chapter 2 part 3 Flashcards

1
Q

what is technical security architecture?

A

a plan that has all countermeasures including: firewalls, hardened hosts, intrusion detection, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how is legacy security systems best dealt with in a company by IT?

A

it is not replaced all at once due to cost so instead new security systems are combined with old systems to close as many gaps in the systems security as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

defense in dept vs weakest links?

A

defense in depth: multiple independent countermeasures in series while… weakest links are single countermeasures that when breached allow attacker full access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are Central Security Management Consoles used for?

A

.provides control of all security implemented on all corporate devices (updates, etc from one location). used to counter an attack on a network and is used by the security department. often has to be carefully protected because it is a big vulnerability to the network if broken into.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

inter-organizational systems?

A

two or more companies link networks together, neither can enforce or learn of other security practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

centralized security management allows for what and why is this attractive?

A

allows all devices to be secured and updated remotely from one or a few central devices. this makes it easier to enforce security on the network because you don’t have to rely on several employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is corporate security policy?

A

commitment of firm to strong security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

major security policy is what>?

A

email, hiring, termination etc. strong policies when it comes to what employees should do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PII ?

A

personally identifiable info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

personally identifiable info policies.?

A

specific policies for encryption, access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AUP?

A

Acceptable use policy: how employees are to use devices and not to use for personal reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

policy teams consist of what people?

A

not just IT or security people as more ppl = more/broader scope of coverage and ideas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

implementation guidance?

A

limits discretion of implementer to simplify implementations. acts as a guide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

baselines?

A

tells what should be achieved without telling how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

promulgation?

A

the process of making users/employees aware of new security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security metrics

A

measurable indicators of security success/failure

17
Q

fraud and abuse triangle?

A

how an employee becomes a criminal: opportunity, pressure (through job to hide poor performance, often found when expectations are too high.) and finally -Rationalization: person convinces themselves that they are a good person

18
Q

sanctions?

A

person is disciplined

19
Q

security governmental frameworks / guidelines (3 organizations) ?

A

COSCO
Cobit
ISO/IEC 27000 family

20
Q

Control framework objectives: ?

A

strategic, operations, reporting and compliance

21
Q

COBIT?

A

control objectives for IT : plan, organize, monitor and support (main auditing firm for I.T.)

22
Q

ISO/IEC 27000 family?

A

certification by 3rd party. provides 11 broad areas of security including: security policy, asset management, IT security incident management, etc.