Chapter 9 Implementing Controls to protect assets Flashcards
Two vulnerabilities associated with poor asset management?
broadly, not relating to a single asset.
Architecture and design weakness, this relates to how the asset fits within all facets of the organization, network management etc. An approval process limits this.
System sprawl and undocumented assets: Asset management begins before purchase, it evaluates whether there are too many systems etc. It must also be tracked and managed. Without management issues can arise.
What is the concept of defence-indepth?
Layered security, implementing security at several layers, so if one fails, there is another.
How does diversity contribute to defence-indepth? List some examples
Use of different methods to diversify risk, such as vendor products (different firewalls), technology use (implementing lots of different types, cctv, biometrics, and barracades). Control diversity (Using physical, technical and administrative controls, firewalls+server room locks+pen testing).
You’re tasked with creating a secure area, could be a network or server room, what are some options you could consider?
Air gapping a network (depending on what it is), vaults (protecting valuable items, locking inside), Faraday cage (protection against EMF),
How does a hot and cold isle work?
Hot isle, airflow comes out the back, the back of cabinets will all be facing one another. Cold is the opposite. Prevents hot and cold air mixing. Saves energy, lower fan speeds etc.
Card skimming vs card cloning
Skimming - capturing at POS, ATM, terminal, skimming the device
Cloning - Using stolen data to clone an entire card, more difficult now with chips that encrypt data.
List a few redundancies for the following:
Disk
Network
Server
Power
Site
Disk- RAID arrays
Network - NIC teaming, network load balancers
Server - Load balancers
Power - UPS, generators
Site - hot/cold sites
A file is spread across multiple physical disks, what is this called and what array uses this? and only this. List an advantage of this method and a disadvantage
Raid 0 , it is striping, provides better read/write performance, but it is not providing any fault tolerance/redundancy.
What type of disk array writes what is on one disk to the other disk? name the one that does this in isolation only. Advantages? disadvantages?
Raid 1, it is mirroring. it has fault tolerance, you can lose half the disks and still operate. However, it requires more disk/hardware.
What is parity in raid arrays? what raids have parity?
Parity is a calculated value that’s used to restore data from the other drives if one of the drives in the set fails. Raid 5 & 6.
What does a raid 5 contain? How many disks, and what is contained within these?
Raid 5 an be three or more disks. They are all striped together. They also contain parity information across these disks. Provides fault tolerance/ data redunancy.
What does a raid 6 contain? how many disks?
Raid 6 requires minimum 4 disks. Has an extra parity block to it. Conceptually same as 5, striping + parity. can still operate even if 2 drives fail, unlike raid 5 = if 2 fail, then its game over.
Of the raids, which provide fault tolerance and why?
Raid 1, 5 and 6. Raid 1 has mirroring, raid 5 and 6 have parity data.
What raids can survive 1 disk failure and only 1 (providing they have the minimum required disks for that class)
Raid 1 (mirroring) and raid 5 (striping with parity) at 2 and 3 disks.
Which can survive 2 disk failures providing they have the minimum of that class?
raid 6. Has min 4 disks.