Chp. 11 Chapter Questions Flashcards
What factors have brought increased emphasis on network security?
- Numerous legal actions involving officers and directors of organizations
- Pronouncements by government regulatory agencies requiring controls
- Losses associated with computer frauds are greater on a per incident basis than those not associated with computers
- Recent highly publicized cases of viruses and criminally instigated acts of penetration
- Data is a strategic asset
- The rise of the Internet with opportunities to connect computers anywhere in the world (increased potential vulnerability of the organization’s assets)
- Highly publicized denial-of-service incidents
Briefly outline the steps required to complete a risk assessment.
- Develop risk measurement criteria
- Inventory IT assets
- Identify threats
- Document existing controls
- Identify improvements
Name and describe the main impact areas. Who should be responsible for assessing what is meant by low/medium/high impact for each of the impact areas? Explain your answer.
- impact areas
- Financial – revenue and expenses
- Productivity – business operations
- Reputation – customer perceptions
- Safety – health of customers and employees
- Legal – potential for fines and litigation
- Business leaders should make the decisions on the impact of each impact area because these are business decisions.
What are some of the criteria that can be used to rank security risks?
- Most damaging, most dangerous, most risky.
- Most sensitive, most critical to organization, most likely to cause political problems
- Most costly to recover, most difficult to recover, most time consuming to recover
- Greatest delay, most likely to occur
What are the most common security threats? What are the most critical? Why?
- Some of the more common security threats:
- viruses,
- theft of equipment,
- theft of information,
- device failure,
- natural disaster,
- sabotage,
- denial of services.
Explain the purpose of threat scenarios. What are the steps in preparing threat scenarios?
- Threat scenarios describe how an asset can be compromised by one specific threat. An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.
- steps:
- name the asset
- describe the threat
- explain the consequence (violation of confidentiality, integrity or availability)
- estimate the likelihood of this threat happening (high, medium, low)
What is the purpose of the risk score and how is it calculated?
- Risk scores are used to compare the risk scores among all the different threat scenarios to help us identify the most important risks we face.
- It is calculated by multiplying the impact score by the likelihood (using 1 for low likelihood, 2 for medium likelihood, and 3 for high likelihood).
In which step of the risk assessment should existing controls be documented?
Documenting existing controls is the fourth step in the process, between identifying threats and identifying improvements.
What are the four possible risk control strategies? How do we pick which one to use?
- The risk control strategies are to:
* accept the risk, mitigate it, share it, or defer it. - Selection of a strategy depends on things such as the impact (positive or negative) of the risk, the likelihood of the event occurring, and the cost.
Why is it important to identify improvements that are needed to mitigate risks?
risks are always changing and responses (including technologies) are changing as well.
What is the purpose of a disaster recovery plan? What are the major elements of a typical disaster recovery plan?
- A disaster recovery plan should address various levels of response to a number of possible disasters and should provide for partial or complete recovery of all data, application software, network components, and physical facilities.
- backup and recovery controls that enable the organization to recover its data and restart its application software should some portion of the network fail.
What is a computer virus? What is a worm?
- A computer virus is an executable computer program that propagates itself (multiplies), uses a carrier (another computer program), may modify itself during replication, is intended to create some unwanted event.
- A worm is a special type of virus that spreads itself without human intervention. Worms spread when they install themselves on a computer and then send copies of themselves to other computers, sometimes by e-mail, sometimes via security holes in software.
Explain how a denial-of-service attack works.
- A DOS attacks works by an attacker attempting to disrupt the network by flooding it with messages so that the network cannot process messages from normal users.
- The simplest approach is to flood a Web server, mail server, and so on, with incoming messages. The server attempts to respond to these, but there are so many messages that it cannot.
How does a denial-of-service attack differ from a distributed denial-of-service attack?
- While the source of a denial-of-service (DoS) attack could be a single computer, a distributed denial-of-service (DDoS) attack could involve hundreds of computers on the Internet simultaneously sending messages to a target site.
Online backup allows you to back up data to a server across the Internet.
What is a disaster recovery firm? When and why would you establish a contract with them?
- Disaster recovery firms provide second level support for major disasters.
- Building a network that has sufficient capacity to quickly recover from a major disaster such as the loss of an entire data center is beyond the resources of most firms.
What is online backup?
- Online backup allows you to back up data to a server across the Internet.
People who attempt intrusion can be classified into four different categories. Describe them.
- four types:
- are casual computer users
- experts in security
- professional hackers who break into corporate or government computer for specific purposes
- organization employees who have legitimate access to the network, but who gain access to information they are not authorized to use.
There are many components in a typical security policy. Describe three important components.
- The name of the decision-making manager who is in charge of security.
- An incident reporting system and a rapid response team that to respond to security breaches in progress.
- A plan to routinely test and update all security controls that includes monitoring of popular press and vendor reports of security holes
What are the three major aspects of intrusion prevention (not counting the security policy)?
- securing the network perimeter,
- securing the interior of the network,
- authenticating users.
How do you secure the network perimeter?
- There are three basic access points into most organizational networks: from LANs, the Internet, and WLANs.
- One important element of preventing unauthorized users from accessing an internal LAN is through physical security.
- A firewall is commonly used to secure an organization’s Internet connection.
- NAT is a common security measure that can be used as well.
What is physical security and why is it important?
- Physical security refers to policies and procedures that are designed to prevent outsiders from gaining access to the organization’s offices, server room, or network equipment facilities.
- only authorized personnel can enter closed areas where servers and network equipment are located or access the network.
What is eavesdropping in a computer security sense?
- Eavesdropping refers to the process of unauthorized tapping into a computer network through local cables that are not secured behind walls or in some other manner.
What is a sniffer?
- A sniffer program records all messages received for later (unauthorized) analysis.
A firewall is a router, gateway, or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization’s network
How do you secure dial-in access?
- strategies:
- changing the modem telephone numbers periodically,
- keeping the telephone numbers confidential,
- requiring the use of computers that have an electronic identification chip for all dial-up ports.
- use a call-back modem