Page 922 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 922

Miscellaneous Security Control

               Characteristics


               When you’re selecting or deploying security controls for network
               communications, you need to evaluate numerous characteristics in

               light of your circumstances, capabilities, and security policy. We
               discuss these issues in the following sections.


               Transparency

               Just as the name implies, transparency is the characteristic of a
               service, security control, or access mechanism that ensures that it is

               unseen by users. Transparency is often a desirable feature for security
               controls. The more transparent a security mechanism is, the less likely
               a user will be able to circumvent it or even be aware that it exists. With
               transparency, there is a lack of direct evidence that a feature, service,
               or restriction exists, and its impact on performance is minimal.

               In some cases, transparency may need to function more as a

               configurable feature than as a permanent aspect of operation, such as
               when an administrator is troubleshooting, evaluating, or tuning a
               system’s configurations.


               Verify Integrity

               To verify the integrity of a transmission, you can use a checksum
               called a hash total. A hash function is performed on a message or a

               packet before it is sent over the communication pathway. The hash
               total obtained is added to the end of the message and is called the
               message digest. Once the message is received, the hash function is
               performed by the destination system, and the result is compared to the
               original hash total. If the two hash totals match, then there is a high
               level of certainty that the message has not been altered or corrupted
               during transmission. Hash totals are similar to cyclic redundancy

               checks (CRCs) in that they both act as integrity tools. In most secure
               transaction systems, hash functions are used to guarantee
               communication integrity.
   917   918   919   920   921   922   923   924   925   926   927