2. Accountability Flashcards
What does accountability depend on?
Depends on Identification, Authentication, and Access Control being present
Nonrepudiation
Sufficient evidence exists as to prevent an individual from successfully denying that they have made a statement/taken action
I.D.S.es (Detection)
Performs strictly as a monitoring an alert tool
I.P.S.es (Intrusion Prevention)
Can take action based on what’s happening in the environment
Auditing
Tend to look at access to or from systems and extends to physical security
Logging
History of activities that have taken place in the environment
Monitoring
Subset of auditing. To discover undesirable conditions such as failures, resource shortages, security issues, and trends. REACTIVE ACTIVITY
Vulnerability Assessments
Vulnerability scanning tools used to scan to see which ports are open to them then interrogate each to find which service is listening on the port.
Vulnerability Scanning tool Exs
Nessus and Qualys
Penetration Teseting
Goes further than Vulnerability scanning tools by mimicking the techniques an actual attacker would use.
G.L.B. Standards
Gramm-Leech-Bliley Standards. Apply to financial entity policies
B.S.A.
Business Software Alliance. Regularly audits companies for licensing requirements.
What is a disadvantage of logging?
Resources