Part 5 and 6 Slides
Part 5 and 6 Slides
Part 5 and 6 Slides
Fundamentals
Based on Security+
Hello!
I am Abdulrahman AlDaej
2
Part 5 .
Risk Management
3
Business Partnership Agreement (BPA)
A legal agreement between partners that
establishes the terms, conditions, and
expectations of the relationship between the
partners
4
Memorandum of Understanding (MOU)
Memorandum of Agreement (MOA)
An agreement expressing a set of intended actions
between the parties with respect to some common
goal.
• Does not need to contain legally enforceable
promises but It can be based on the intent of the
parties.
5
Non-disclosure agreement (NDA)
a legal contract between at least two parties that share
with one another confidential material for certain
purposes, but wish to restrict access to or by third
parties
6
Business Impact Analysis (BIA)
7
Recovery Time Objective (RTO)
8
Recovery Point Objective (RPO)
9
10
Mean time between failures (MTBF)
The average amount of time that passes
between hardware component failures
• Used for products that can be repaired and
returned to use
• Can be predicted based on product experience or
data supplied by the manufacturer
11
Mean time To restore/repair (MTTR)
12
RISK MANAGEMENT
The process of identifying and reducing risk to a
level that is acceptable and then implementing
controls to maintain that level
13
Threat Assessment
Analysis of the threats that confront an enterprise
• generally cannot change the threat—you can only
change how it affects you
Environmental threats
• Tornado, hurricane, earthquake, severe weather
Man-made threats
• Internal threats are from employees (remove files)
• External threats are from outside the
organizations (Attackers)
14
Quantitative risk assessment
Quantitative measures give the clearest measure of
relative risk and expected return on investment
15
16
Annualized Rate of Occurrence (ARO)
How likely is it that a DDoS will hit in a year?
• Quantitative (think quantity) is expressed numerically
17
Risk response techniques
Risk-avoidance
• Stop participating in high-risk activity
Transference
• Buy some insurance
Acceptance
• A business decision;
• we’ll take the risk!
Mitigation
• Reduce the risk level
• Invest in security systems
18
Incident Response Planning
The steps an organization performs in response to
any situation determined to be abnormal in the
operation of a computer system.
19
Incident Response Process
The set of actions security personnel perform in
response to a wide range of triggering events.
Preparing
• Communication methods
• Incident handling hardware and software
• Incident analysis resources
• Documentation, network diagrams
• critical file hash values
• Clean OS and application images
• Policies needed for incident handling
20
Identification and Analysis
In this process you need to work out whether you
are dealing with an event or an incident.
Containment
Working with the business to limit the damage
caused to systems and prevent any further damage
from occurring
Eradication
Ensuring you have a clean system ready to restore.
• Reimage of a system
• a restore from a known good backup
21
Recovery
Lessons Learned
• Invite everyone affected by the incident
• Some recommendations can be applied
• to the next event
22
Part 6 .
Cryptography
23
Cryptography
• The process of converting readable data
(called plaintext) into unreadable text
Plaintext
• An unencrypted message (in the clear)
Ciphertext
• An encrypted message
Cipher
• The algorithm used to encrypt and/or
decrypt
Cryptanalysis
• The art of cracking encryptions
24
Symmetric encryption
• A single, shared key
• Encrypt with the key
• Decrypt with the same key
• If it gets out, you’ll need another key
• 128-bit or larger symmetric keys are
common
A Symmetric encryption
25
Symmetric Algorithms
AES (Advanced Encryption Standards)
• 128-, 192-, and 256-bit keys
• Used in WPA2 - Powerful wireless encryption
A Symmetric Algorithms
• Diffie-Hellman key exchange
• RSA
• PGP (Pretty Good Privacy)
26
Stream ciphers
• Used only with symmetric encryption
• Encryption is done one bit or byte at a time
• High speed, low hardware complexity
Block ciphers
• Used with Symmetric and Asymmertric
• Encrypt fixed-length groups
• Often 64-bit or 128-bit blocks
• Pad added to short blocks
• Each block is encrypted or decrypted
independently
27
Digital signatures
28
29
Data in-transit (In Motion)
• Data transmitted over the network
• Network-based protection - Firewall, IPS
• TLS (Transport Layer Security)
• IPsec (Internet Protocol Security)
Data at-rest
• Hard drive, SSD, flash drive, etc.
• Use disk encryption, database encryption
• File- or folder-level encryption
Data in use
• System RAM, CPU registers and cache
• The data is almost always decrypted
• Otherwise, you couldn’t do anything with it
30
Encrypting HTTPS traffic SSL/TLS
• Client requests secure session
• Server sends its certificate including its public key
• The client creates a symmetric key and encrypts it
with the servers public key
• The client sends the encrypted symmetric key to
the server
• The server decrypts the symmetric key using its
private key
• All of the session data from thereon is encrypted
with the symmetric key
31
Time for Testing ourselves and answering
some questions!
32