Chapter 10 - Auditing, Testing, and Monitoring Flashcards

1
Q

Security auditing is…

A

crucial to avoid data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Auditing a computer system involves…

A

checking to see how its operation has met security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Audits can be…

A

manual or automated
narrow in scope or encompass the entire organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Assessing a system

A

defining how a system is supposed to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The first step in the auditing process, before we can even begin is…

A

assessing the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Purpose of audits

A
  • evaluate appropriate security levels
  • ensure that controls are correctly installed and working well
  • ensure that controls are effective in addressing the risk they were assigned to address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Steps in the security review cycle

A
  1. monitor
  2. audit
  3. improve
  4. secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Monitor

A

review and measure all controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Audit

A

Review the logs and overall environment analyze how well policies and controls are working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Improve

A

include proposals to improve the security program and controls in the audit results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure

A

ensure that new and existing controls work together to protect the intended level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security policy should…

A

define acceptable and unacceptable actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Promiscuous

A

everything is allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Permissive

A

anything not specifically prohibited is allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prudent

A

a reasonable list of things is permitted and all others are prohibited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Paranoid

A

very few things are permitted and all others are prohibited and carefully monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Service Organization Control (SOC)

A

a framework that defines scope and contents of three levels of audit reports

18
Q

SOC 1

A

an audit report focused on a service organization’s internal controls relevant to their clients’ financial reporting

19
Q

SOC 2

A

an audit report that focuses on the security and privacy of an organization’s information systems

20
Q

SOC 3

A

a general-use, public-facing version of a more detailed SOC 2 report, designed to reassure customers about an organization’s security

21
Q

Benchmark

A

the standard to which a system is compared to determine whether it is securely configured

22
Q

Example of a benchmark

A

the NIST cybersecurity framework

23
Q

How can we collect data for our audit?

A

questionnaires, interviews, observation, etc.

24
Q

Steps of an audit

A

Planning, fieldwork, reporting, and follow-up

25
Q

Step 1. planning

A

Define the audit plan and the scope of the audit

26
Q

Step 2. fieldwork

A

Analyze how well controls are working

27
Q

Step 3. reporting

A

create audit logs and other reports

28
Q

Step 4. follow up

A

review actions taken and determine whether issues outlined in the audit report have been solved.

29
Q

Event logs

A

document general operating system and application software events

30
Q

Access logs

A

document access requests to resources

31
Q

Security logs

A

document security-related events

32
Q

Audit logs

A

defined events that provide additional input to audit activities

33
Q

Security Information and event management system (SIEM)

A

helps organizations manage log files by providing a common platform to capture and analyze entries from firewall, intrusion detection, and database server logs

34
Q

The SIEM..

A
  • Standardizes data
  • Produces visualizations of data
  • Monitor user activity and ensure that users act in a way that is in line with company policies
35
Q

IDs

A

a control that identifies abnormal traffic

36
Q

IPs

A

actively block malicious traffic

37
Q

System hardening

A

Turn off or disable unnecessary services and protect the ones that are still running

38
Q

Black-box testing

A

uses test methods that aren’t based directly on knowledge of a program’s architecture or design

39
Q

White-box testing

A

based on knowledge of the application’s design and source code

40
Q

Grey-box testing

A

lies somewhere between black-box and white-box testing