Chapter 5 Flashcards

1
Q

A method of sanitization that applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques; typically applied through the standard Read and Write commands to the storage device, such as by rewriting with a new value or using a menu option to reset the device to the factory state (where rewriting is not supported).

A

Clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A predetermined set of instructions or procedures that describe how an organization’s mission-essential functions will be sustained within 12 hours and for up to 30 days as a result of a disaster event before returning to normal operations.

A

Continuity of Operations Plan (COOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To reduce the magnetic flux to virtual zero by applying a reverse magnetizing field.

A

Degauss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A method of sanitization that renders target data recovery infeasible using state-of-the-art laboratory techniques and results in the subsequent inability to use the media for storage of data.

A

Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Management policy and procedures used to guide an enterprise response to a major loss of enterprise capability or damage to its facilities.

A

Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Management policy and procedures used to guide an enterprise response to a major loss of enterprise capability or damage to its facilities.

A

Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities.

A

Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber-attack against an organization’s information systems.

A

Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Magnetic representation of residual information remaining on a magnetic medium after the medium has been cleared.

A

Magnetic Remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The actions taken to render data written on media unrecoverable by both ordinary and extraordinary means.

A

Media Sanitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A software component that, when installed, directly modifies files or device settings related to a different software component without changing the version number or release details for the related software component.

A

Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The systematic notification, identification, deployment, installation, and verification of operating system and application software code revisions.

A

Patch Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The systematic notification, identification, deployment, installation, and verification of operating system and application software code revisions.

A

Purge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A process to render access to target data on the media infeasible for a given level of effort.

A

Sanitize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A method of erasing electronically stored data, cryptographic keys, and credential service providers (CSPs) by altering or deleting the contents of the data storage to prevent recovery of the data.

A

Zeroization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

To remove or eliminate the key from a cryptographic equipment or fill device.

A

Zeroize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Include the incorporation of new or modified services, the removal or termination of services, and all coordination to ensure continuity in the security posture of the system while addressing service availability issues.

A

Service Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Include the number, qualifications, and scheduling of operators, contingency operations, and all associated training, competency, regulatory, and compliance needs.

A

Staffing Strategy for Operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Preserve the security posture of the system and address the timing and methods to securely incorporate services, revisions, patches, and enhancements in accordance with strategic plans and in response to on-demand needs.

A

Release and Reacceptance Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Address the security posture of the system, inclusive of its security functions, across the defined modes of operation.

A

Operational and Contingency, Degraded, Alternative, and Other Modes of Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Include the shutdown and or halted, standby, normal, degraded, reduced capacity, training, simulation, test, and other operations or sustainment modes specific to the system and its intended uses.

A

Mode of Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Defined by a security configuration and behavior that includes all defined transitions within and between modes.

A

Mode of Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

System operators need to be made aware of the security aspects of performance and be trained to detect and determine when security performance levels are not being met or when other system performance issues impact security performance.

A

Measures for Operation that Provide Insight into Performance Levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Addressing what the system is not to do in terms of how the system is not to behave, the interactions that are not to occur, and the outcomes that the system should not produce.

A

Safety Considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Include data and information collection for security situational awareness assessment.

A

Monitoring for Changes in Hazards and Threats and the Results of Operational Monitoring Activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Provides insight into variances in the knowledge of disruption, hazard, and threat events in the environment and how they combine with operations to provide vulnerability with potential security-relevant consequences.

A

Data Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Include determination of the limits of certainty about the data and information collected; the inherent uncertainty of conclusions and decisions made as a result of the monitoring activities; and the effectiveness, limitations, and constraints of monitoring activities.

A

Monitoring for Changes in Hazards and Threats and the Results of Operational Monitoring Activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Key elements include: (i) identifying the minimum monitoring frequency of controls, (ii) establishing the control assessment approach, (iii) describing how the monitoring will be conducted, and (iv) may also include privacy reporting.

A

Continuous Monitoring Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Phases include: (i) preparation; (ii) detection and analysis; (iii) containment, eradication, and recovery; and (iv) post-incident activity.

A

Incident Response Lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The first phase of the IR lifecycle; during this phase, an incident response capability is established, and incident prevention capabilities are put into place.

A

Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The second phase of the IR lifecycle; includes: (i) identification of attacked vectors, (ii) recognizing signs of an incident, (iii) understanding sources of incident precursors and indicators, and (iv) incident documentation,

A

Detection and Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The third phase of the IR lifecycle; includes: (i) choosing a containment strategy, (ii) evidence gathering and handling, (iii) identifying the attacking host, and (iv) eradication and recovery from the incident.

A

Containment, Eradication, and Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The fourth (last) phase of the IR lifecycle; includes: (i) identifying lessons learned, (ii) using collected incident data, and (iii) retaining evidence.

A

Post-incident Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Include: (i) shutting down the system, (ii) disconnecting it from the network, or (iii) disabling certain functions.

A

Containment Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Purpose is to sustain the capability of a system to provide a service.

A

Maintenance Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Helps to reduce operational security incidents and protect the availability of the system to perform its purpose and provide a service.

A

Maintenance Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The security aspects of the maintenance strategy are developed.

A

Maintenance Process Outcome

39
Q

The security aspects of maintenance and logistics that constrain system requirements, architecture, or design are identified.

A

Maintenance Process Outcome

40
Q

Any enabling systems or services needed to support the security aspects of system maintenance and logistics are available.

A

Maintenance Process Outcome

41
Q

Replaced, repaired, or modified system elements are available in consideration of their security aspects.

A

Maintenance Process Outcome

42
Q

The need for changes to address security-relevant corrective, perfective, or adaptive maintenance is reported.

A

Maintenance Process Outcome

43
Q

Security-relevant aspects, failure, and lifetime data, including associated costs, are determined.

A

Maintenance Process Outcome

44
Q

Traceability of the security aspects of the maintained elements is established.

A

Maintenance Process Outcome

45
Q

Prepare for security aspects of maintenance.

A

Develop Secure Maintenance Strategy Action

46
Q

Perform security aspects of maintenance.

A

Develop Secure Maintenance Strategy Action

47
Q

Perform security aspects of logistics.

A

Develop Secure Maintenance Strategy Action

48
Q

Manage results of security aspects of maintenance and logistics.

A

Develop Secure Maintenance Strategy Action

49
Q

Define the security aspects of the maintenance strategy.

A

Prepare for the Security Aspects of Maintenance Task

50
Q

Identify the system constraints.

A

Prepare for the Security Aspects of Maintenance Task

51
Q

Identify trades.

A

Prepare for the Security Aspects of Maintenance Task

52
Q

Identify, plan for, and obtain enabling systems or services.

A

Prepare for the Security Aspects of Maintenance Task

53
Q

Review incident and problem reports to identify security relevance and associated maintenance needs.

A

Perform the Security Aspects of Maintenance Task

54
Q

Record the security aspects of maintenance incidents and problems and track their resolution.

A

Perform the Security Aspects of Maintenance Task

55
Q

Implement the procedures for the correction of random faults or scheduled replacement of system elements to ensure the ability to deliver system security functions and services.

A

Perform the Security Aspects of Maintenance Task

56
Q

Implement action to restore the system to secure operational status when a random fault causes a system failure.

A

Perform the Security Aspects of Maintenance Task

57
Q

Perform preventive maintenance by replacing or servicing system elements prior to failure with security-related impact.

A

Perform the Security Aspects of Maintenance Task

58
Q

Perform failure identification actions when security noncompliance has occurred in the system.

A

Perform the Security Aspects of Maintenance Task

59
Q

Identify when security-relevant adaptive or perfective maintenance is required.

A

Perform the Security Aspects of Maintenance Task

60
Q

Perform the security aspects of acquisition logistics.

A

Perform the Security Aspects of Logistics Task

61
Q

Perform the security aspects of operational logistics.

A

Perform the Security Aspects of Logistics Task

62
Q

Implement any secure packaging, handling, storage, and transportation needed during the life cycle of the system.

A

Perform the Security Aspects of Logistics Task

63
Q

Confirm that security aspects incorporated into logistics actions satisfy the required protection levels so that system elements are securely stored and able to meet repair rates and planned schedules.

A

Perform the Security Aspects of Logistics Task

64
Q

Confirm that the security aspects of logistics actions include security supportability requirements that are planned, resourced, and implemented.

A

Perform the Security Aspects of Logistics Task

65
Q

Record the security aspects of maintenance and logistics results and any security anomalies encountered.

A

Manage Results of the Security Aspects of Maintenance and Logistics Task

66
Q

Record operational security incidents and security problems and track their resolution.

A

Manage Results of the Security Aspects of Maintenance and Logistics Task

67
Q

Identify and record the security-related trends of incidents, problems, and maintenance and logistics actions.

A

Manage Results of the Security Aspects of Maintenance and Logistics Task

68
Q

Maintain traceability of system elements and the security aspects of maintenance actions and logistics actions performed.

A

Manage Results of the Security Aspects of Maintenance and Logistics Task

69
Q

Provide security-relevant configuration items from system maintenance to baselines.

A

Manage Results of the Security Aspects of Maintenance and Logistics Task

70
Q

A collection of activities focused on establishing and maintaining the integrity of products and systems, through control of the processes for initializing, changing, and monitoring the configurations of those products and systems.

A

Configuration Management (CM)

71
Q

An identifiable part of a system (e.g., hardware, software, firmware, documentation, or a combination thereof) that is a discrete target of configuration control processes.

A

Configuration (CI)

72
Q

A set of specifications for a system, or configuration item within a system, that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures. The baseline configuration is used as a basis for future builds, releases, and/or changes.

A

Baseline Configuration

73
Q

A comprehensive description of the roles, responsibilities, policies, and procedures that apply when managing the configuration of products
and systems.

A

Configuration Management Plan (CM Plan)

74
Q

Establishment of and charter for a group of qualified people with responsibility for the process of controlling and approving changes throughout the development and operational lifecycle of products and systems; may also be referred to as a change control board.

A

Configuration Control Board

75
Q

Methodology for selecting and naming configuration items that need to be placed under CM.

A

Configuration Item Identification

76
Q

Process for managing updates to the baseline configurations for the configuration item.

A

Configuration Change Control

77
Q

Process for assessing or testing the level of compliance with the established baseline configuration and mechanisms for reporting on the configuration status of items placed under CM.

A

Configuration Monitoring

78
Q

Basic parts include: (i) configuration control board, (ii) configuration item identification, (iii) configuration change control, and (iv) configuration monitoring.

A

Configuration Management Plan

79
Q

Involves the systematic proposal, justification, implementation, testing, review, and disposition of changes to the systems, including system upgrades and modifications.

A

Configuration Change Control

80
Q

Includes four phases: (i) planning, (ii) identifying and implementing configurations, (iii) controlling configuration changes, and (iv) monitoring.

A

Security-focused Configuration Management

81
Q

The policy and procedures documenting what is required for SecCM are completed.

A

SecCM Planning Phase

82
Q

The secure baseline for the system is developed, reviewed approved and implemented.

A

SecCM Identifying and Implementing Configuration

83
Q

The information system security engineer focuses on managing change to that the system remains in a secure operational state.

A

SecCM Controlling Configuration Changes

84
Q

The system is validated to ensure that it meets and is in compliance with organizational policy procedures.

A

SecCM Monitoring

85
Q

Performed after a change to ensure the system is still operating as intended and in a secure manner.

A

Verification & Validation

86
Q

Performed to verify the functionality and impact of a change.

A

Regression Testing

87
Q

A collection of activities focused on establishing and maintaining the integrity of products and systems, through control of the processes for initializing, changing, and monitoring the configurations of those products and systems.

A

Configuration Management (CM)

88
Q

Include: (i) purge, (ii) clear, and (iii) destroy.

A

Key Sanitization Methods

89
Q

Uses software or hardware products to overwrite storage space; goal is to replace target data with non-sensitive data; not useable with flash media.

A

Clear

90
Q

Includes overwrite, block erase, and cryptographic erase though the use of dedicated standardized device sanitize commands that apply media specific techniques to bypass the abstraction inherent in typical read and write commands; can’t be used on non-volatile non-magnetic storage.

A

Purge

91
Q

Includes the use of different types, techniques, and procedures to render data retrieval infeasible.

A

Destroy

92
Q

Addresses (i) permanent termination of system functions and delivery of services; (ii) permanent termination of personnel; (iii) transform the system and environment to an acceptable state; (iv) concerns for material, data, and information; and (v) transition the system and system elements for future use.

A

Formal Disposal Strategy

93
Q

Should be created to document the disposal results.

A

Certificate of Media Disposition