CEHv8 BOOTCAMP: MODULE 01-INTRODUCTION TO ETHICAL HACKING_SET-3 Flashcards
What does Defense in Depth help prevent?
Direct attacks against an information system and data because a break in 1 layer only leads an attacker to the next layer.
What is Incident Management?
A set of defined processes to identify, analyze, prioritize, and resolve security incidents to restore normal service operations as quickly as possible and prevent future reoccurrence of the incident.
What are 7 purposes of the incident management process?
- Improves service quality
- Pro-active problem
- Reduces impact of incidents on business/organization
- Meets service availability requirements
- Increases staff efficiency and productivity
- Improves user/customer satisfaction
- Assists in handling future incidents
What is Security Policy?
A document or set of documents that describes the security controls that will be implemented in the company at a high level.
What are 8 goals of Security Policies?
- Maintain an outline for the management and administration of network security
- Protection of organization’s computing resources
- Elimination of legal liability from employees or third parties
- Ensures customers’ integrity and prevent waste of company computing resources
- Prevent unauthorized modifications of the data
- Reduce risks caused by illegal use of the system resource, loss of sensitive, confidential data, and potential property
- Differentiate the user’s access rights
- Protect confidential, proprietary information from theft, misuse, unauthorized
What are 5 Classifications of Security Policies?
- User Policy
- IT Policy
- General Policies
- Partner Policy
- Issue Specific Policies
What is a User Policy?
A policy that defines who can use the network and the limits on what the user to secure the network.
What is a IT Policy?
A policy that is designed for the IT department to keep the network secure and stable.
What is a General Policy?
A policy that defines the responsibility for general business purposes.
What is a Partner Policy?
A policy that is defined among a group of partners.
What is a Issue Specific Policy?
A policy that recognizes specific areas of concern and describe the organization’s status for top level management.
What are the 4 Types of Security Policies?
- Promiscuous Policy
- Permissive Policy
- Prudent Policy
- Paranoid Policy
What is a Promiscuous Policy?
Policy with no restrictions on Internet or remote access.
What is a Permissive Policy?
Policy that begins wide open and only known dangerous services/attacks are blocked.
What is a Prudent Policy?
Policy that begins by blocking all services and only safe/necessary services are enabled individually; everything is logged.