3.1 Auditing and Accountability Flashcards

1
Q

What is the benefit of logging?

A

Creates a log of actions taken. A record incase someone is not adhering to regulations. important to establishing nonrepudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discuss the difference between authorization and accountability.

A

Authorization is determining what an authorized party can do. Accountability is making sure users follow the rules and is responsible for their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe nonrepudiation.

A

Situation where an individual cannot deny they made a statement or took an action because there is enough evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name five items you might want to audit.

A

passwords, software licenses, internet usage,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is accountability important when dealing with sensitive data?

A

Need to hold others accountable with my businesses resources or my personnal data - with what they do and how they store that information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why might auditing your installed software be a good idea?

A

To make sure the license is geniune to avoid a fine brought up by a whistleblower trying to fetch 1M.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When dealing with legal or regulatory issues, why do you need accountability?

A

To ensure people are complying with laws, regulations, and polices that bind it, we use the auditing process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between vulnerability assessment and penetration testing?

A

vulnerability testing uses a scanning tool to locate a weakness then consults its database of info which can be limited, old. Penetration
takes it further - uses hacker tech, gathers info on environ and users, find security flaws in web-based apps or web connected databases, attack unpatched vulnerabilities in applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What impact can accountability have on the admissibility of evidence in court cases?

A

For evidence to be accepted, you’ll need a solid documented chain of custody. Location of the evidence over time and how it was passed from one person to the next and how it was protected. Accountability methods for evidence collection should create an unbroken chain of custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Given an environment containing servers that handle sensitive customer data, some of which are exposed to the internet, would you want to conduct a vulnerability assessment, a penetration test, or both? Why?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Measures put in place to ensure accountability are called what?

A

auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some ways to achieve nonrepudiation?

A

logs, digital forensic examination of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accountability requires tracing all activities to their sources through what three things?

A

identification,
authentication, and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______________ enhances security by enabling nonrepudiation, deterring misuse,
detecting intrusions, and preparing legal evidence.

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Accountability can _________ misconduct by ensuring individuals know they will be
held responsible for their actions

A

deter; deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Auditing can detect and prevent logical and physical intrusions using ___and
    ___systems.
A

IDS IPS

17
Q

Define Auditing.

A

methodical examination and review of organizations records.

18
Q

Logging and Monitoring are ______ measures.

A

reactive

19
Q

What are tests that find and fix vulnerabilities before an attacker does called?

A

assessment.

20
Q

___________ helps detect undesirable conditions or patterns, often based on data
from logs or other systems.

A

Monitoring

21
Q

____________assessments scan for weaknesses, while _________ testing mimics
attacks to exploit vulnerabilities

A

Vulnerability; penetration

22
Q

Auditing helps organizations do what?
3 things

A

1- hold people accountable
2- prevent threats
3 - ensure compliance with laws and regulations.

23
Q

Which tool is used for vulnerability assessment?

A

Qualys

24
Q

Which standards apply to any financial entity policies?

A

Gramm-Leech-Bliley

25
Q
A