2.1_The Security Organization - GRC Flashcards

1
Q

What are the 5 areas of Security Team Alignment?

A
  • Linux and Windows
  • Networking
  • Defense Security
  • Web and Web Vulnerabilities
  • Offensive Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security operations will interact with other non-security team departments within the organization. Give an example.

A

An organization’s Marketing and Communications teams use the networks and accounts that IT and Networking manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Concerns vs. Business Concerns

A

Security Team’s Main Goal: Protect the business’s data

Business Goal: To make profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization’s engineering team proposes an innovative but insecure new feature for their flagship product. What would the security team say vs the suits?

A

Security Team:
The security team would probably advise against the new feature due to its poor security.

Business-At-Large:
The business might decide to develop it anyway, believing the potential profit is worth the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization’s engineering team proposes an innovative but insecure new feature for their flagship product. What could the security team do?

A
  1. Put in place more aggressive monitoring
    on data servers likely to be exposed by the
    new feature.
  2. Advise IT and Networking to put in place more sophisticated access controls on important servers and proxies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False:

100% security is not the business’s goal

A

True

To limit spending and increase profit, businesses often provide only adequate protection for their most important assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the GRC framework and the three components?

A

GRC is a framework for answering the questions: What assets are most important? and what is adequate protection?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Creating management processes for implementing security practices across the organization is what component of GRC framework?

A

Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Making sure the business follows internal security policies and adheres to relevant security laws is what component of GRC framework?

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identifying an organization’s most important assets and determining how they might be compromised.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The more significant the loss, the more important the asset is apart of what concept?

A

GRC Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security vs. Business Objective:

The organization performs a risk assessment and concludes that the feature could lead to a 25% increase in quarterly profits. The feature would also risk exposing an isolated data server containing customer names, usernames, and email addresses, but no other PII (personally identifiable information). What wins?

A

Business Wins!

The security team objects to the feature on the grounds of insecurity. But the business decides that the cost of the potential breach—of an isolated server with no sensitive PI —would be less than the potential profit of the feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The director of Engineering suggested giving all developers access to all data. What’s the recommendation?

A

Reject on the grounds of privacy?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The director of IT suggested exposing administration servers to the public internet. What’s the recommendation?

A

Reject this request. A VPN would be a better solution to this problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An SOC analyst recommended merging all of the company’s mail servers into a single server, in order to cut costs and improve efficiency. What’s the recommendation?

A

If the company has so many emails that it needs to maintain multiple servers, this suggestion is not possible. Otherwise, hosting all of the data on a single server makes sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Strong organizational security begins with what?

A

Strong organizational security begins with making sure employees both consider security important and understand the security implications of their decisions.

17
Q

A healthy _______________ requires motivating employees to value security, and training them on how to avoid insecure behavior.

A

A healthy security culture requires motivating employees to value security, and training them on how to avoid insecure behavior.

18
Q

Employees are receiving emails to their work accounts from external sources. What should you do and what is your first step?

A

Measure and Set Goals

Hire a pentester to run a phishing campaign against your organization. They will send malicious files to everyone in the organization and keep track of who downloads them.

Set a click rate goal of 5%. Measure this data to determine (1) what percentage of employees download the files and (2) which employees download them.

19
Q

Involving the right people is what step of security culture framework.

A

Step 2

20
Q

What is the security culture framework? How many steps are there?

A
  1. Measure and Set Goals
  2. Involve the Right People
  3. Create an Action Plan
  4. Execute the Plan
  5. Measure Change
21
Q

Chief Information Security Officer (CISO) reports to whom?

A

CEO

22
Q

What is a typical reporting structure fro VP of Networking?

A

VP of Networking:

  • Director of IT > Director of Network Security
  • Performance Manager
  • Network Engineer
23
Q

CISO is responsible for protecting what?

A

Company’s data

24
Q

Explain the responsibilities of a security department.

A
  1. Network Security - Director of Network Security is in charge of networks.
  2. Incident Response - IR Manager or SOC Manager manages and Incident Response unit.
  3. Application Security - Security Architect is in charge of application security.
25
Q

What are the 5 security controls?

A
  1. Preventative controls prevent access with physical or technical barriers. (Key-card access is an example of a preventive control.)
  2. Deterrent controls discourage attackers from attempting to access a resource.
  3. Detective controls identify and alert attempts at access to a resource.
  4. Corrective controls attempt to fix an incident, and possibly stop it from happening again.
  5. Compensating controls restore the function of compromised systems.
26
Q

A system with multiple layers of protection is said to have ____________ because it is protected in multiple ways.

A

Control Diversity

A system with multiple layers of protection is said to have control diversity, because it is protected in multiple ways.

27
Q

Discouraging attackers from attempting to access a resource is what security control?

A

Deterrent

28
Q

Controls that identify and alert attempts at access to a resource is what security control?

A

Detective

29
Q

Controls that attempt to fix an incident, and possibly stop it from happening again is what security control?

A

Corrective

30
Q

Controls that restore the function of compromised systems is what security control?

A

Compensating

31
Q

Controls that prevent access with physical or technical barriers.

A

Preventative

Key-card access is an example of a preventive control.