Domain 1. Security and Risk Management Flashcards
You attempt to access your online banking account and are redirected to another website. What is this and how to prevent it?
Pharming attack. Implement DNSSEC to prevent.
After you repair the user’s computer and ensure that the problem is fixed, what you should do next?
Provide the user with a list of the company’s approved software prior to taking any other action.
Best described as ignoring the cost of loss when replacement expenses are less than the cost to mitigate the problem.
For example: installing software that is known to have vulnerabilities.
Risk acceptance.
Determining the cost-effectiveness of mitigating the potential harm or loss to a company.
Risk management.
The process of evaluating threats to ascertain the amount of vulnerability they represent to a company.
Risk assessment.
Quantifying the weakness of an asset owned by the company.
Vulnerability assessment.
Involves storing and maintaining data and hardware in an offsite location so that the alternate assets can be used in the event that a disaster damages hardware and data at the primary facility.
Disaster recovery (DR).
The process of securing weak points in a security implementation. And attempts to close all avenues a malicious user could exploit to gain unauthorized access to a network.
Network hardening.
The process of simulating a malicious attack on a system to identify and exploit potential weaknesses in network security. And provides insight into the methods a malicious user might employ in an attempt to compromise a network.
Penetration testing.
Must endorse a company’s security policy in order to promote company-wide acceptance.
Responsible for ensuring that all of company’s assets, both physical and logical, are protected.
Senior management.
Indicates why a company should have employees acknowledge that they have read and understood the company’s security policy?
To ensure that the company is protected.
Not accurate regarding security policy best practices?
Policies need to be changed every year.
Policy reviews should include the following:
Need to be reviewed at least once per year.
Reviews should follow a formal process.
Should include an analysis of any security incidents that have occured.
To determine the precise components of the policy that need to be rewritten to obtain the desired outcome. And a process by which an existing security policy is compared to a desired outcome.
Gap analysis.
It’s a discretionary document. And provide helpful bits of advice to employees. Since they are discretionary, employees are not required to follow this, even though they probably should.
Guidelines.
A comprehensive security program includes the following components:
Policies, Procedures, Standards, Baselines, and Guidelines.
Provide a high-level overview of the company’s security posture, creating the basic framework upon which a company’s security program is based. Contains mandatory directives that employees must follow.
Policies.
A well-formed policy should include the following four elements:
Purpose - the reason the policy exists.
Scope - the entities that are covered by the policy.
Responsibilities - the things that covered individuals must do to comply with the policy.
Compliance - how to measure the effectiveness of the policy and the consequences for violating the policy.
Are low-level guides that explain how to accomplish a task. And are specific and providing as much as detail as possible. Step by Step. They are mandatory as well.
Procedures.
Define the technical aspects of a security program, including any hardware and software that is required.
Standards.
Provide a minimum level of security that a company’s employees and systems must meet.
Baselines.
Which documents are mandatory and which are discretionary?
Policies, Procedures, and Standards = Mandatory.
Guidelines and Baselines = Discretionary.
A guidelines you should not follow when creating a security policy?
Ensure that the policy is as comprehensive as possible.
Instead, you should keep the policy to two or three pages. The policy should be concise and as understandable as possible.
Sometimes called the information owner or the business owner, is responsible for classifying data. Typically a manager who maintains responsibility for the security of a particular information asset. They also assigned sensitivity labels to each asset (sensitivity label ensures that the data is accessible only be users who posses the appropriate level of clearance).
Data owner.