Auditing and Accountability Flashcards

1
Q

Accountability

A

Trace all activities back to their sources, using identification, authentication, and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HIPAA

A

Health Insurance Portability and Accountability Act of 1996
Protects medical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sarbanes-Oxley Act of 2002

A

Protects against corporate fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Auditing

A

Process of reviewing an organization’s records or information
Ensures people comply with laws, policies, etc
Prevents attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nonrepudiation

A

Situation in which an individual is unable to successfully deny that he has made a statement or taken an action, generally because of sufficient evidence that he has done it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrence

A

People will think twice about misbehaving on your system if they know you are monitoring them and if you have communicated that there will be penalties for misbehavior
Achieved through auditing and monitoring processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intrusion detection and prevention

A

Can occur in both physical and logical realms
Implement alerts based on unusual activity can help detect attacks
Automated tools used: intrusion detection systems (IDSs) and intrusion prevention systems (IPSs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security benefits of accountability

A

Nonrepudiation
Deterrence
Intrusion detection and prevention
Admissibility of records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intrusion detection systems (IDSs)

A

Automated tool used strictly for monitoring and alerting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intrusion prevention systems (IPSs)

A

Works with information sent from IDS
Can actually take action based on situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Admissibility of records

A

Need unbroken chain of custody to submit records into legal settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does your capacity to audit directly relate to?

A

Your ability to hold anyone accountable for anything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Factors commonly audited in information security

A

Passwords – allows to enforce policies on use and construction
Software licenses – legally acquired and current; Business Software Alliance
Internet usage – websites employees visit, instant messaging, email, file transfers; use proxy servers to funnel traffic through just a few gateways to filter it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logging

A

Gives you the history of the activities that have taken place in an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Are logs usually generated manually or automatically?

A

Automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Are logs reactive?

A

Yes. After the event has taken place.

17
Q

Do logs normally record everything?

A

No, usually only critical events

18
Q

Who can typically review logs?

A

Systems administrators

19
Q

How do you catch unusual items in logs?

A

Schedule regular reviews

20
Q

grep

A

UNIX and Linux tool for searching text. Can cut down time and assist when asked to review logs for compliance, incidents, investigations, etc.

21
Q

Monitoring

A

Subset of auditing
Observing information about an environment to discover undesirable conditions such as failures, resource shortages, and security issues; also trends that might signal the arrival of such conditions

22
Q

Is monitoring a reactive tool?

A

Yes. You can only see something after it has taken place.

23
Q

Clipping level

A

Unusual levels of unusual activity

24
Q

Assessments (auditing)

A

Tests that find and fix vulnerabilities before any attackers do
Two types of assessments: vulnerability assessments and penetration testing

25
Q

Are assessments in auditing a reactive tool?

A

No.

26
Q

Vulnerability assessments

A

Use vulnerability scanning tools such as Qualys to locate weaknesses in an environment
Uses database of vulnerability of information to spot weaknesses
New or uncommon attack might escape their notice

27
Q

Penetration testing

A

Mimic the technique an actual attacker would use to breach the system