Chapter 13: Security Operations Flashcards

1
Q

What is the need to know principle?

A

The requirement that users are granted access only to data or resources they need to perform assigned work tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the principle of least privilege?

A

Subjects are granted only the privileges necessary to perform assigned work tasks and no more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is separation of duties and responsibilities?

A

Ensuring that no single person has total control over a critical function or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is separation of privilege?

A

Similar to separation of duties and responsibilities. Applies the principle of least privilege to applications and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is segregation of duties?

A

Ensuring that individuals do not have excessive system access that may result in a conflict of interest. Combines separation of duties with least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is split knowledge?

A

Combines separation of duties and two-person control into a single solution. Information or privilege to perform an operation is divided among multiple users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is two-person control?

A

Requiring approval of two individuals for critical tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is job rotation?

A

AKA rotation of duties. Employees are rotated through jobs or job responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the benefits of job rotation/rotation of duties?

A

Provides peer review, reduces collusion and fraud, enables cross-training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of privilged operations that should be monitored for administrative accounts?

A
accessing audit logs
changing system time
configuring interfaces
managing user accounts
controlling system roboots
controlling communication paths
backing up and restoring the sstem
running script/task automation tools
configuring security mechanism controls
user operating system control commands
using database recovery tools and log files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is PII?

A

Personally Identifiable Information.

Any information that can distinguish or trace a person’s identity. Name, SSN, date/place of birth, mother’s maiden name, biometric info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one common way sensitive information is compromised?

A

Loss of backup tapes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is data reminance?

A

Data that remains after it has supposedly been removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List terms commonly associated with destroying data.

A

Erasing, clearing, purging, declassification, sanitization, degaussing, destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is erasing?

A

Performing a delete operation against a file, selection of files, or the entire media. Usually only deletes an index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is clearing?

A

Unclassified data is written over all addressible locations on the media. Data can’t be recovered using traditional recovery tools.

17
Q

What is purging?

A

More intense form of clearing. Provides a level of assurance that the data is unrecoverable using all known methods. Often multiple clearing passes.

18
Q

What is declassification?

A

Any process that purges media or a system in preparation for reuse in an unclassified environment.

19
Q

What is sanitization?

A

A combination of processes that removes data from a asystem or from media. Ensures data can’t be recovered by any means.

20
Q

What is degaussing?

A

Erasing data using a strong magnetic field. Not usually recommended for hard disks. Doesn’t work on optical media.

21
Q

What is destruction?

A

Final stage in the media life cycle, after proper sanitization. Incineration, crushing,shredding, dissolving.

22
Q

Why would organizations buy smartphones for their employees?

A

It gives them control over the devices which they can use to secure them for example enabling encryption, screen locks, GPS, and remote wipe capabilities.

23
Q

How can you overcome remote wipe capabilities?

A

Remove the SIM card.

24
Q

What are the steps of patch management?

A
  1. Evaluate patches
  2. Test patches
  3. Approve patches
  4. Deploy the patches
  5. Verify that patches are deployed
25
Q

What is CVE?

A

Common Vulnerabiltiies and Exposures

26
Q

Who maintains the CVE dataase?

A

MITRE.

27
Q

What is the CVE database used for?

A

Usually used by patch management and vulnerability management tools for scanning for specific vulnerabilties.

28
Q

What is baselining?

A

In configuration management, it’s the starting configuation for a system.

29
Q

What are the steps in the change management process?

A
  1. Request the change
  2. Review the change
  3. Approve/disapprove the change
  4. Schedule and implement the change
  5. Document the change
30
Q

What are common items to check in a security audit?

A

Patch management, vulnerability management, configuration management, change management