
                                                                                          1. your power supply have a MTBF of 100 000 hours
                                                                                        2. Qualitative likelihood
                                                                                          1. things that its so hard put numbers to measure
                                                                                            1. customer loyalty (lealdade de cliente)
                                                                                    2. Impact
                                                                                      1. The harm caused by a threat
                                                                                        1. measurements
                                                                                          1. quantitative
                                                                                            1. cost
                                                                                            2. labor (trabalho)
                                                                                              1. people work hours lost
                                                                                              2. time
                                                                                                1. how is the ETR?
                                                                                                2. qualitative
                                                                                                  1. corporate reputation
                                                                                            3. Guide for risk management
                                                                                              1. N1ST SP 800-300
                                                                                              2. quick review
                                                                                                1. Threats exploit vulnerabilities to harm assets
                                                                                                  1. assets can have vulnerabilities
                                                                                                    1. use SP 800-30 as part of risk assessment
                                                                                                  Show full summary Hide full summary

                                                                                                  Similar

                                                                                                  CET_TARDE - Security Fundamentals 2017 - Part 2
                                                                                                  Hawerth Castro
                                                                                                  CET_TARDE - Security Fundamentals 2017 - Preparing for the certified
                                                                                                  Hawerth Castro
                                                                                                  ARKAN SYSTEM
                                                                                                  rafael.harada
                                                                                                  CET_TARDE - Security Fundamentals 2017 - Part 1
                                                                                                  Hawerth Castro
                                                                                                  Princípios Básicoda Segurança daInformação (DICA)
                                                                                                  Shark costa
                                                                                                  Categorias
                                                                                                  Alisson Campelo
                                                                                                  Security Plus
                                                                                                  celoramires
                                                                                                  ATI - Accountability and Talent Improvement
                                                                                                  Leandro de Oliveira
                                                                                                  GOVERNABILIDADE E ACCOUNTABILITY
                                                                                                  Tyson Gonçalves Silva
                                                                                                  (1) Obtenção de Informações
                                                                                                  Rafael Silva
                                                                                                  CET_TARDE - Security Fundamentals 2017 - Part 3
                                                                                                  Hawerth Castro