Ch 8 Questions Flashcards

1
Q

What is the most common way ransomware attacks are conducted?

A

Phishing

Through malware through email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List 5 ways or controls a company can put in place to mitigate the risk of a ransomware attack.

A

Antivirus software on every server and machine

Education/Awareness messages

Email filter and security scanner is key in any company

Only corporate email

Secure all computers - Can’t install software, Disable external drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How was the Solar Winds evet conducted? How does this differ from the most common type of ransomware attacks?

A

Russian hackers put malware in patches – infected all of the computers because every server has the agent running

Spying on government?
Happening for over a year before United States even noticed

No damage – gathering intelligence and spying

Who were prominent customers?
All agencies of the United States government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the components of an organizational framework for security and control?

A

General controls – govern the design, security, and use of computer programs and the security of data files in general throughout the organization’s information technology infrastructure

Ex. Software controls
Hardware controls
Computer operations controls
Data security controls
Implementation controls
Administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to control common risks of eavesdropping on wireless connection?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to control common risks of stealing passwords?

A

Two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to control common risks of phishing?

A

Training

Awareness

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity management is extremely important. How is this controlled?

A

AUP Policy

Authentication

Passwords

Tokens

2 Factor Authentication

Biometric Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a denial of service attack?

A

Hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network

The network receives so many queries that it cannot keep up with them and is thus unavailable to service legitimate requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a denial of distributed service attack?

A

Uses numerous computers to inundate and overwhelm the network from numerous launch points

So many users trying to log on – filter out traffic and make sure they do not access network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How would malware get on your computer?

A

Operator error - download it

Phishing - emails and attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is identity management?

A

Business processes and software tools for identifying the users of a program and controlling their access to system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is and Acceptable Use Policy (AUP)?

A

Defines acceptable uses of the firm’s information and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is authentication?

A

Refers to the ability to know that a person is who he or she claims to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are passwords?

A

Known only to authorized users, used to log onto a computer and system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a token?

A

A physical device, similar to an identification card, that is designed to prove the identity of a single user

17
Q

What is biometric authentication?

A

Uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices to grant or deny access

18
Q

What is two-factor authentication?

A

Increases security by validating users through a multi-step process

19
Q

What are firewalls?

A

Prevent unauthorized users from accessing private networks

A combination of hardware and software that controls the flow of incoming and outgoing network traffic

20
Q

What is an intrusion detection system?

A

Full-time monitoring tools placed at the most vulnerable points or hotspots of corporate networks to detect and deter intruders

21
Q

What is antivirus software?

A

Prevents, detects, and removes malware including computer viruses, computer worms, Trojan horses, spyware, and adware

22
Q

What is an Information Systems Audit?

A

Examines the firm’s overall security environment as well as controls governing individual information systems

23
Q

What is the risk assessment process?

A

Determines the level of risk to the firm is a specific activity or process is not properly controlled

24
Q

What are application controls?

A

Specific controls unique to each computerized application

25
Q

What is security policy?

A

Consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals