3.5 Identify policies and best practices. Flashcards

1
Q

Privileged user agreement

A

Network/system administrators have access to almost everything

Expected to Use other non-privileged methods when appropriate

Limited to privileged access only for assigned job duties

Signed agreement acknowledge policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password policies

A

Written policy - expire every X days,

The recovery process should not be trivial! - forma process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On-boarding

A

Bring a new person into the organization -New hires or transfers
IT agreements need to be signed
Create accounts
Provide required IT hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Off-boarding

A

This process should be pre-planned Account information is usually deactivated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Licensing restrictions

A

So many licenses
Availability - Everything works great when the license is valid
Integrity - A missing/bad license may cause problems with data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

International export controls

A

Equipment, information, data
Not only shipment of physical items
Dual-use software can be controlled - civilian and military use - Security software, malware, hacking tools
Check with legal team - don’t ship unless you’re sure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Loss Prevention (DLP)

A

Where’s your data? -Detailed policies needed to define what is allowed - How is sensitive data transferred? - Is the data encrypted? How?
DLP solutions can watch and alert on policy violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Remote access policies

A

Easy to control internal communication - More difficult when people leave the building
Policy for everyone
Specific technical requirements - Encrypted connection, confidential credentials,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security incidents

A

User clicks an email attachment and executes malware

Malware then communicates with external servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS

A

Botnet attack
Confidential information is stolen
User installs peer-to-peer software and allows external access to internal servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident response policies

A

How is an incident identified? - Automated monitoring, personal account
How is the incident categorized? - Email issue, brute force attack, DDoS, etc.
Who responds to an incident? - Large list of predefined contacts
What process is followed? - Formal process needs to be created prior to the incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BYOD

A

Bring Your Own Device or Bring Your Own Technology
Employee owns the device that meets company’s requirements
Difficult to secure - how to protect data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Acceptable use policies (AUP)

A

What is acceptable use of company assets? -Detailed documentation
Covers many topics - Internet use, telephones, computers, mobile devices, etc.

Used by an organization to limit legal liability - If someone is dismissed, these are the well-documented reasons why

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Non-disclosure agreement

A

NDA (Non-disclosure agreement)
Confidentiality agreement / Legal contract
Prevents the use and dissemination of confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internal

A

Protect the organization’s private and confidential information
Part of employee security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

External

A

Two parties can’t disclose private information or company secrets about the other party

17
Q

System life cycle

A

Managing asset disposal - Desktops, laptops, tablets, mobile devices
Disposal becomes a legal issue - Some information must not be destroyed
You don’t want critical information in the trash

18
Q

Physical destruction

A

Shredder / pulverizer
Drill / Hammer
Electromagnetic (degaussing) - Remove the magnetic field Destroys the drive data and the electronics
Incineration

19
Q

Safety procedures and policies

A

Equipment safety -Electrical safety policies
Personal safety - lifting techniques, fire safety, cable management
Handling of toxic waste - Batteries, toner Refer to the MSDS (Material Safety Data Sheet)
Local government regulations - Safety laws, building codes, environmental regulations