Chapter 13: Security Operations Flashcards

1
Q

What is the need to know principle?

A

The requirement that users are granted access only to data or resources they need to perform assigned work tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the principle of least privilege?

A

Subjects are granted only the privileges necessary to perform assigned work tasks and no more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is separation of duties and responsibilities?

A

Ensuring that no single person has total control over a critical function or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is separation of privilege?

A

Similar to separation of duties and responsibilities. Applies the principle of least privilege to applications and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is segregation of duties?

A

Ensuring that individuals do not have excessive system access that may result in a conflict of interest. Combines separation of duties with least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is split knowledge?

A

Combines separation of duties and two-person control into a single solution. Information or privilege to perform an operation is divided among multiple users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is two-person control?

A

Requiring approval of two individuals for critical tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is job rotation?

A

AKA rotation of duties. Employees are rotated through jobs or job responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the benefits of job rotation/rotation of duties?

A

Provides peer review, reduces collusion and fraud, enables cross-training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of privilged operations that should be monitored for administrative accounts?

A
accessing audit logs
changing system time
configuring interfaces
managing user accounts
controlling system roboots
controlling communication paths
backing up and restoring the sstem
running script/task automation tools
configuring security mechanism controls
user operating system control commands
using database recovery tools and log files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is PII?

A

Personally Identifiable Information.

Any information that can distinguish or trace a person’s identity. Name, SSN, date/place of birth, mother’s maiden name, biometric info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one common way sensitive information is compromised?

A

Loss of backup tapes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is data reminance?

A

Data that remains after it has supposedly been removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List terms commonly associated with destroying data.

A

Erasing, clearing, purging, declassification, sanitization, degaussing, destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is erasing?

A

Performing a delete operation against a file, selection of files, or the entire media. Usually only deletes an index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is clearing?

A

Unclassified data is written over all addressible locations on the media. Data can’t be recovered using traditional recovery tools.

17
Q

What is purging?

A

More intense form of clearing. Provides a level of assurance that the data is unrecoverable using all known methods. Often multiple clearing passes.

18
Q

What is declassification?

A

Any process that purges media or a system in preparation for reuse in an unclassified environment.

19
Q

What is sanitization?

A

A combination of processes that removes data from a asystem or from media. Ensures data can’t be recovered by any means.

20
Q

What is degaussing?

A

Erasing data using a strong magnetic field. Not usually recommended for hard disks. Doesn’t work on optical media.

21
Q

What is destruction?

A

Final stage in the media life cycle, after proper sanitization. Incineration, crushing,shredding, dissolving.

22
Q

Why would organizations buy smartphones for their employees?

A

It gives them control over the devices which they can use to secure them for example enabling encryption, screen locks, GPS, and remote wipe capabilities.

23
Q

How can you overcome remote wipe capabilities?

A

Remove the SIM card.

24
Q

What are the steps of patch management?

A
  1. Evaluate patches
  2. Test patches
  3. Approve patches
  4. Deploy the patches
  5. Verify that patches are deployed
25
What is CVE?
Common Vulnerabiltiies and Exposures
26
Who maintains the CVE dataase?
MITRE.
27
What is the CVE database used for?
Usually used by patch management and vulnerability management tools for scanning for specific vulnerabilties.
28
What is baselining?
In configuration management, it's the starting configuation for a system.
29
What are the steps in the change management process?
1. Request the change 2. Review the change 3. Approve/disapprove the change 4. Schedule and implement the change 5. Document the change
30
What are common items to check in a security audit?
Patch management, vulnerability management, configuration management, change management