08072017_NewHorizons Flashcards
An ACL is based on an ________
OBJECT
Which firewall operates at Layer 3 and 4?
Stateful Inspection Firewall
Relationship between GOALS and DOCUMENTS
STRATEGIC = POLICIES TACTICAL = STANDARDS and GUIDELINES OPERATIONAL = PROCEDURES and BASELINES
SLE Single Loss Expectancy formula
SLE =AV x EF
Integrity and ______ depend on each other
CONFIDENTIALITY
PPP replaced ____
SLIP
ATM is _____ switching. ATM can use both SVC and PVC.
CELL, ATM IS CELL SWITCHING
PRIVACY LAWS
ECPA, FERPA, GLBA, HIPAA, Privacy Act 1974
A ________ can function or operate as subject or objectt
PROCESS
Frame Relay is a packet switching technology that uses ______.
PVC
3 Access Control functions that happen AFTER an incident
Recovery Controls -
Corrective Controls - Return to Normal, Restoration, Escort a threat out building.
Detective Controls - IDS, AV
Spiral Mode is
Waterfall Model, considered meta-mode
A ________list maintains a row of security attributes for each controlled object. This list is the row of an access control matrix
CAPABILITIES
DRP is a component of BCP and focuses on _______ processes
Technical
3D’s, 2C’s, PR
Deterrent Directive Detective Compensating Corrective Preventive Recovery
STRIDE is used for
Threats
The maximum allowed ping packet size is ______bytes… PING OF DEATH must be at least ..
65,536
Ping of death must be 65,537
Name a few SQL aggregate functions
SUM, COUNT, MIN
What is essential to determine weakness or effectiveness of CONTROLS
Monitoring and Measuring
Documentation: Required implementation or use of tools
STANDARD
The maximum tolerable downtime (MTD) is equivalent to the …
recovery time objective (RTO)
DREAD is used to determine ________ of _______
Impact of threat
High Level overarching statement of management intentions. Purpose, scope and expectations
POLICY
ARP happens at Layer ___
3, Network Layer
Offshoot of impersonation. Uses eavesdropping. This replays captured traffic.
REPLAY ATTACK
BCP Project Management
Initiate BCP Project Define Scope and Plan Perform BIA Test Maintain the plan Implement Plan when DR strikes
This virus modifies their own code as they travel from system to system
POLYMORPHIC
Documentation: step by step to implement a system or process
PROCEDURES
_________ access control type limits physical access
Physical
Firewall that operates at Layer 3, examines data from message header.
Static Packet Filtering Firewall
DREAD - D’s stand for
Damage and Discoverability
Bimometric One to One
AUTHENTICATION
Residual Risk
Risk that remains after controls are in place
A RISK is..
A likelihood of a threat occurring as well potential to damage of assets.
Attack that targets 2 ROUND ENCRYPTION SUCH AS DOUBLE DES.
Meet in the Middle
Which layer do these occur in? PPTP, L2F, and L2TP
Layer 2
STRIDE - E stands for
Elevation of Priv
STRIDE - T stands for
Tampering with Data
Access Control that permits an OWNER or CREATOR of an object to control and define accessibility
DISCRETIONARY Access Control
ARO Annual Rate of Occurrence Formula
ARO = event number/year. If flood occurs 1 every 10yrs, 10%
This methodology uses multiple iterations of the waterfall model, it is also considered a meta-mode..
Spiral model
Goal that is 3-5 years. Establish Security Policies and Ensure ALL users understand responsibilities
STRATEGIC
What Privacy Law protects employees without notifying them?
ECPA
DREAD - E stands for
Exploitability
Dynamic testing technique that provides many different types of input to software to stress test.
FUZZ TESTING
Flight Time is
time between key presses.
Keyword for DETECTIVE ACCESS CONTROL. Examples?
Detect or DISCOVER. CCTV, Security Cameras, Audit Trail,
Formula for SLE and ALE
SLE = AFV x EF ALE = SLE x ARO
Frame Relay is ____ switching
PACKET SWITCHING
In a ______ security mode system, there is no requirement that all users have appropriate clearances
MULTIMODE
Goal that is 6-18 months. Example: Implement DR or CRM
TACTICAL
A condition that leaves the system and assets open to harm
Vulnerability
Examples of DUE CARE
TRAINING, PRUDENT PERSON rule
How to prevent a REPLAY ATTACK
One-Time authentication and Sequencing Session Identification
The Challenge Response Protocol is a _______ _______
AUTHENTICATION PROTOCOL
Risk Management Frameworks
ISACA Risk IT
ISO 31000
COSO Enterprise Risk Management Framework
NIST Risk Management Framework
__________access controls DISCOURAGES you from violating a security violation
Deterrent
ALE Annual Loss Expectancy formula
ALE =SLE x ARO
ISAKMP: Internet Security Association and Key Management Protocol (ISAKMP) provides background security support services for ____
IPSec
This ACCESS CONTROL enforces SYSTEM WIDE restrictions
NONDISCRECTIONARY
What Privacy Law protects individuals of Financial Institutions?
GLBA
3DES effective key length ____ bit
168
_______ is almost always the right answer on the exam
POLICY
I R D MO - CMM. Which stage uses “FORMAL DOCUMENTED SW Development Processes”?
DEFINED D= DOCUMENT
The primary purpose of change management is to _________ ______ ______ _______.
However, it is true that the overall goal of change management is to ____ _____ ______ _____..
PURPOSE: allow management to review all changes
GOAL: prevent unwanted reductions to security
Examples of Resolution Attacks
DNS Poisoning and DNS Spoofing
3 Policy Types
ADVISORY
INFORMATIVE
REGULATORY
_______ removes virus but does NOT REPAIR
REMOVE
Frame Relay operates at Layer __
2
Information Flow Models are designed to
Prevent unauthorized, insecure or restricted information flow often between security levels
In a ______ attack an attacker fragments traffic in a w ay that data packets cannot be put together
TEARDROP
_________ access control type covers personnel security, risk management, training
Administrative
_________ access control type in the form of SW or HW
Logical Technical
An electronic access control (EAC) lock comprises three elements:
1) an electromagnet to keep the door closed,
2) a credential reader to authenticate subjects and to disable the electromagnet, and
3) a door-closed sensor to reenable the electromagnet.
___________ access control to STOPS or THWARTS you from doing it
PREVENTIVE
STRIDE was developed by ________ and is used to asses threats against __________ or ________.
Microsoft, Applications or OS’s.
an Asset is anything of _____ that could be compromised
Value
EF Exposure Factor.
% of value loss
What Privacy Law protects students?
FERPA
Biometric One to Many
IDENTIFICATION
BCP focuses on the _______ processes
Business
What is used to avoid, mitigate or counteract a security risk?
Controls
STRIDE -
Spoofing Tampering Data Repudiation Information Disclosure Denial of Service Elevation of Privilege
_______ removes virus and repairs damage
CLEAN
5 steps to RISK ANALYSIS PROCESS
1) Asset Identification - What are assets and what are they worth?
2) Vulnerability Assessment - Where are we lacking?
3) Threat Assessment -What threats will exploit the vulnerability?
4) Risk Assessment- Quantitative and Qualitative.
5) Financial Impact Evaluation
ATM use fixed length cells and has the following benefits
HIGH THROUGPUT, EFFICIENT
This ROLE backs up data and implements access control based on data owners specifications
DATA CUSTODIAN
2 Peer Auditing techniques
Mandatory Vacations
Job Rotation
Risk Responses (4). Example for driving a car Risk.
- Stay home
- Seat Belt, Airbag
- Get insurance
- Decide to start driving
Avoidance - Stay home
Mitigation - Seat Belt
Transfer - Insurance
Acceptance - Decide to start driving
STRIDE - D stands for
Denial of Service
Examples of DUE DILIGENCE
BACKGROUND CHECK, TEST BACKUPS, RISK ASSESSMENTS
RISK FORMULA ______ X ______ X
THREATS x VULNERABILITIES or
LIKELINESS x IMPACT
ATM is fragmented communication using ____ byte cells.
53 byte
This ROLE will CLASSIFY THE DATA, DETERMINE LEVEL OF ACCESS
DATA OWNER
ISC 2 Code of Ethics
PROTECT Society and Common Good, Public Trust.
ACT Honorably
PROVIDE dlligence to service.
IMPROVE and protect profession
Cost / Benefit Formula
(ALE1 - ALE2) - CM
Practicing activities in DUE CARE is..
DUE DILLGENCE
STRIDE - S Stands for
Spoofing of user identity
DREAD rate threat impact, goes beyond HIGH/MEDIUM LOW
Damage Reproducibility Exploitability Affected Users Discoverability
Which ROLE protects information on the daily basis?
END USERS
Documentation: ________ are recommendations and suggestions and are NOT required.
GUIDELINES