Chapter 10 - Cyber security tools, techniques and reporting Flashcards

1
Q

What are some types of penetration testing?

A

Network discovery
Vulnerability probing
Exploiting vulnerabilities
Internal network penetration testing
Web application penetration testing
Wireless network penetration testing
Simulated phishing testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different levels of software security?

A

Level 1 - prevention of access to software from unauthorised sources
Level 2 - writing detection of unauthorised access into software
Level 3 - writing response into the software, alerting appropriate teams/departments to investigate the breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the other considerations in software security?

A

Design review
Code review
Security testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 6 actions for an organisation to consider in digital resilience?

A

Identify all the issues
Aim toward a well-defined target
Work out how best to deliver the new cyber security system
Establish the risk resource trade offs
Develop a plan that aligns business and technology
Ensure sustained business engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three elements of AIC triad?

A

Availablitiy
Integrity
Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three components of National institutes of standards and technology in the US?

A

Implentation tiers
Core - provides a set of cyber security activies, based on five principles: Identify, Protect, Detect, Respond, Recover
Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three key components in the report to stakeholders about cyber security according to AICPA?

A

Managements description
Managements assertion
Practitioners opinion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is forensic analysis?

A

Reviewing cyber crime scene.

System level analysis - look to identify what changes have been made
Storage analysis - as amount of storage increases easier to hide stuff
Network analysis - Help identify patterns in network activity prior to an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we do malware analysis?

A

Reverse engineering - deconstruct malware to learn more about it
Decompilation and disassembly - involves understanding how it was and what malware was designed to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly