chapter 6 -security Flashcards
What indicates an effective security awareness program?
Effective in changing employee behavior
What detection System detects attacks by searching for specific patterns?
Signature-based intrusion detection system
What detection System monitors the general patterns of network traffic activity and creates a database of patterns?
neural network-based detection system
What detection system detects network traffic outside the scope of the routine activity flagged as abnormal?
statistical network-based IDS
What attack exploits existing code sequences in a program’s memory to perform malicious actions without injecting new code?
Return-oriented programming (ROP)
True or False?
IPS is both a detective and a preventive control.
IPS can’t reconfigure firewall rules.
IPS accepts or denies network traffic.
true, false, true
IPSs are configured to detect and prevent potential attacks on the IT environment and assets.
Some IPSs are also designed to reconfigure other security mechanisms, e.g., a firewall.
The IPS effectively limits damage to affected systems and must be appropriately configured to accept or deny network traffic correctly.
What is data diddling? How to detect it?
Data diddling is changing the data with malicious intent before it is entered into the system.
Detected by exception reports.
Exception reports highlight exceptions or deviations from the anticipated situation.
What implementation tier is this?
Organizational privacy risk management
practices are ad-hoc and not formalized. The
organization may be unaware of the full scope of its
privacy risks.
Tier 1 (Partial)
What implementation tier is this?
The organization is aware of
privacy risks and has certain practices approved by
management, but it lacks an organization-wide
approach.
Tier 2 (Risk-Informed)
What implementation tier is this?
A consistent organization-wide
approach to privacy risk management is in place. The
organization regularly reviews and updates its risk
management practices based on changes in privacy
risks.
Tier 3 (Repeatable)
What implementation tier is this?
The organization adapts its privacy
practices based on lessons learned and predictive
indicators. Privacy risk management is a part of the
organizational culture and evolves in a proactive
manner.
Tier 4 (Adaptive):
What standards should you use to provide a security assessment that involves documenting issues, findings, and recommendations?
Statements on standards for consulting services
Consulting services apply the CPA’s technical skills, education, experience, knowledge and observations.
What standards should you use to provide a SOC or compliance assessment?
Statements on standards for attestation engaements
For Defense in Depth describe which one is which
- Controls based on physical access to assets
- Controls based on policies and procedures
- controls that are applied by use of technology
- physical control - ex - surveillance cameras
- admin control - ex - Access control policies , security training
- technical control - ex - multifactor authentication
What does Layered Security say will never be secure?
Components