Chapter 8 Flashcards

1
Q

We further need to protect information and environments from…

A

Employees, contractors, partners, customers, service providers, and others

Inappropriate actions of human being may compromise our security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an RSA breach?

A

An example of social engineering attack

Hardware authentication tokens of RSA was stolen by attacking a company’s environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

We need a solid security awareness and training program to…

A

avoid social engineering attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

We need to consider following items to build security awareness among users

A
o protecting data 
o passwords
o social engineering
o network usage
o malware
o the use of personal equipment
o clean desk
o policy knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data protection is essential in business because of

A

o Reputation and customer retention

o Avoid any penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the practices of Data Protection?

A

o Regular training to educate employees and users

o May consider gamification techniques to increase users participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Most OSs and tools enforce certain levels of password strength:

A

at least eight characters, at least one upper case, at least one lower case, at least one symbol, at least one number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

balance the complexity of the password with the importance of what is being protected. For example…

A

bank account vs family photos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Use a policy of resetting password in a _____ interval

A

regular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

We can stipulate that new passwords cannot be a _____ of the previous 10 passwords used

A

variation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Users’ Mistakes include:

A
  • Write their password down and stick it to the underside of their keyboard
  • Passwords being shared among users
  • Passwords being created based on pet names, birthdates, or other such personal information
  • More damaging user behaviours is manually syncing passwords between systems or applications
  • Train employees and users to avoid the above actions
  • Users also need to use strong passwords in every applications and systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering refers to…

A

psychological manipulation of people into performing actions or divulging confidential information

•”Any act that influences a person to take an action that may or may not be in their best interests”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pretexting means:

A

Attackers establish fabricated scenarios to access victim’s sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Direct pretexting:

A

face-to-face communication

  • Attacker’s confidence or body language is important
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Indirect pretexting:

A

Over some communication medium

over the phone or through e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pretexting requires…

A

strong communication and psychological skills, specialized knowledge, and a quick mind in order to be successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Phishing happen mostly through…

A

mail, texting, or phone calls (electronic communications)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Phishing involves convincing the potential victim to click on a link in the e-mail to…

A

to send the victim to a fake site designed to collect personal information or credentials, or to have the victim install malware on their system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fake sites are usually well-known websites

A

Some sites are cleverly crafted; thus, difficult to distinguish from the legitimate pages that they are imitating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If the fake sites are not relevant for target victims, the attack will not be ______

A

successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Spear phishing is a…

A

targeted attack against a specific company, organization, or person

22
Q

The requirements for spear fishing are…

A

an advanced investigation to conduct a legitimate attack

The fake site may look valid

e-mail must be seen to come from a valid sender
E.g., from human resources, a manger, the corporate IT support team, a peer, or friend

23
Q

Tailgating is…

A

The act of following someone through an access control point

E.g., secure door

24
Q

Tailgating is common in locations that use _____ access controls

A

technical

25
Q

Tailgating attackers may play on the _______ of others

A

sympathies

26
Q

Network Usage involves…

A

wired vs. wireless OR closed vs. open networks

Institute, hotel, airport etc.

27
Q

An enterprise network gives _____ from outsiders.

o Foreign devices are not ______ in corporate network o Offer alternative network, e.g., _____ wireless network

A

protection

allowed

guest

28
Q

To protect resources in outside networks, one must:

A

o Implement a VPN to access the corporate network

o configure the VPN client to automatically connect the device to the VPN whenever it finds itself on a foreign network

29
Q

Users awareness about what devices they connect to which networks is important and how they need to handle _____ data that these devices might contain

A

sensitive

30
Q

We must train users about some _____ ____ to avoid malware

A

common items

31
Q

Common items for malware are (5 items):

A

1) mail attachments from people that you do not know
2) E-mail attachments containing certain file types (exe, zip, pdf, etc.)
3) Web links using shortened URLs such as http://bit.lyoWeb links using names that differ slightly from what we expect (myco.org when we expect myco.com)
4) Smart phone applications from nonofficial download sites
5) Pirated software

32
Q

Contact ______ for assistance in the presence of unfamiliar items

A

helpdesk

33
Q

Depending on policies employees may connect their ______ equipment to corporate or guest network

A

personal

34
Q

Noncorporate-owned devices such as vendor laptops or MP3 players may take a bit more work to ________

A

communicate

35
Q

Data needs to be handled appropriately regardless of ________ ___ _________ form

A

electronic or non-electronic

36
Q

Sensitive information is not to be left out on a desk when it is to be _______ for any significant period of time

A

unattended

37
Q

Sensitive data on physical media such as paper or tape needs to be disposed via

A

use of shred bins, data destruction services, media shredders, and so on

38
Q

How do you convey policies and regulations with which an organization must comply?

A

Convey most critical information

Some portion of this critical information should be condensed and communicated directly to users as a policy crib notes or highlights reel

39
Q

We need to modifying the behavior of users in our environments in the direction of being more ______

A

secure

40
Q

The security awareness and training program may consist of…

A

instructor-led or computer-based training

41
Q

Security training must happen…

A

o during the new-employee onboarding process
o at some regular interval
o followed up by a mandatory quiz or attestation of understanding by the person taking the training

42
Q

An effective way of training employees about security is

A

the gamification for training and educating users

43
Q

Humans are considered____when it comes to cyber security

a. Strong link
b. Weak link
c. Liability
d. Asset

A

b.Weak link

44
Q

In business, data protection is essential because of a.Reputation

b. Customer retention
c. Saving money
d. None of the above

A

a. Reputation

b. Customer retention

45
Q

A policy of changing password every _________ in a university with 30,000 users is considered a good practice.

a. 15 days
b. 30 days
c. 90 days
d. 120 days

A

c.90 days

46
Q

______ is the act of unauthorized individuals entering a restricted-access building following an authorized individual.

a. Tailgating
b. Pretexting
c. Vishing
d. Dumpster Driving

A

a.Tailgating

47
Q

In order to avoid malware, you must

a. Use pirated software
b. Download an exe
c. Avoid shortened URLs
d. None of the above

A

c.Avoid shortened URLs

48
Q

Why might we not want to allow personal equipment to be attached to the network of our organization

A

Answer: It is because a personal device may not have proper security and firewall configuration. Thus, the device can lead to compromising the enterprise network. The attackers can access the secured enterprise network through the non-secured personal device. Therefore, the enterprise can configure a guest wireless network to support personal equipment from employees.

49
Q

Why is it important not to use the same password for all of our accounts?

A

Answer: Using the same password for different services and applications is a bad practice. If the password is somehow disclosed or one of our accounts is compromised, then all our accounts can be compromised. It is better to use different and strong passwords for different accounts.

50
Q

Why might using the wireless network in a hotel with a corporate laptop be dangerous?

A

Answer: The WiFi in hotels, cafes, or airports is an open wireless network (WPA or WPA2). Thus, these locations are the sweet spots for packet sniffing and active hearing. Therefore, if someone connects a corporate device having sensitive information to such WiFi, hackers can easily access that information.