Auditing and Accountability Flashcards

1
Q

What is accountability in Information Security?

A

Ensuring individuals are held responsible for their actions within a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What three security mechanisms help enforce accountability?

A

Identification, authentication, and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is nonrepudiation?

A

Prevents someone from denying their actions due to the presence of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of nonrepudiation in cybersecurity?

A

Network logs, system logs, and digitally signed emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does deterrence improve security?

A

By setting clear rules and informing users that their activities are being monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between an IDS and an IPS?

A

IDS (Intrusion Detection System): Monitors and alerts.
IPS (Intrusion Prevention System): Takes action to block attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is the admissibility of records important in security?

A

Proper logging ensures security records can be used as legal evidence in investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is auditing?

A

A methodical review of an organization’s records to ensure security and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is accurate record-keeping important in auditing?

A

It ensures logs are reliable and can be used to track security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some things that should be audited?

A

Access controls (who has access to what)
Password policies (complexity, change frequency)
Software licenses
Internet usage (websites visited, emails, file transfers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of logging?

A

Capturing and storing a history of system activities for later review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between logging and auditing?

A

Logging happens before an audit and records system activities.
Auditing involves reviewing logs and other records for security and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is monitoring in cybersecurity?

A

Observing system activity in real-time to detect failures, threats, or resource shortages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a security assessment?

A

A test that identifies and fixes vulnerabilities before attackers exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a vulnerability assessment?

A

A process that scans for security weaknesses in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some scanning tools used for vulnerability scanning?

A

Qualys, Nessus, OpenVAS.

17
Q

What does a vulnerability scanner do?

A

Scans for open ports, outdated software, and misconfigurations.

18
Q

What is penetration testing?

A

A simulated cyberattack that mimics real-world hacking techniques to test security.

19
Q

What are the key steps of a penetration test?

A

Information Gathering – Reconnaissance on the target system.
Scanning – Finding vulnerabilities.
Exploitation – Attempting to exploit weaknesses.

20
Q

Why is auditing software licenses important?

A

To ensure compliance with licensing agreements and prevent legal issues.

21
Q

Why is logging critical for forensic investigations?

A

It provides a historical record of events, which can be used to trace security incidents.

22
Q

How does accountability impact legal investigations?

A

Ensures that security logs and records can be used as admissible evidence in court.