9.6 Continuity Planning & Disasters Security Flashcards

1
Q

What is involved in Continuity Planning & Disasters from a Security perspective?

A

Events such as a cyber attack or loss of data impacts the business - needs to be covered in continuity plan
Extreme events business becomes inoperable - needs to be covered in disaster recovery plan
Evidence suggests humans are cause of most security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify the well know security problems

A
Phishing
Hacking (DDOS, key logging, cookie theft)
Malware
Scareware
Spyware
Bots
Ransomware
BYOD 
Lack of compliance with security policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identify the types of security issues

A

Technical
Procedural
Physical
Personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe each of the types of security issues

A

Technical
Storage (hardware, temperature, moisture)
Access
Manipulation
Transmission of data must be safeguarded by technology that enforces particular information control policies

Procedural
Procedures used in operation of system must assure reliable data

Physical
Computers must be physically inaccessible to unauthorised users:
Doors opened by swipe cards
Voice / palm / fingerprint recognition or keypad
Security guard
Sensors

Personnel 
People responsible for system administration and data security at your site must be reliable:
Background checks
Dismissal procedures
Password protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify what is involved in Human Perception of Security

A

Belief that ‘technology’ takes care of it
Legacy ways of working
Perception of risks is ‘low’ so standards slip
Little / poor understanding of system and how it works
Basic human belief in trust
No value placed on data by staff
Company culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify what are the Human Factors in Security

A

Many security breaches are due to ‘human factor’ in equation
Estimated 60% of financial losses are due to human error
Vulnerabilities still exist, no matter how good computer controls are
Staff must understand responsibility towards data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify the risks involved with Human Factors in Security

A
Disgruntled employees
Sacked (or resigned staff)
Work rounds
Elevated privileges
Carelessness
Sabotage
Time & resource theft
Loss of portable media (USB sticks) with encrypted data
Loss of laptops (carelessness or theft)
Password sharing and writing down strong ones
Tailgating into buildings
Accidental introduction of viruses / trojans / malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What steps can companies take for Continuity Planning & Human Security?

A

Have a Security Strategy and Policy

Security strategy must be embedded into overall business strategy and processes
Security must be designed into systems not be a ‘add on’ (user authentication, firewall, anti-virus)
Quality software from respected vendors
Training of all staff and good communication to all staff about security issues
Appoint ‘Data Guardians’ in every department (responsibility for championing at top level)
Strategies such as clear desk policy / use of swipe cards make security seem more important
Change company culture, if senior management take it seriously culture will improve lower down organisation
Pre-employment screening of all staff and ongoing screening of existing staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly