Chapter 5 - Protection of information assets Flashcards
What is PBX (Private Branch Exchange)?
Private Branch Exchange is a sophisticated computer based switch that can be thought of as essentially a small, in house phone company for the organisation that operates it.
What are the risks associated with PBX?
Theft of service disclosure of information(Eavesdropping) Data modification Unauthorised access DoS Traffic Ananlysis
what is an EER (Equal Error Rate)?
EER is used to determine the performance of a biometric control device. It is the overall measurements of the false acceptance rate and false rejection rate.
The lower the EER, the more effective the biometric measurement is.
what is the objective of Data lead prevention?
DLP is designed to locate,monitor, and protect sensitive information fro the risks of unauthosied disclosure.
The objectives of DLP are:
- Locate and catalog sensitive information stored throughout the enterprise
- Monitor and control the movement of sensitive information across the enterprise nentworks and on end-user systems
What is a signnature-based IDS is most useful for?
To protect against known signature intrution patterns (privided by the vendor).IDS needs to be placed behind the firewall so it can monitor intriders that breach the firewall.
What is the benefit of using callback devices?
A callback feature provide an audit trail.It hooks into the access control software and logs all authorised and unauthorised access attempts, permitting the follow-up and further review of potential breaches.
Call forwarding is a means to bypass callback control
What is Secure Socket Layer (SSL)?
SSL is a standard security technology for establishing an encrypted Lin between a server and a client - typically a web server (website) and a browser, or a mail server and a mail client (e.g. Outlook).
A protocol that is used to transmit private documents thorough the Internet. The SSL protocol uses a private key to encrypt the data that is to be transferred through the SSL connection.
SSL uses a symmetric key for message encryption
The shortening of URL can increase which type of attack?
Phishing
What is the advantage of the Elliptical curve cryptography?
Limited bandwidth resources suitable for encrypting mobile devices
Much higher speed of encryption with shorter keys compare to the RSA encryption
What is the best way to ensure the complete encryption and authentication protocols exist for protecting information while transmitted?
Tunnel mode with IP security using the nested services of authentication header (AH) and encapsulating security payload (ESP). This is known as IPSecurity (IPSec).
What is Kerberos?
Kerberos is a network authentication protocol for client-server application that can be used to restrict access to the database to authorised users
What could cause eavesdropping of VoIP traffic?
Corruption of the Address Resolution Protocol (ARP) cache in Ethernet switches.
On an Ethernet switch there is a data table known as the ARP cache, which stores mappings between Media Access Controls (MAC) and IP addresses. During normal operations, Ethernet switches only allow directed traffic to flow between the ports involved in the conversation and no other ports can see that traffic However, if the ARP cache is intentionally corrupted with an ARP poisoning attack, some Ethernet switches simply “flood” the directed traffic to all ports of the switch which could allow an attacker to monitor traffic not normally visible to the port where the attacker was connected, and thereby eavesdrop on VoIP Protocol traffic
What is common gateway interface?
CGI scripts are an executable, machines-independent software program run on the server that can be called and executed y a web server.
A bug in the scripts may allow a user to get authorised access to the server and, from there, eventually to the organisation’s network
What is the role of a directory server in PKI?
Makes other users’ certificates available to application
What is chain of custody policy?
Chain of custody involves documentation of how digital evidence is acquired, processed, handled, stored and protected, and who handled the evidences and why. If there is no policy in place, it is unlikely that employees will ensure that the chain of custody is maintained during any data breach investigation