Chapter 8 Flashcards

1
Q

What is the idea of employing multiple layers of controls to avoid a single-point-of-failure?

A

Defense-In-Depth. Foir example - using not only firewalls but also multiple authentication methods (passwords, tokens, and biometircs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ExplAin the time-based model of security

A

Implementing a combination of preventive, detective, and cocrective controls that protect information assets long enough to enbale an organization to recognize tht an attack is occuring and take steps to thwart it before any information is lost or compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the P > D+C model in time-based security

A

P = Time is takes an attacker to break through an organization’s preventive controls. D is the time it takes to detect that attack is in prgress. C is the time it takes to respont and take corrective action, if P> D + C, then we good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Basic steps used by criminals to attack system?

A
  1. Conduct reconnaisance (learn as much as possible to identify weknesses)
  2. Attempt social engineering (deception to gain unauthorizaed access to information.
  3. Scan and map the target (if socialk engineeing didnt work, do more recon ton find potential points of remtoe entry)
  4. Research - (once identified targets, conduct research to see what programs sued, then find weaknesses)
  5. Execute attack
  6. Cover the tracks (create “back dorrs” that can be sued to obtain access if initial attack is discovered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

See table 8-1 p. 233 for a summary of predictive, detective, and corrective IS controls

A

See table 8-1 p. 233 for a summary of predictive, detective, and corrective IS controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of social engineering

A

over telephone (pretending to be an employee), spear phishing (sending e-mails as a relative and the employee opens a link to a virus), spreading USB’s around the driveway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIC’s are

A

Network Interface Cards - Unique identifiers on printers, workstations, or any computing device. They connects to the organizations internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ___ ___ matrix is often used to implement authorization controls

A

Access control matrix - see figure 8-4 p 237. It should be updated regularly to reflect changes in job duties due to promotions or transfers, so a n employee wont accumulate rights and privileges not right for segregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the compatibility test

A

matching user’s authentication credentials against the access control matrix to determine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventive Controls in regards to people?

A

Creation of a “securty-aware” culture

Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a limit check would be a

A

corrective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

three types of credentials to uniquely identify users

A
  1. biometic indentifiers
  2. smart cards or ID badges
  3. PIN’s and Passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

preventive controls from training people consists of

A

teaching people things like never divulging passwords, no piggybacking (letting people in), , teaching senior employees new things about teachnology. However, security training will only be effective if management clearly demonstrates that it supports employees who follow prescribed policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multifactor authentication vs multimodal authentication

A

Multifactor - used two or more TYPES of authentication in conjunction.

Multimodal - use the same type to achieve a greater level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication vs. Authorization

A

Authentication - Verifying the
identity of the person or device attempting to access the
system.

Authorization - the process of 
restricting access of authenticated users to specific portions 
of the system and limiting what 
actions they are permitted to 
perform.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

efficiency.
Like authentication controls, authorization controls can and should be applied not only
to people but also to devices. For example:

A

“example, including MAC addresses or digital certificates in the access control matrix makes it possible to restrict access to the payroll system and payroll
master files to only payroll department employees and only when they log in from their desktop or assigned laptop computer.”

17
Q

What is malware?

A

Malware (e.g., viruses, worms, keystroke logging software, etc.) is a major threat. Malware
can damage or destroy information or provide a means for unauthorized access.

18
Q

What might one be able to do with physical access to workstations?

A

“a keystroke logging device that captures a user’s authentication credentials,
thereby enabling the attacker to subsequently obtain unauthorized access to the system by
impersonating a legitimate user. Someone with unsupervised physical access could also insert
special “boot” disks that provide direct access to every file on the computer and then copy
sensitive files to a portable device such as a USB drive or an iPod. Alternatively, an attacker
with unsupervised physical access could simply remove the hard drive or even steal the entire computer.”

19
Q

Encryptions should be used for transmissions and ____ ___

A

data storage

20
Q

Define “Change control and change management”

A

the formal process used to ensure that modifications to hardware, software,
or processes do not reduce
systems reliability.

21
Q

Log analysis is the process of examining logs to idnetify evidence of possible attacks. It is especially important to analyze

A

failed attempys to log on / changes to the logs themsevles since they are not normally deleted or updated

22
Q

Intrustion Detection Systems (IDS) are

A

a system that creates
logs of all network traffic that
was permitted to pass the firewall and then analyzes those logs for signs of attempted or
successful intrusions.

23
Q

the team that deals with major security incidents are the

A

Computer Incident Response Team (CIRT)

  1. Recognition
  2. Containment
  3. Recovery
  4. Follow-up -

Steps may need to be taken to modify existing security policy and procedures to minimize the likelihood of a similar incident occurring in the future.

24
Q

Describe the CISO

A

who should be independent of other information
systems functions and should report to either the chief operating officer (COO) or the chief
executive officer (CEO). The CISO must understand the company’s technology environment
and work with the chief information officer (CIO) to design, implement, and promote sound
security policies and procedures. The CISO should also be an impartial assessor and evaluator of the IT environment. Accordingly, the CISO should have responsibility for ensuring
that vulnerability and risk assessments are performed regularly and that security audits are
carried out periodically.

25
Q

Exploits are

A

a program designed
to take advantage of a known
vulnerability.

26
Q

Patch management sounds simple, but why may it be difficult?

A

Patches represent modifications to already complex software. Consequently, patches sometimes create new problems
because of unanticipated side effects. Therefore, organizations need to carefully test the
effect of patches prior to deploying them; otherwise, they run the risk of crashing important
applications. Further complicating matters is the fact that there are likely to be multiple
patches released each year for each software program used by an organization. Thus, organizations may face the task of applying hundreds of patches to thousands of machines every
year.

27
Q

What is virtualization?

A

” running multiple
systems simultaneously on one
physical computer..”