Chapter 2: Asset Security Flashcards

1
Q

Senior/Exec Management

A

CEO, CFO, CIO, ISO - infosec officer`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steering Committee

A

Define Risks, Objectives and Approaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Auditors

A

Evaluates Business Processes

testable should answer to an independent enity in org such as the CEO have them aligned with him.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Owner

A

Classifies Data - determines the classification of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Custodian

A

Day to day maintenance of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Admin

A

Ensures Availability of network resources

not to be security admin need to be different.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Administrator

A

Responsible for all security-related tasks, focusing on Confidentiality and Integrity.
can’t be network admin…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information Security Officer - ISO

A
responsible for providing CIA for all assets
communicates risks to senior management
recommends best practices
establish security measurements
compliance  with gov and industries
awareness of emerging threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the C’s of Classification

A

Cost - value of data
classify - criteria for classification
controls - determines baseline security config for each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is purpose of classification?

A

to drive what controls needs to be in place to protect he info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

consideration for asset value

A

value to org
loss if compromised
legislative drivers
liabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

sensitivity

A

describes the amount of damage that would be done should the info be disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

criticality

A

describes the time sensitivity of the data. how much revenue will be lost when something is down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 states of data

A

at rest - File system encryptions, efs, tpm
in process -
in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EFS

A

windows encryption might be vurnerable because you can put drive in different type of computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TPM

A

trusted platform module. encryption is on the key on the motherboard. if hard drive is stolen… - PGP is one etc.

17
Q

data in process

A

screen protectors…physical secuirty

18
Q

data in transit

A

use secure protocols - tls, ssl, ipsec

19
Q

System Hardening

A

remove unnecessary services
installing latest service packs and patches
rename default accts
change default settings
enabling security configs like auditing, firewalls, updates etc.
don’t forget physical security.

20
Q

Config Management

A

Defined by ISC2 as “ a process of id’ing and documenting hardware components, software and the associated settings”

controlling changes made to servers and documenting it…

21
Q

TCB

A

Trusted computing base

22
Q

Change Management

A

Admin control policy - should be incorporated into org. policy.
only approved changes will be implemented.
ultimate goal is system stability.
DON’T FIX PROBLEMS
do not make changes…

23
Q

change management process

A
request submittal
risk assessment
approval or rejection
testing
scheduling
implementaion
validation 
documentation
24
Q

patch management

A

a process to prioritze patches …etc. below change management…