02 Administrative Network Security Flashcards

1
Q

Why organizations need compliance:

A
  • Improves Security
  • Minimizes Losses
  • Maintain trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Regulatory Frameworks:

A
  • HIPPA
  • Sarbanes Oxley Act (SOX)
  • FISMA
  • GLBA
  • PCI-DSS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIPPA:

A

Health insurance portability and accountability act (HIPPA): doctor’s office, insurance companies, business associates, and employers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SOX:

A

Sarbanes Oxley Act (SOX): US Public company boards, management, and public accounting firms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SOX Section 302:

A
  • A mandate that requires senior management to certify the accuracy of the reported financial statement.
  • CEOS and CFOs of accounting company’s clients must sign statements verifying the completeness and accuracy of the financial reports.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SOX Section 404:

A
  • A requirement that management and auditors establish internal controls and reporting methods on the adequacy of those controls.
  • CEOS, CFPs and auditors must report on and attest to the effectiveness of internal controls for financial reporting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FISMA:

A

Federal Information Security Management act of 2002 (FISMA): All federal agencies must develop a method of protecting information systems.

It includes:

  • Standards for categorizing info systems by mission impact.
  • Standards for minimizing security requirements for information and info systems.
  • Guidance for selecting appropriate security controls for info systems.
  • Guidance for assessing security controls in information systems and determining security control effectiveness.
  • Guidance for the security authorization of information systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GLBA:

A

Gramm Leach Bliley Act (GLBA): Companies that offer financial products or services to individuals such as loans, investment advice, or insurance.

Key Points:

  • Protecting consumers personal financial information held by financial institutions and their services providers.
  • The officers and directors of the financial institution shall be subject to, and personally liable for, a civil penalty of not more than $10,000 for each violation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PCI-DSS

A

Payment Card Industry Data Security Standard (PCI-DSS): Companies handling credit card information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISO/IEC 27004:

A

Information security metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISO/IEC 27005:

A

Information security risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO/IEC 27014:

A

Information security governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISO/IEC 27016:

A

Info sec economics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISO/IEC 27032:

A

Cyber Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DMCA:

A

The digital Millennium Copyright ACT (DMCA)

Is a united states copyright law that implements two 1996 treaties of the world intellectual property organization.

Defines legal prohibitions against the circumvent of technological protection measures employed by copyright owners to protect their works, and against the removal or alteration of copyright management information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Additional Information Security Acts and Laws:

A
  1. USA Patriot Act 2001
  2. Freedom of Information Act (FOIA)
  3. The electronic communications privacy act
  4. The human Rights act of 1998
  5. The freedom of information act 2000
  6. Computer fraud and abuse act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Characters of a Security Policy:

A
  • Clear and Concise
  • Usable
  • Economically feasible
  • Understandable
  • Realistic
  • Consistent
  • Procedurally tolerable
  • Legal compliance
  • Based on standards and regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Contents of a Security Policy:

A
  • High-level security requirements: This features the requirements of a system when implementing security policies that include discipline security, safeguard security, procedural and assurance security.
  • Policy description based on requirements: Focuses on the security disciplines, safeguards, procedures, continuity of operations, and documentation.
  • Security concept of operation: Defines the roles, responsibilities, and functions of a security policy.
  • Allocation of security enforcement to architecture elements provides a computer system architecture allocation to each system in the program.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Typical Security Policy Document Contents:

A
  • Document control
  • Document location
  • Revision history
  • Approvals
  • Distribution
  • Document history
  • Overview
  • Purpose
  • Scope
  • Definitions
  • Roles & responsibilities
  • Target Audience
  • Policy Statements
  • Sanctions and Violations
  • Related standards, Policies, and Processes
  • Contact Information
  • Where to find more information
  • Glossary/ acronyms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Policy Statements Examples:

A
  1. All computers must have anti-virus protection activated to provide real-time, continuous protection
  2. All servers must have the minimum services configured to perform their designated functions
  3. All access to data is based on a valid business need and subject to formal approval process
  4. All computer software must be purchased by the IT department in accordance with the organizations procurement policy
  5. A copy of all backup and restoration media must be kept with the off-site backup media
  6. while using the internet, no user is permitted to abuse, defame, stalk, harass, threaten anyone, or violate local and international cyber laws.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Steps to Create and Implement a Security Policy:

A
  1. Performs risk assessment.
  2. Learn from standard guidelines and other orgs.
  3. Include senior management in policy development.
  4. Set clear penalties and enforce them.
  5. Publish the final version to everyone in org.
  6. Ensure everyone reads, signs and understands the policy.
  7. Deploy tools to enforce policies.
  8. Train employees on policy
  9. Regularly review & update
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Security Policy Design Structure Points:

A
  • Detailed description of policy issues
  • Functionalities of those affected by the policy.
  • Compatibility level of the policy is necessary.
  • Consequences of non-compliance
  • Applicability of policy to the environment
  • Descriptions of policy status
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Types of Information Security Policies:

A
  • EISP
  • ISSP
  • SSSP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EISP:

A

Enterprise Info Security Policy (EISP)

Drives an organizations scope and provides direction to their security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Examples of EISP:

A
  • App policy
  • Network and network device security policy
  • Security policy auditing
  • Back up and restore policy
  • System security policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

ISSP:

A

Issue specific Security Policy (ISSP):

Directs the audience on the usage of technology-based systems with the help of guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Examples of ISSP:

A

Remote access and wireless policy, incident response plan, password policy, policies for personal devices, user account policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

SSSP:

A

System Specific Security Policy (SSSP):

Directs users while configuring or maintaining a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Examples of SSSP:

A

DMZ policy, encryption policy, acceptable use policy, secure cloud computing, access control policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

4 Types of Internet Access Policies:

A
  • Promiscuous Policy
  • Permissive Policy
  • Paranoid Policy
  • Prudent Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Promiscuous Internet Policy:

A

No internet usage restrictions

32
Q

Permissive Internet Policy:

A
  • Known dangerous services/attacks blocked.
  • Policy begins with no restrictions.
  • Known holes plugged, known dangers stopped.
  • Impossible to keep up with current exploits; admins always play catch up.
33
Q

Paranoid Internet Policy:

A
  • Everything is forbidden.
  • No internet connection, or severely limited internet usage
  • Users find ways around overly severe restrictions.
34
Q

Prudent Internet Policy:

A
  • Provides maximum security while allowing known, but necessary dangers.
  • All services are blocked.
  • Safe/necessary services are enabled individually.
  • Nonessential services/procedures that cannot be made safe are not allowed.
  • Everything is logged.
35
Q

AUP:

A

Acceptable Use Policy (AUP):

Defines the proper use of an organizations information, electronic computing devices, system accounts, user accounts, and network resources.

36
Q

User Account Policy:

A

Defines the creation process of user accounts and included user rights and responsibilities.

37
Q

Remote Access Policy:

A

Defines who can have remote access, access mediums, and remote access security controls.

38
Q

Information Protection Policy:

A

Defines guidelines for processing, storing, and transmitting sensitive information.

39
Q

Firewall Management Policy:

A

Defines access, management, and monitoring of firewall in the organization.

40
Q

Special Access Policy:

A

Defines the terms and conditions of granting special access to system resources.

41
Q

Network Connection Policy:

A

Defines the standards for establishing the connection for computers, servers, or other devices to the network.

42
Q

Business Partner Policy:

A

Defines the agreements, guidelines, and responsibilities for business partners to run business securely.

43
Q

Email Security Policy:

A

Defines proper usage of corporate email.

44
Q

Password Policy:

A

Guidelines for using strong passwords for an organizations resource.

45
Q

Physicals Security Policy:

A

Defines guidelines to ensure that adequate physical security measures are in place.

46
Q

Information Security Policy:

A

Defines guidelines to safeguard an organizations information system from malicious use.

47
Q

BYOD Policy:

A

Bring Your Own Devices (BYOD) Policy:

Provides a set of guidelines to maximize business benefits and minimize risks while using an employee’s personal devices on an organizations network.

48
Q

Software/Application Security Policy:

A

Mandates proper measures that enhance the security of in-house and purchased applications.

49
Q

Data Backup Policy:

A

Helps an organization recover and safeguard information in the event of a security incident/network failure.

50
Q

Confidential Data Policy:

A

Defines guidelines for identifying an organizations confidential data and procedures to handle them.

51
Q

DATA Classification Policy:

A

Establishes a framework for classifying organizational data based on its level of sensitivity, value, and criticality within the IT security policy.

3 sensitivity levels: restricted, private, and public

52
Q

Internet Usage Policy:

A

Governs the way the organizations internet connection is used by every device on the network.

53
Q

Server Policy:

A

Establishes a standard for the base configuration of an organization’s server.

54
Q

Wireless Network Policy:

A

States the rule and regulations for accessing an organizations wireless network resource.

55
Q

User Access Control Policy:

A

Gives an organization the ability to control, restrict, monitor, and protect corporate resource availability, integrity, and confidentiality.

56
Q

Switch Security Policy:

A

Describes a required minimal security config for the switches in the network.

57
Q

IDS/IPS Policy:

A

Intrusion Detection and Prevention Policy (IDS/IPS):

Facilitates detection and prevention of intrusion into an organizations network.

58
Q

Encryption Policy:

A

Defines an acceptable use and management of encryption methods, techniques, and tools throughout an enterprise.

Is applicable to all enterprise network resources users/staff, internal networks (LAN/WIFI) and remote (WAN) connections.

59
Q

Router Policy:

A

Describes required minimal security configuration for all routers in the network.

60
Q

Policy Implementation Checklist:

A
  1. make sure the security policy is approved by senior management
  2. make sure the security policy is officially adopted as a company policy
  3. review each policy and decide how it can be enforced within an org
  4. ensure that appropriate tools and techniques are in place to conform to the policy
  5. develop a policy change plan for both the network and the policy itself
  6. Coordinate with other departments to develop procedures based on the policies
  7. Provide basic info security awareness training to employees.
61
Q

What is the most difficult part of Policy Implementation?

A

After the security policy has been created, the most difficult part of the process is deploying it throughout the organization.

62
Q

Employee Awareness and Training:

A

Employees are one of the primary assets of organization and can be part of an organizations attack surface.

63
Q

Employee Awareness & Training: What MUST employees know?

A
  • How to defend themselves and the organization against threats
  • Follow security policies and procedures for working with IT.
  • Know whom to contact if they discover a security threat.
  • Can identify the nature of the data based on data classification.
  • Protect physical and informational assets of that organization.
64
Q

Methods of training employees:

A
  • Classroom style training
  • Online training
  • Round table discussions
  • Security awareness website
  • Providing hints
  • Making short films
  • Conducting seminars
65
Q

Employee Awareness and Training: Security Policy

A
  • Teaches employees how to perform their duties and to comply with the security policy.
  • Orgs should train their employees before granting them access to the network or provide limited access until the completion of their training.
66
Q

Employee Awareness and Training: Physical Security

A

Training should educate employees how to:

  • Minimize breaches.
  • Identify the elements that are more prone to hardware theft.
  • Assess the risks handling sensitive data.
  • Ensure physical security at the workplace.
67
Q

Employee Awareness and Training: Social Engineering

A
  • Phone: Impersonation, employee should be trained on not providing any confidential information
  • Dumpsters: employees should be trained on not throwing sensitive documents in the trash, shredding docs before putting into the trash, erasing magnetic data before putting into trash.
  • Email: Differentiate between legitimate email and a targeted phishing email, not downloading malicious attachments.
68
Q

Employee Awareness and Training: Data Classification

A

Train employees/help desk on: how to classify and mark document-based classification levels and keep sensitive documents in secured place.

69
Q

Employee Monitoring:

A

Conduct indiscriminate monitoring of employees activates to detect any act related to the policy violation.

70
Q

Employee monitoring software:

A

Spytech SpyAgent

71
Q

GPMC:

A

The Group Policy Management Console (GPMC)

is a scriptable Microsoft Management Console

72
Q

MMC:

A

Microsoft Management Console (MMC)

snap-in, providing a single administrative tool for managing group policy across the enterprise.

73
Q

Order of Processing Group Policies:

A

Local computer policy (applied locally to the system and user)

AD (active directory) policies (site -> domain-> OU) (organizational units)

Site: Applied to all members of a site; will override settings that are configured at the local level

Domain: GPOs (group policy object) linked to the domain; will override the GPO linked at the local and site level.

Organizational unit: GPOs linked to OU will override any other GPOs, other than those linked to a sub-OU, or a GPO that is marked as “Enforced”

Enforced: Will override all other GPOs, unless blocked by Block Inheritance.

74
Q

Which command runs GPMC?

A

gpmc.msc

75
Q

which command runs and opens ADUC?

A

Active Directory Users and Computers: run -> dsa.msc

76
Q

To force update group policy via CMD Prompt, which command is used?

A

gpupdate /force