Chapter 10 - Cyber Security Tools, Techniques And Reporting Flashcards
Forensic analysis of cyber systems
System level
Storage level
Network level
Penetration Testing
Network discovery - what computers are connected? Are they up to date?
Vulnerability probing
Exploiting vulnerabilities
Software security levels when writing code
Level 1 - prevent hacker intrusion
Level 2 - quick alerts
Level 3 - automated responses, e.g. lock important files
2 step verification
Password then a text
2 step authentication
Password and finger print
6 actions of Digital Resilience
- Identify issues and integrate defences
- Set targets
- Decide how best to deliver new systems
- Rank systems by trade offs
- Develop technology plan
- Ensure staff and business engagement
Cyber security reporting
- Management description of risks and controls
- Management assertion as to suitability
- Practitioner’s assertion
AICPA criteria
Description criteria - areas of cyber threats
Control criteria - how are controls used with examples
National Institute of Standards and Technology
Implementation tiers - how detailed
Core Principles - identify, protect, detect, respond, recover
Profiles - map requirements
AIC triad approach
Availability, integrity, confidentiality