Chapter 10 - Cyber Security Tools, Techniques And Reporting Flashcards

1
Q

Forensic analysis of cyber systems

A

System level
Storage level
Network level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Penetration Testing

A

Network discovery - what computers are connected? Are they up to date?

Vulnerability probing

Exploiting vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software security levels when writing code

A

Level 1 - prevent hacker intrusion

Level 2 - quick alerts

Level 3 - automated responses, e.g. lock important files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2 step verification

A

Password then a text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 step authentication

A

Password and finger print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6 actions of Digital Resilience

A
  1. Identify issues and integrate defences
  2. Set targets
  3. Decide how best to deliver new systems
  4. Rank systems by trade offs
  5. Develop technology plan
  6. Ensure staff and business engagement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyber security reporting

A
  1. Management description of risks and controls
  2. Management assertion as to suitability
  3. Practitioner’s assertion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AICPA criteria

A

Description criteria - areas of cyber threats

Control criteria - how are controls used with examples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

National Institute of Standards and Technology

A

Implementation tiers - how detailed

Core Principles - identify, protect, detect, respond, recover

Profiles - map requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIC triad approach

A

Availability, integrity, confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly