2. Assest Security Flashcards

1
Q

What is the first canon of ISC2 Code of Ethics?

A

Protect society, the commonwealth and the infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the second canon of ISC2 Code of Ethics?

A

Act honorably, justly, responsibly and legally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the third canon of ISC2 Code of Ethics?

A

Provide diligent and competent service to principals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the forth canon of ISC2 Code of Ethics?

A

Advance and protect the profession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the data owner do?

A

He classifies data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the data custodian do?

A

He performs the day to day maintenance of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the security administrator do?

A

He is responsible for all security related tasks, focusing on confidentiality and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the ISO?

A

Information security officer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the responsibilities of the ISO?

A
  1. Provides CIA for all information assists
  2. Communicates risks to senior management.
  3. Recommends best practices to influence policy, standards, procedures and guidelines
  4. Establish security measurements.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What makes up the value of an asset?

A
  1. Value to the organization
  2. Loss if compromised
  3. Legislative drivers
  4. Liabilities
  5. Value to competitors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define sensitivity

A

Describes the amount of damage that would be done should the I go be disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define criticality

A

The time sensitivity of the data. Usually driven by how much revenue will be lost should this not be used/used incorrectly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What types of protection are there for data in the “at rest” state?

A

File system encryption, EFS, TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of protection are there for data in the “in process” state?

A

Physical security measures like screen protectors, locking station when we leave and a clean desk policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of protection are there for data in the “In Transit” state?

A

IPSec, SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the basic steps for Hardening a system?

A
  1. Remove unnecessary services
  2. Installing the latest service packs and patches.
  3. Renaming default accounts
  4. Changing default settings
  5. Enabling security configurations like auditing, firewalls, updates
  6. Physical security
17
Q

Define configuration management

A

A process of identifying and documenting hardware components, software and the associated settings.

18
Q

Do we change anything “on the fly”?

A

HELL NO!

Always follow the change management procedures.

19
Q

What is the ultimate goal of asset security?

A

System stability