0% found this document useful (0 votes)
95 views7 pages

CISA Class Overview and Project Management Insights

The document discusses various types of changes that can occur over the lifecycle of a hardware or software product, including depreciation and software acquisitions. It also discusses different project organization structures like matrix-based, pure project, and influence-based structures. Finally, it provides examples of different types of software projects, audits, and testing methods like integration testing and regression testing.

Uploaded by

Chitij Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views7 pages

CISA Class Overview and Project Management Insights

The document discusses various types of changes that can occur over the lifecycle of a hardware or software product, including depreciation and software acquisitions. It also discusses different project organization structures like matrix-based, pure project, and influence-based structures. Finally, it provides examples of different types of software projects, audits, and testing methods like integration testing and regression testing.

Uploaded by

Chitij Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 7

What are kind of changes we can encounter during the life cycle of a product either

hardware or software /

1. Depreciation

( In IT When does really the slack happen and when does the value or cost of the
product peaks up )

2018 --Jan

Invested in a Huge Server

Data Ingestion has to place on this server , followed by conversion of entire raw
data set into processed data

( timeline 6 -12 months)

2019 -- Jan -- Business Users have started using Data Warehouse Environment

2020 -- Jan -- Reached Full Throttle

2021 -- Jan ( Purging a lot of data)

2022 - Jan and by 2023 - Jan

2. Software Acquisitions

Matrix Based Project Organization Structure

Alignment of REsources lies with the PRoject Manager

Your company has three different verticals

Financial Services

HealthCare Services

Telecom Services

Potential customer : Oil and Gas Industry : CAirns Oil Limited.

Solution Architects / Enteprise Architect

Refer to a Domain Expert : as a external consultant ( fundamental background of oil


and gas sector)

Project Manager

Matrix Based Organization -- Difference the reporting structure is such that a


given person working on project
could be reporting to two or more people.
Pure Project Organization -- Classic reporting Structure

Example -- MArketing Department whereby the Vice President of Marketing is the


overall lead

Marketing Manager , Business Development Leads , Business development Associates ,


Business Development Interns

In a pure project organization the reporting structure is well laid out but in
practice how the tasks are laid out
could be poor.

Influence Based Project Organization -- The reporting structure will get formed /
changed depending on the project
requirements.

1. Project Initiation ---

1. Quality Auditor 2.Systems Auditor

Construction Company --- System Auditor ---

Software --- 1. Quality Auditor -- 2. IT Auditor --

Where the Questionnaires / Templates

1. Third Party Risk Management

Whom should I choose for an audit ?

CERT-IN auditor.

1. CREST Certified Consultant

2. Hitrust Certified Assessor

3. Shared Asssessments : CTPRA

4. NIST Certified Practitioner

5. Open FAIR

6. CAP

Auditors

1. IOT
2. Cryptocurrency
3. Metaverse

Developing a software. Software Size ? How do you estimate the cost of the software
?

1 million lines of code in my software ? Software is built on COBOL language ?

1 million USD ?

C++ code 50,000 . Software Complexity

Project

1.A -- 1 month to complete == 5 months 4

2.B -- 6 months to complete -- 6 resources

3.C -- 4 months to complete -- 4 resources =2 month 4

4.D -- 2 months to complete Slack Time -4 ho 2

13 months

Critical Path Methodology -- Activity B takes the longest which is 6 months -- 6


resources

10 resources in a projecy

Focal Area in CPM is the activity which takes the longest time

PERT

Optimistic ( Best)

Pessimistic ( Worst)

Normal ( Most Likely)

Activities in a project could be dependent on other activities of the project.

RAD -- Rapid Application Development

Revenue Management Software -- Castle Resorts and Hotel based in NZ and Hawaii

Object Oriented system development -- Aviation Industry

Inflight Entertainment system

1.Airbus 2. Boeing 3. Embraer

Any company which provides inflight entertainment software will want to have the
same software rolled out on different kind of planes.

Kali Linux
Variant of RedhAt Linux known as CentOS

MySQl : Oracle purchased SunMicrosystems in 2009

Storage Technology

Downloading the content from internet

1. Data Mirroring

2. Data Striping -- Distributing data in equal proportion across all set of


available disks.

If you want to increase write performance and at the same time get fault tolerance
you need to sued both data mirroring and striping techniques

Combine mirroring and striping technique

Parity Bit allows you to reconstruct data

Partity Bit with metadata

1234567
2346715

Integration testing -- Testing the interdependence of two or modules

Regression Testing -- We have gone a Oracle DB upgrade from Version 11 to Version


12

There was a realization that a core of SQL statement for the application were
failing.( Regressed SQLs scenario)

Rollback the functionality to the previous version to make that business related
SQL statements are working correctly.

Pilot Testing - Conduct a POC to test a new feature or requirement

Parallel Testing -- ERP application Like Peoplesoft , Oracle EBusiness Suite or


SAP We have upgraded the SAP application environment

For some time period you will let the old system continue to run along with the
newly upgraded SAP system.It is decided to run this feature upto a month's
timeframe.

Domain 5 - Notes

Physical Controls : Fencing , Bollards


System Access Rights : How frequently are these access rights reviewed ? What about
any kind of policy there for Privileged Access ?

Logging : Auditing Server / web applications / databases

You will be auditing for privileged acceess ? Where are logs getting stored ? IF
logs are getting locally on the server , it is an area of non compliance
because administrators can manipulate the log files.

ls -ltrh alert.log - SHUTDOWN comamnd with timestamp in Oracle .

touch -t - Allows you to modify the timestamp of a file

sar, vmstat mpi

ls -ltrh alert.txt

If the logging process was centralized and kept in a syslog server in a remote
location , an admin can do no manipulation.An admin can only have read only access
on syslog server.

FIM -- File Integrity Monitoring software -- Tripwire

NCSC -- Incident Response

UEBA - User Entity Behavior Analytics

Type 1 -- something that you know : password

Type 2- - something that you have : OTP

Type 3 -- something that you are : retina / IRIS , Thum impression

SASE - Secure Access Service Edge -- Controlling the WAN layer at the end of your
ISP and at the start of target ISP.

The moment your ISP line you ends you enter a private backbone networks and it
continues to be ther till you reach the closest ISP of your target system

DLP + next gen firewall + next gen AV + IDS / IPS

Amalgamation of your WAN networking / Security Policies / Controls in one single


package.

Problems with WEP , WPA , WPA2


WEP -- 2 forms of authentication OSA- Open system authentication , PSK - Preshared
Key -- Always static ( 1st problem)

IV - Initialization Vector Salting

104 bit value 40 bits were reserved rest 64 bit were used as IV -- IV is a
random value

f(Plain Data) = Encrypted Data

key(function f contains = 40 bit string XOR 64 bit value IV Value) = Encrypted


Data ( Value)

IV Value Kept repeating at regular intervals : After 100 random IV values your IV
value started repeating : Hackers were able to figure that IV values were
repeating

WPA -- TKIP - Temporal Key Integrity Protocol -- Static KEy value was removed.WPA
could be cracked.

WPA2 : AES Advanced Encryption Standard.

Bastion Host is a hardened operating system designed to withstand cyber attacks

1. Screened Host Firewall - EXternal Network , 1 single packet fltering router ,


Bastion Host with single interface connected to the internal network

2. Dual Homed Firewall - EXternal Network , 1 single packet fltering router ,


Bastion Host with two network interface out of which the second network
inferfacconnected to the internal network
interface connected to your internal network

3. DMZ ( Screened subnet Firewall_

Open source IDS/IPS systems -- Snort and Suricata

1. Host Level 2. Network Level

1. Signature 2. Statistical or Anomaly

Bastion Host is a hardened security system whereas A Honeypot is counter opposite


of BH and it is a system that is deliberately designed as vulnerable system.

Asymmetric encryption

A = A public key and A private key

B = b public key and B private key


Before data exchange takes place between A and B both parties will exchange each
other's public key with the other party.

Scenario becomes now like this

A = A public key , A private key , B public key

B = b public key and B private key , A public key

Why are we exchaning each other public key

Case 1 : When A is sender B is receiver : A will encrypt the data using B public
key and send data to B.B receives data in encrypted data and thereby decrypts

the data using his own private key

Case 2 : When B is sender and A is receiver - Here B will encrypt data using A
public key and send data to A in encrypted format.A on receiving encrypted
data decrypts the data using A's own private key

You might also like