Chapter 7: Security Flashcards

1
Q

Managers must understand that breaches occur to?

A
  1. Clarify the picture of what is going on
  2. To understand their organization’s vulnerabilities,
  3. To protect their own company from damages caused by successful cyberattacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the five (5) key steps to a successful and holistic cybersecurity program?

A
  1. Identify
  2. Protect
  3. Detect
  4. Respond
  5. Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organizations ability to understand and manage cybersecurity risks.

A

Identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Activities that safeguard critical infrastructure services

A

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Activities to identify the occurrence of a cybersecurity event

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Activities to take action regarding a detected cybersecurity incident

A

Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident

A

Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Five (5) Key Information Security Decisions?

A
  1. Strategy
  2. Infrastructure
  3. Policy
  4. Culture
  5. Investments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An information security decision that is based on such IT principles as protecting the confidentiality of customer information, strict compliance with regulations, and maintaining a security baseline that is above the industry benchmark.

A

Information security strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

involve selecting and configuring the right tools to achieve consistency in protection, economies of scale, and synergy among the components.

A

Information security infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

guidelines for the organization’s activities, both technical and organizational, to increase cyber resilience.

A

Information security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybersecurity behaviors that are important to the success of the business

A

Cybersecurity culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

applying the basic system updates and patches offered from the vendors of systems

A

cybersecurity hygiene

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

decisions about the appropriate level of investment must be made jointly with the security expertise of the IT security managers and with the business priorities expertise of the business managers

A

Information security investments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

occur when unauthorized actors gain access to systems, passwords, data, or other assets.

A

Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sends a person a counterfeit e‐mail that purports to be from a known entity

A

phishing attack

17
Q

targeted attack, mimic a situation or relationship highly familiar to the targeted user

A

spear phishing

18
Q

Software that tracks keystrokes and stores them for hackers to inspect later

A

key logger

19
Q

Wi‐Fi connection and that all incoming and outgoing Internet traffic becomes routed through the perpetrator’s system

A

evil twin connection

20
Q

Traps that appear to lead users to their goal, but in reality, they lead to a fraudulent site that requires a log‐in

A

cross‐site scripting (XSS)

21
Q

What are the 7 common security Access Tools

A

1.Physical Locks
2.Passwords
3.Biometrics
4.Challenge Questions
5. Token
6. Text Message
7. Multi-factor Authentication

22
Q

What are the 7 common storage and transmission security tools

A
  1. Antivirus/Antispyware
  2. Firewall
  3. System Logs
  4. System Alerts
  5. Encryption
  6. WEP/WPA
  7. VPN
23
Q

Emphasizes security importance and instructs users on what they need to do to achieve safety

A

Security Policy

24
Q

What are the 7 Commonly used security Policies

A
  1. Security updates
  2. Networks
  3. Passwords
  4. Mobile Devices
  5. Data Disposal
  6. Social Media
  7. Security services
25
Q

Are hired to try to break into systems in an effort to help the client firm uncover weaknesses

A

white hat hackers.

26
Q

Individuals who break in to systems for their own gain or to wreak havoc on a firm

A

Black Hat Hackers

27
Q

test organizational systems without any authorization and notify a company when they find a weakness

A

Grey Hat Hackers

28
Q

SETA stands for what?

A

Security Education Training and Awareness

29
Q

WHat are the four (4) major areas for Education and Training

A
  1. Access Tools (Passwords/MFA Rules & How-to)
  2. BYOD (Rules and How-to)
  3. Social Media (Rules and Scenarios)
  4. Vigilance (Scenarios and How-to)
30
Q

Security breach in which a hacker counterfeits an Internet address

A

Spoofing

31
Q

The concept of having multiple layers of different security policies and practices so when one layer fails to stop a perpetrator, another layer might be more effective.

A

Defense in Depth

32
Q

WHat are the 3 typical components of a Defense in Depth Plan (PTA)

A
  1. Physical Barriers
  2. Technical Barriers
  3. Administrative Barriers