C1 Information Asset Protection Flashcards

1
Q

What is IAP?

A

Information Asset Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the six 2011 FBI basic protection practices/steps for protecting IAs?

A

1) Recognize there is an insider and outsider threat to your company.
2) Identify and valuate trade secrets.
3) Implement a proactive plan for safeguarding trade secrets.
4) Secure physical and electronic versions of your trade secrets
5) Confine intellectual knowledge on a need to know basis
6) Provide training to employees about your company’s intellectual property plan and security .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is OPSEC?

A

OPerations SECurity is a protection approach to protect unclassified information that could reveal sensitive plans and operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does ISS Stand for?

A

Information System Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data Mining?

A

Software driven collection of open source data and public information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TSCM?

A

Technical Surveillance CounterMeasures are services equipment and techniques designed to locate, identify and neutralize technical surveillance activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is logical network access control?

A

The process by which users are identified and granted privileges to information, systems, or resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Application Security?

A

Business Applications typically consist of custom code, third party software, and one or more servers. Improper integration can result in vulnerabilities that can alter be exploited to gain unauthorized access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Sanitizing?

A

The process of removing data on storage medium (such as a hard drive) before the medium is reused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Digital Signature?

A

A digital signature authenticates the identify of the sender of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 7 critical success factors outlined by Braun and Stahl? What is the 8th factor?

A

1) Executive management responsibility
2) Information and Security Policies
3) User awareness training and education
4) Computer and network security
5) Third-party information security assurance
6) Physical and personnel security
7) Period risk Assessment8) Classifying and Controlling Sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is failure of imagination?

A

Failure to imagine how a successful attack can occur, then it does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does AAA stand for?

A

Authentication, authorization and accountability/auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 5 categories of Information Systems? How can each be manipulated or poorly implemented?

A

1) Infrastructure. (Bad web links)
2) User (social engineering)
3) Custodian (excess permissions, inadequate monitoring or training. )
4) Executive and senior management. (lack of accountability/polices etc.)
5) Management Processes (inadequate patch manage, change control, protection of networks, software testing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is PDCA applied to ISMS?

A

Plan- Establish the ISMS
Do-implement and operate the ISMS
Check-Monitor and review the ISMS
Act-Maintain and Improve the ISMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is are the two differences between IAP and ISS program?

A

1) IAP focuses holistically on the security of INFORMATION ASSETS including all aspects of protection, not just technology.
2) ISS focuses on the security of INFORMATION TECHNOLOGY, for example, systems, networks, applications, and the interaction between those technology components and end users.

17
Q

What is the objective of an ISS program?

A

To prudently and cost-effectively manage risk where critical organizational information could be compromised, be changed without authorization, or become unavailable.

18
Q

What is an OTP?

A

One Time Password

19
Q

What is a CRC? What does it show?

A

A Cyclic Redundancy Check reveals whether data has been altered.

20
Q

What are the 5 cultural challenges encountered by Information security system professionals?

A

1) ISS may not be core to the organization. “only supported for legal reasons”
2) Information System Security contains the word “Security” - other employees shouldn’t have to get involved. Security is scene as a hinderance.
3) Organizational Culture is neglected.
4) A different Language. IT has their own lingo.
5) It will not happen to us.