chapter 2 part 2 Flashcards

1
Q

what is top management of security?

A

means that the CEO communicated with the CSO Chief security officer and provides support through staffing, financial support and the CEO follows security practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how does the human resource department interact with the security department?

A

provides training for staff, hires and fires staff and is called when security rules are broken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the top 3 auditing departments in a corp?

A

internal, financial and I.T. Auditing (sometimes contains security auditing as well)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the auditing departments (3) and what do they do?

A

internal auditing: controls and efficiency of organization
Financial auditing: efficiency and controls for fiances
I.T. auditing: audits Information Technology processed and sometimes has the Security auditing within its department… this allows the IT to blow the whistle on its own CSO chief security officer if needed without blow-back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Due diligence?

A

closely auditing or checking the security of a competitor, business partner or other organization that will gain access to company resources before giving them access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

if a company outsources IT services what is common an why?

A

email: because email malware and spam is constantly changing and it is cost effective to have a company handle this for you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is email fingerprinting?

A

spam that is known is then scanned by a device for characteristics. these characteristics are then checked for in new emails and then if found those emails are discarded as spam: urls, etc. Very few false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rate controls?

A

controls the rate emails can be sent from/out of an organization because sometimes servers are hacked and used to send spam to others causing bandwidth issues, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

sender and recipient verification?

A

reverse DNS lookup is used to make sure entries are verified senders/ receivers and are legit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

whitelisting?

A

an email outsourcing tool/server is used to scan all emails. this service deletes all known spam. any email that could be spam is then forwarded to a specific email/ user to be identified as spam or safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MSSP?

A

Managed Security Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MSSP detail

A

Managed Security Service Provider: a server is placed on company network but is remotely accessed by another company that looks at the logs of all events and rates each event in a tier number system as a security risk. these logs are both of employees and external threats. allows blowing of whistle on all threats regardless of internal or not. security alerts are sent to the security department via email/pager.,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCI?

A

Total Cost of Incident: accounts for lawsuits, fines etc and is sometimes used in the classic risk analyst calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ROI?

A

Return on Investment: often not shown well in IT security because it is hard to predict damage cost if not used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Classic risk Analysis is what?

A

a mathematical calculation that checks the risk of a company’s resources vs the cost of implementing diff. security measures. numbers should not be taken at face value, lawsuits and fines are not always calculated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Exposure value?

A

percentage of assets value that would be lost in breach

17
Q

single loss expectancy?

A

(asset value) x’s (exposure factor) .

18
Q

annual probability of occurrence?

A

frequency of occurrences annually.

19
Q

annual loss expectancy? ALE

A

(annual rate of occurrence) x’s (annual loss occurrence)

20
Q

countermeasure impact?

A

benefits of a countermeasure: compare the benefits of countermeasures in cost/ savings.