Chapter 11 Implementing policies to mitigate risks Flashcards

Implementing policies to mitigate risks

1
Q

What are the general policy categories?

A

Personnel management, data protection, training for personnel to raise security awareness, mitigate risk and reduce incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When it comes to computers and network what kind of policy is it?

A

Personnel policy, acceptable use policy, how to use them, responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of mandatory vacations? what type of policy is it? What other similar ideas achieve the same goal?

A

Personnel policy, it helps to detect when employees are involved in malicious activity such as fraud or embezzlement. Other: Separation of duties (>1 required for certain jobs) and job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Only having the rights that you need to perform tasks, nothing more.

A

Principle of least privilege. A personnel policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attacker sees an important document on a workers desk as he walks past. He takes it and this isn’t found out til much later in the day. What would have prevented this?

A

Personnel policy of clean desk spaces. Protects sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During the interview process you know there is something important to inform the participant of, what does policy suggest you need to do before they are hired?

A

Background checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is on and offboarding?

A

Onboarding = getting individuals access to organization’s resources AFTER hiring.

Offboarding: removing the access when they leave the company, and collecting any equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using a personal facebook account has implications for work? true or false? why?

A

True, social media analysis, can affect work, work can monitor employee activity, which can also occur during background checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 different types of third party agreements?

A

SLA - service level agreement, stipulates performance expectations, minimum up and down time. etc. $$ penalties.

MOU - memorandum of understanding - indicates their intention to work together on a common goal. Less formal than SLA. Doesn’t include penalties ($$)

BPA - Business partners agreement (BPA) - written agreement, details relationship between business partners, identifies shares of profits or losses partners take, their responsibilities, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security incident vs data breach

A

SI - any adverse event that affects confidentiality, integrity or availability of data/systems.

Data breach - unauthorized entities access data (attacker ).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A formal, coordinated plan that personnel can use when responding to a security breach? and what are 3 things it might include? general description

A

Incident response plan. Incident plans depending on incident type (real vs suspected), a response team outline, roles and responsibilities of each member.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a communication plan within an incident response plan?

A

To communicate issues related to an incident. Created before an incident. Should inclide 1) First responders 2) Internal communication (Senior staff) 3) Reporting requirements (to external entities, if applicable) 4) external communication (Who can say what to media etc, or refer internally) 5) Law enforcement (help, security tools etc) 6) Customer communication (inform of breach etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some common phases of an incident response process?

A

Preparation, identification, containment, eradication, recovery, lessons learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is involved within the preparation stage of an incident response process?

A

Preparation - guidance to personnel on how to respond (establishing and maintaining an incident response plan and procedures to prevent - such as security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If an incident occurs, a response process tells us we first need to?

A

validate whether it is actually a security incident. This is identification, false positive? or real?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is and which step is isolating an incident?

A

containment step 3, protect critical systems while maintaining business operations. A device might be quarantined or removed from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

After isolating, what step is necessary to take?

A

eradication, removing all componenets from the attack, such as malware etc. Or deleting/disabling all involved accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the last two steps of an incident response process?

A

Recovery and lessons learned. We return all affected systems back to normal operation, verify it. Patch any vulnerabilities etc.

Then perform a reflection/review, how does this modify things in the future or do we need additional training etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What can SOAR tools do? why might they be used by organizations?

A

Secure orchestration, automation and response. They can respond automatically, freeing up time from other staff. It is a combination of tools to detect and respond to suspicious activity. This can be from phishing emails, network traffic etc. It’s like a centralized place for all many security tools that work together. Uses a playbook and runbook)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Playbook vs runbook

A

playbook (depends what it is on) for example, a PB on phishing - Checklist of what to check. It is general guidelines for each thing it is associated with.

A runbook incluydes the technical details, implementing the guidelines using tools available. Might quarantine or delete a suspected phishing email, or forward it’s attachment to a sandbox and run it to check. Runbook automates or it might assign it to an administrator to investigate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In digital forensics, evidence is used to implicate people for crimes, but only if…

A

proper procedures are followed. Evidence must be controlled, and maintained in an untampered state.

22
Q

What is a chain of custody? how is it applied?

A

It is a process ensuring that evidence has been controlled and handled well. All control is documented. Where it was stored. When it was handled. Evidence needs to be controlled via a secure safe etc.

23
Q

Sources of forensic information?

A

Video, interviews, logs (event, device, network, DNS) are just a few.

24
Q

How might logs be used for forensic investigation?

A

Gives good information on WHEN/TIME, and WHAT/purpose etc.

25
Q

What does a report usually entail? (Forensic report)

A

TTP (tactics, techniques and procedures)
List of findings
Forensic tools used in the investigation
List of evidence collected and analyzed
Findings derived from analyzing each piece of evidence
Recommendations

It is not meant to be a legal document

26
Q

What is a right to audit clause used for?

A

Used in contracts, particularly for cloud service providers. It allows the customer to audit records, and ensure the CSP is implementing adequate security

27
Q

What are some issues with cloud providers and forensics?

A

The data might be stored somewhere else, they are a third party, security, regulatory jurisdiction (complying with country laws about data).

28
Q

Contacting people after a data breach occurs may depend on the ________ of that _________

A

laws of that country, such as within 45 days etc.

29
Q

What is an order of volatility and an example of this order

A

The order in which you should collect evidence. What is the least to most volatile.
Most-> Cache memory, R.A.M, swap or pagefiles (an extension of ram), Disk, attached devices (USB), network files/folders.

30
Q

What is an artifact? some examples?

A

Pieces of data the regular user is unaware of. Recycling bin (deleted files), web history, windows error reporting, remote desktop protocol (RDP) cache.

31
Q

WinHex?

A

windows based hexadecimal editor used for gathering evidence, data analysis, editing, recovery of data and data removal.

32
Q

FTK imager?

A

can capture an image of a disk as a single file or multiple files, saving the image in various formats. Can view and analyze data within the image.

33
Q

Autopsy?

A

GUI digital forensics platform. Adds utilities from The Sleuth Kit (TSK) is a library and collection of Unix- and Windows-based utilities for extracting data from disk drives and other storage

34
Q

What does integrity mean in forensics?

A

It means the need to ensure data hasn’t been modified, usually after capturing an image or any data in investigation using a hash or checksum

35
Q

what is dd and memdump?

A

dd command is data duplicator and memory dumper, they don’t modify the data during the capture process

36
Q

What is a term used for the identification and collection of electronically stored information?

A

ediscovery

37
Q

What are some metadata types that are important to store?

A

File, email, web, mobile.

38
Q

A user deletes and reformats their drive incase they get caught.. what can a digital forensic specialist do?

A

they can unformat and undelete files using tools. This is why they need to be sanitized.

39
Q

What is digital strategic intelligence? and its use case?

A

collecting, processing, and analyzing digital forensic data to create long-term cyber security goals. obversing TTPs used by attackers.

40
Q

What’s the purpose of a data policy?

A

Assists in reducing data exfiltration, protection of data and preventing data leakage.

41
Q

Data policies may classify information what are some examples?

A

top secret, secret, confidential or public data, private, confiddential, financial

42
Q

What is PII?

A

personally identifiable information. It can include anything that idenifies an individual. Health info, drivers licence, personal characteristics etc. Requires 2 or more pieces of information to make it PII.

43
Q

What is NIST 800-122?

A

Guide to protecting confidentiality of personally identifiable information.

44
Q

What is data policy called that requires organizations to limit the information they collect and use?

A

Data minimization

45
Q

Hiding sensitive information can be done in several ways. What are they and why would you use each?

A

Data masking: Hide PII, retains usable data but may substitute it all into a fictional character for example, like an interview. PERMENANTLY replaces with inauthentic data. Use case: just a stat, don’t need to contact.

Anonymization: modifies data by removing all PII - just removing all PII but keeping the important information used for collecting. Minimal info required.

Pseudo-anonymization: Same as above but uses pseudonyms instead. This may be used when they still want to convert it back to the original data for contact.

Tokenization: Sensitive data elements replaced with a token. It is a substitute value used in place of sensitive data. Like CC information, converted to a token system, phone app sends token to credit processor, token used to retrieve data, processes.

46
Q

How long can you actually keep the data?

A

Depends on the data retention policy

47
Q

List methods used in data sanitization

A

File shredding, wiping (disk wiping tool), erasing and overwriting, burning, pulping, pulverizing/smashing, degaussing, and third-parties.

48
Q

What are some methods for training users in security?

A

Computer-based training (CBT) like courses. web-based training, videos, quizzes,

Phishing campaigns - education

Phishing simulations - trying to get users to click to see if they need training

Gamification - use of games to get courses/online training done,

49
Q

There are several roles involved in the data process what are they?

All the people’s roles that deal with data

A

Data owner - data classified, has adequate security controls to protect it. I OWN IT, IT IS SPECIAL, I PUT A LOCK ON IT.

Data controller - why and how data should be processed (in many cases data owner and controller are the same). I CONTROL HOW IT IS USED AND WHY.

Data processor - uses and manipulates data on behalf of the controller. I PROCESS/USE IT.

Data custodian/steward - backing up data, storage, and implementation of it. “a person who has responsibility for taking care of or protecting something.”

Data protection officer - ensuring the organization complies with all laws. IM THE POLICE. OBEY THE LAW.

50
Q
A