PCI1C Notes
PCI1C Notes
PCI1C Notes
6 Marks
1. Phishing: A social engineer may send an email or message that looks like it is
from a legitimate source, such as a bank or credit card company, asking the
victim to provide sensitive information, such as passwords or credit card
numbers.
2. Pretexting: A social engineer may impersonate a trustworthy individual or
authority figure, such as a police officer or government official, to gain the
victim's trust and obtain sensitive information.
3. Baiting: A social engineer may leave a USB drive or other media device in a
public place, such as a coffee shop or a parking lot, with malware or other
harmful software. The victim may unknowingly take the device and plug it into
their computer, allowing the attacker to gain access to the victim's system.
4. Spear Phishing: A social engineer may target a specific individual or
organization with a personalized message, using information obtained from
social media or other sources to gain the victim's trust and obtain sensitive
information.
5. Vishing: A social engineer may use voice calls or voice messages to trick the
victim into providing sensitive information, such as bank account details, social
security numbers, or credit card numbers
A Tier 1 security policy is the top-level policy that sets the overall security
direction and goals for an organization. It establishes the framework for all
other security policies and procedures that follow. The Tier 1 security policy is
typically developed by senior management, with input from security
professionals, to ensure that security objectives align with business goals.
The Tier 1 security policy should be reviewed and updated regularly to ensure it
remains relevant and effective. It is also essential to communicate the policy to
all employees and stakeholders and ensure that they understand their role in
maintaining the security of the organization
The Tier 2 policy typically focuses on specific areas of security, such as access
control, network security, or incident response. It provides more detailed
guidance on the implementation of security controls and the procedures to
follow in case of a security incident. The Tier 2 policy may also include
technical requirements, such as the use of encryption, firewalls, or antivirus
software.
The Tier 2 policy should be consistent with the Tier 1 policy and aligned with
the organization's business goals and risk management approach. It is important
to review and update the Tier 2 policy regularly to reflect changes in the
organization's technology, business processes, or regulatory requirements.
The Tier 3 policy should be consistent with the Tier 1 and Tier 2 policies and
aligned with the organization's risk management approach. It should be
reviewed and updated regularly to reflect changes in the organization's
technology, business processes, or regulatory requirements.
The Tier 3 policy should be communicated to all technical staff and security
professionals involved in the implementation and maintenance of security
controls. It should be used as a reference for configuring and maintaining the
security infrastructure and as a basis for testing and validating the effectiveness
of security controls
Risk mitigation is an ongoing process that requires regular review and updating.
It involves identifying potential risks, assessing their likelihood and impact,
implementing controls to reduce or eliminate risks, monitoring risks, and
communicating risk information to stakeholders. The goal of risk mitigation is
to ensure that the organization can continue to operate effectively and
efficiently in the face of potential threats to its assets
1. Audit logs: Most operating systems, applications, and network devices have
logging capabilities that can be used to track system access. These logs can be
used to identify who accessed a system, what actions were performed, and when
the actions occurred. Audit logs should be reviewed regularly to detect any
unauthorized access or suspicious activity.
2. Access control reports: Access control reports provide information on who has
access to a system and what type of access they have. These reports can be used
to identify any unauthorized access or unusual patterns of access.
3. User behavior analytics (UBA): UBA tools use machine learning algorithms to
analyze user behavior and detect anomalies that may indicate unauthorized
access. UBA tools can be used to identify users who are accessing systems
outside of their normal working hours or attempting to access systems they are
not authorized to use.
4. Security information and event management (SIEM): SIEM tools collect and
analyze log data from multiple sources to detect and respond to security
incidents. SIEM tools can be used to monitor access to critical systems and
generate alerts when suspicious activity is detected.
5. Penetration testing: Penetration testing involves attempting to exploit
vulnerabilities in a system to identify weaknesses in access control. Penetration
testing can be used to identify vulnerabilities in access control and recommend
improvements.
Monitoring system access control requires a proactive approach to security.
Regular review of audit logs, access control reports, and user behavior analytics
can help identify unauthorized access and improve access control policies and
procedures. Additionally, using SIEM tools and penetration testing can help
detect vulnerabilities and recommend improvements to access control
1. Strategic Risk: This type of risk relates to the potential for losses arising from
an organization's failure to implement effective business strategies or from
external factors such as market conditions, competition, or changes in the
regulatory environment.
2. Operational Risk: This type of risk arises from the potential for losses due to
inadequate or failed internal processes, systems, or human error. Examples
include system failures, process errors, and fraud.
3. Financial Risk: This type of risk relates to potential financial losses due to
market conditions, financial instability, credit risk, or other financial factors.
4. Legal and Regulatory Risk: This type of risk relates to the potential for losses
arising from violations of laws, regulations, or contractual obligations, or from
legal action taken against an organization.
5. Reputational Risk: This type of risk relates to the potential for losses arising
from damage to an organization's reputation, brand, or image. This can be
caused by negative publicity, social media, or other factors that affect the public
perception of an organization.
6. Environmental Risk: This type of risk relates to the potential for losses arising
from environmental factors such as natural disasters, climate change, or
pollution.
7. Technology Risk: This type of risk relates to potential losses arising from the
use of technology or from technology-related failures, such as cyber-attacks,
data breaches, or system failures.
8. Human Resource Risk: This type of risk relates to potential losses arising from
the behavior of employees, such as fraud, misconduct, or breaches of
confidentiality.
There are different reasons why information may be declassified, including the
passage of time, changes in circumstances, or the need for transparency.
Declassification allows for greater access to information, which can be
beneficial for research, historical, and legal purposes.
Declassification can have both positive and negative effects. On one hand, it
allows for greater transparency and access to information, which can promote
accountability and democratic values. On the other hand, declassification can
also compromise national security by revealing sensitive information that could
be used by adversaries.
1. Authentication: Access controls are used to authenticate users and verify their
identity before granting access to computer systems, applications, and data.
Authentication mechanisms can include passwords, smart cards, biometric
devices, and other methods.
2. Authorization: Once users are authenticated, access controls are used to enforce
authorization policies and determine what resources they are allowed to access
and what actions they can perform. Access controls can restrict access to
sensitive data and prevent users from performing unauthorized actions that
could compromise the security of the system.
3. Audit trails: Access controls can be used to generate audit trails that track user
activity and provide an audit trail for forensic investigations in case of a security
incident. Audit trails can provide valuable information about who accessed what
resources, when, and from where.
4. Compliance: Access controls are a key element in meeting compliance
requirements for regulations such as HIPAA, PCI DSS, and GDPR. These
regulations require organizations to implement security controls that protect
sensitive information and ensure that only authorized personnel have access to
it.
1. Identify the activity or project: The first step in cost analysis is to identify the
activity or project that needs to be analyzed. This could include a manufacturing
process, a marketing campaign, or a software development project.
2. Define the scope: Once the activity or project has been identified, it is important
to define the scope of the cost analysis. This includes identifying the specific
costs that will be included in the analysis, such as labor, materials, equipment,
overhead, and any other relevant costs.
3. Collect data: The next step is to collect data on the costs associated with the
activity or project. This may involve gathering data from financial records,
invoices, time sheets, and other sources.
4. Analyze costs: Once the data has been collected, it is important to analyze the
costs and identify any patterns or trends. This may involve categorizing costs by
type, identifying cost drivers, and assessing the impact of different factors on
costs.
5. Evaluate alternatives: After analyzing costs, it is important to evaluate different
alternatives or options. This may involve comparing the costs and benefits of
different approaches, such as using different suppliers or production methods.
6. Make recommendations: Finally, based on the cost analysis, recommendations
can be made to improve the efficiency and effectiveness of the activity or
project. This may include identifying opportunities to reduce costs, improve
quality, or increase profitability
10 Marks:
1. Password policies: Password policies are a set of guidelines that specify the
requirements for creating and managing passwords. These policies may include
requirements such as password complexity, length, expiration, and history.
2. Access control procedures: Access control procedures define how to grant and
manage access to computer systems, applications, and data. These procedures
may include user account management, role-based access control, and multi-
factor authentication.
3. Incident response procedures: Incident response procedures provide guidelines
for responding to security incidents and breaches. These procedures may
include steps for detecting and reporting incidents, containing and mitigating
the impact, and restoring normal operations.
4. Encryption standards: Encryption standards define how data should be
encrypted to protect against unauthorized access. These standards may include
requirements for key management, algorithm selection, and encryption strength.
5. Physical security standards: Physical security standards define how to protect
physical assets, such as buildings, equipment, and data centers. These standards
may include requirements for access control, security monitoring, and
environmental controls.
6. Compliance standards: Compliance standards define how to comply with
regulatory requirements, such as HIPAA, PCI DSS, and GDPR. These standards
may include requirements for data privacy, security controls, and risk
management.
1. Threat detection: IDS can help detect potential security threats by monitoring
network or system activity for suspicious behavior. This can include detecting
attempts to exploit vulnerabilities, brute-force attacks, or unusual patterns of
traffic.
2. Incident response: When IDS detects a potential threat, it can trigger an
immediate response, such as alerting security personnel, blocking network
access, or taking other action to mitigate the threat.
3. Compliance: IDS can help organizations meet compliance requirements by
monitoring and reporting on network or system activity in real-time. This can
help identify and address potential compliance violations, such as unauthorized
access or data breaches.
4. Prevention: IDS can also help prevent security breaches by providing an early
warning of potential threats. By identifying and responding to potential threats
before they can cause harm, IDS can help minimize the impact of security
incidents
1. Threat detection: NIDS can help detect potential security threats by monitoring
network traffic for suspicious behavior. This can include detecting attempts to
exploit vulnerabilities, brute-force attacks, or unusual patterns of traffic.
2. Incident response: When NIDS detects a potential threat, it can trigger an
immediate response, such as alerting security personnel, blocking network
access, or taking other action to mitigate the threat.
3. Compliance: NIDS can help organizations meet compliance requirements by
monitoring and reporting on network activity in real-time. This can help identify
and address potential compliance violations, such as unauthorized access or data
breaches.
4. Prevention: NIDS can also help prevent security breaches by providing an early
warning of potential threats. By identifying and responding to potential threats
before they can cause harm, NIDS can help minimize the impact of security
incident
Physical security is essential for businesses and organizations of all sizes and
types. By implementing physical security measures, organizations can protect
their assets, personnel, and reputation from harm or damage caused by security
breaches. Effective physical security measures can also help organizations meet
compliance requirements, protect against liability claims, and safeguard their
intellectual property and other sensitive information
2. Integrity: Integrity is the principle that ensures that data is accurate, complete,
and trustworthy. It is essential to maintain the integrity of information, as data
can be compromised or corrupted during transmission or storage.
Example: A medical facility's patient records must be kept accurate and up-to-
date to ensure that doctors and medical staff have access to the correct
information for making diagnoses and providing treatment.
Overall, the CIA principles are important for ensuring the confidentiality,
integrity, and availability of sensitive information and data, and for protecting
against security breaches, data loss, and other types of cyber threats.
8. Why should we classify information? Explain with its stake holders, how
information is an asset
Classifying information is an important step in information security that
involves assigning a level of sensitivity or importance to different types of data.
This helps to ensure that the appropriate level of security controls is in place to
protect the data based on its classification level.
NAC provides a centralized and automated way to enforce security policies and
ensure that all endpoints comply with the organization's security requirements
before they are allowed to access the network. NAC solutions can provide a
range of security features, including endpoint compliance checks, user
authentication, device authentication, and network segmentation.
1. Enhanced Security: NAC provides an extra layer of security that can prevent
unauthorized access to a network and protect against malware attacks and other
cyber threats.
2. Improved Compliance: NAC can help organizations comply with industry and
regulatory standards by enforcing security policies and ensuring that only
compliant devices and users can access the network.
3. Increased Visibility: NAC solutions provide real-time visibility into the devices
and users that are accessing the network, which can help organizations detect
and respond to security threats more quickly.
4. Simplified Network Management: NAC can help organizations simplify
network management by automating security policy enforcement and reducing
the need for manual intervention.
5. Reduced Risk: NAC can help reduce the risk of security breaches and data loss
by ensuring that all endpoints comply with the organization's security policies
before they are granted access to the network.
11. Explain the steps in Safe Disposal of Physical Assets.
Safe disposal of physical assets is an important process that ensures that
sensitive information stored on these assets is properly destroyed or erased to
prevent unauthorized access. The following are the steps involved in safe
disposal of physical assets:
1. Identify the Assets: The first step is to identify the physical assets that need to
be disposed of. This may include computers, hard drives, mobile devices,
printers, and other electronic devices.
2. Back up Data: Before disposing of any physical asset, it is important to back up
all the data that is stored on it to ensure that no important information is lost.
3. Erase Data: The next step is to erase all the data stored on the asset. This can be
done using specialized software that overwrites the data multiple times to make
it unrecoverable.
4. Physically Destroy the Asset: Once the data has been erased, the physical asset
should be physically destroyed to ensure that it cannot be used again. This can
be done by shredding the asset, crushing it, or melting it down.
5. Secure Disposal: The final step is to dispose of the asset in a secure manner.
This may involve recycling or sending the asset to a certified e-waste disposal
company that can ensure that it is disposed of in an environmentally-friendly
manner.
The following are some of the key components of operating system access
control:
The following are some of the key components of monitoring system access
control:
1. Access Logs: Access logs are records of all access attempts and actions within a
system or network. These logs can provide valuable information for detecting
and investigating security incidents, and can also be used to monitor compliance
with security policies and regulations.
2. Intrusion Detection Systems (IDS): IDS systems are designed to detect and alert
security teams of suspicious or malicious activity within a network. IDS
systems can use various techniques, such as signature-based detection or
anomaly detection, to identify potential threats.
3. User Behavior Analytics (UBA): UBA systems analyze user behavior patterns
to identify anomalies or deviations from normal behavior. This can help to
detect insider threats or other unauthorized access attempts.
4. Real-time Monitoring: Real-time monitoring involves continuously monitoring
system access and activity in real-time, in order to detect and respond to
security incidents as they occur.
5. Automated Alerting: Automated alerting systems can be used to notify security
teams of potential security incidents, such as suspicious access attempts or
anomalies in user behavior
Disposal refers to the process of getting rid of information assets that are no
longer needed or have reached the end of their retention period. This is
important to ensure that the information does not fall into the wrong hands or
cause harm to the organization. Disposal can be done in several ways, including
physical destruction, electronic erasure, or transfer to an archive.
Proper retention and disposal of information assets are essential for information
security and privacy. Failure to manage information properly can result in data
breaches, legal and regulatory violations, and reputational damage. It is
important for organizations to have policies and procedures in place to manage
information throughout its lifecycle and ensure compliance with applicable laws
and regulations