Chapter 8: Security Flashcards

1
Q

Concepts of Security

A
  1. security is a management issue
  2. the time based model of security
  3. Defense in Depth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security as a management issue:

A
  1. create pro-active culture
  2. inventory information assets and resources
  3. implement mitigation
  4. monitor effectiveness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 basica management activities called domains:

A
  1. Plan and Organize
  2. Acquire and Implement
  3. Deliver and Support
  4. Monitor and Evaluate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5 information systems controls that most directly pertain to systems reliability

A
  1. security
  2. confidentiality
  3. privacy
  4. process integrity
  5. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Defense-in-depth

A

employ multiple layers of controls in order to avoid having a single point of failure PDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Time-based model of security

A

employ a combination of detective and corrective controls that identify an information security incident early enough to prevent the loss or compromise of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basic steps criminals use to attack an organizations Information system:

A
  1. Conduct reconnaissance
  2. Attempt Social Engineering
  3. Scan and Map the Target
  4. Research
  5. Execute the attack
  6. cover tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens during conducting reconnaissance

A

collecting information about the target. The objective is to learn as much as possible about the target and to identify potential vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens during social engineering

A

use information obtained during reconnaissance to ‘trick’ an unsuspecting employee into granting them access - social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventive Controls

A
  1. Training
  2. user Access Controls (authenticate/authorize)
  3. Physical Access controls
  4. network access controls
  5. Device and software hardening controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Detective Controls

A
  1. Log analysis
  2. Intrusion Detection Systems
  3. Security testing and audits
  4. managerial reports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Corrective Controls

A
  1. Computer Incident Response teams (CIRT)
  2. Chief Information Security Officer (CISO)
  3. Patch management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Passwords are a type of

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication

A

the process of verifying the identity of a person or device attempting to access the system. The objective is to ensure that only legitimate suers can access the system. ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of Authentication

A

Smart card id badges
Biometrics
Secure ID systems
Combine into multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Multifactor Authentication

A

use of two or all 3 types of authentications in conjunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Multimodal Authentication

A

using multiple credentials of the same type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Authorization

A

the process of restricting access of authenticated users to specific portions of the system and limit what actions they are permitted to perform. Restrict users functions and views.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Access Control Matrix

A

how authorization controls are often implemented. When an employee attempts to access a particular information systems resource, the system performance a compatibility test that matches the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Security equation

A

P > D+C

21
Q

Security

A

Access to the system and its data is controlled and restricted to legitimate users

22
Q

Confidentiality

A

Sensitive organizational information is protected from unauthorized disclosure

23
Q

Privacy

A

personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure.

24
Q

Processing Integrity

A

Data are processed accurately, completely, in a timely manner, and only with proper authorization.

25
Q

Availability

A

the system and its information are available to met operational and contractual obligations

26
Q

Transmission Control Protocol (TCP)

A

specifies the procedures for dividing files and documents into packets to be sent over the internet and the methods for reassemble of the original documents or file at the destination.

27
Q

Internet Protocol (IP)

A

specifies the structure of those packets and how to route them to the proper destination.

28
Q

Border Router

A

connects an organizations information system to the internet. Captures packets addressed to the organization.

29
Q

Static Packet Filtering

A

screen individual IP packets based solely on the contents of the source and destination fields in the IP header - performed by border routers.

30
Q

Access Control List (ACL)

A

a set of rules which determines which packets are allowed entry and which are dropped off. Which packets are allowed entry and which are dropped.

31
Q

Fire wall

A

inspects packets and filters out unacceptable and risky packets.

32
Q

Stateful packet filtering

A

Creates and maintains a table in memory that lists all established connections between the organizations computers and the internet. Firewall consults this table to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer.

33
Q

Demilitarized Zone (DMZ)

A

a separate network that resides outside the internal network that permits controlled access from the INternet to selected resources, such as organization’s E-commerce web server,

34
Q

router

A

special purpose devices designed to read the destination address fields in the IP packet headers to decided where to send the packet next.

35
Q

Deep packet inspection

A

reads content of packet for inappropriate code, commands, data.

36
Q

Intrusion prevention systems (IPS)

A

monitor patterns, rather than only inspecting individual packets, in packet traffic to identify attackers.

37
Q

who can change configuration or load software

A

only administrator

38
Q

what can the administrator do

A

change configuration or load software.

39
Q

Hardening

A

process of modifying the default configuration of endpoints to eliminate unnecessary settings and services.

40
Q

Log Analysis

A

the process of examining logs to id evidence of possible attacks.

41
Q

Intrusion Detection Systems (IDS)

A

consist of a set of sensors and a central monitoring unit that create logs of network traffic that was permitted to pass the firewall and then analyze those logs for sings of attempted or successful intrusion.

42
Q

key performance indicators relevant to information security:

A
  1. # of incidents with business impact
  2. % of users who do not comply with password standards
  3. % of cryptographic keys compromised and revoked.
43
Q

Penetration test

A

an authorized attempt by either an internal audit team or an external security consulting firm to break into an organization’s information system.

44
Q

Computer Incident Response team (CIRT)

A

911 call to immediately take action. responsible fro dealing with major incidents, and is a key component to being able to responds to security incidents promptly and effectively.

45
Q

CIRT 4 steps.

A
  1. recognition that the problem exists
  2. containment of the problem.
  3. recovery
  4. follow up
46
Q

Chief Information Security Officer (CISO)

A

senior executive who can implement effective security policies and technologies.

47
Q

Patch Management

A

vendors constant fix bugs, close vulnerabilities and add functionality. Must be applied timely

48
Q

Cloud Computing

A

connection and traffic over internet. Data and applications at third party, co-mingled operations.

49
Q

Server Virtualization

A

run multiple systems on one machine because there is more risk on a single device.