Domain 5 Flashcards
Security Operations
What is the most important aspect of security awareness/training?
Protecting health and human safety
Degaussing is
The process of reducing or eliminating an unwanted magnetic field (or data) stored on tape and disk media
Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way?
Data life cycle
Which of the following is the life cycle of data handling?
Create, store, use, share, archive, destroy
What do integrity services, provided by hash functions and digital signatures, allow a recipient to verify?
That a message has not been altered by malice or error
What is the purpose of security awareness training?
To align information security goals with the organization’s mission and vision
What is the primary purpose of storing passwords as hash values or digests?
To check if a password matches without revealing the password itself
What is the role of security engineers in data security?
Security engineers figure out who is trying to log in and assess security codes
How long does it take to crack a 10-number password using software with cryptographic calculation?
5 seconds
What is something that every security policy should have?
Consequences for non-compliance
Whaling attacks are
Phishing attacks that attempt to trick
highly placed officials or private individuals
with sizable assets into authorizing large
fund wire transfers to previously unknown
entities
What does the term “whaling attacks” refer to in the context of phishing?
Attacks against highly placed officials or individuals with sizable assets
What task is recommended for employees to practice what they’ve learned?
Sending simulated phishing emails
What solution is recommended for users who struggle to remember multiple passwords for different systems?
Encourage the use of a recommended password management solution
Why is asymmetric encryption considered more secure?
It involves a unique code for the sender and receiver
How does hashing respond to minor changes in the input, such as misspellings or changes in letter case?
It generates a different hash digest for each input
What is meant by the term rollback?
Restoring the system to its previous state before a change
Who is often tasked with coordinating the change management effort?
Information Security professionals
What is the first step in the change management process?
Request for Change (RFC)
Application Server
A computer responsible for hosting applications to user workstations
Asymmetric Encryption
An algorithm that uses one key to encrypt and a different key to decrypt the input plaintext
Checksum
A digit representing the sum of the correct digits in a piece of stored or transmitted digital data, against which later comparisons can be made to detect errors in the data.
Classification
Classification identifies the degree of harm to the organization, its stakeholders or others that might result if an information asset is divulged to an unauthorized person, process or organization. In short, classification is focused first and foremost on maintaining the confidentiality of the data, based on the data sensitivity
Configuration management
A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated
Data Loss Prevention (DLP)
System capabilities designed to detect and prevent the unauthorized use and transmission of information.
Degaussing
A technique of erasing data on disk or tape (including video tapes) that, when performed properly, ensures that there is insufficient magnetic remanence to reconstruct data
Digital Signature
The result of a cryptographic transformation of data which, when properly implemented, provides the services of origin authentication, data integrity, and signer non-repudiation.
Egress Monitoring
Monitoring of outgoing network traffic.
Hardening
A reference to the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems, and software, including operating system, web server, application server, application, etc. Hardening is normally performed based on industry guidelines and benchmarks, such as those provided by the Center for Internet Security (CIS)
Hash Function
An algorithm that computes a numerical value (called the hash value) on a data file or electronic message that is used to represent that file or message and depends on the entire contents of the file or message. A hash function can be considered to be a fingerprint of the file or message
Hashing
The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data.
Information Sharing
The requirements for information sharing by an IT system with one or more other IT systems or applications, for information sharing to support multiple internal or external organizations, missions, or public programs
Ingress Monitoring
Monitoring of incoming network traffic
Message Digest
A digital signature that uniquely identifies data and has the property such that changing a single bit in the data will cause a completely different message digest to be generated
Operating System
Operating System
The software “master control application” that runs the computer. It is the first program loaded when the computer is turned on, and its main component, the kernel, resides in memory at all times. The operating system sets the standards for all application programs (such as the Web server) that run in the computer. The applications communicate with the operating system for most user interface and file management operations.
Patch
A software component that, when installed, directly modifies files or device settings related to a different software component without changing the version number or release details for the related software component
Patch Management
The systematic notification, identification, deployment, installation and verification of operating system and application software code revisions. These revisions are known as patches, hot fixes, and service packs
Records Retention
A practice based on the records life cycle, according to which records are retained as long as necessary, and then are destroyed after the appropriate time interval has elapsed.
Remanence
Residual information remaining on storage media after clearing
Request for change (RFC)
The first stage of change management, wherein a change in procedure or product is sought by a stakeholder
Security Governance
The entirety of the policies, roles, and processes the organization uses to make security decisions in an organization.
Social engineering
Tactics to infiltrate systems via email, phone, text, or social media, often impersonating a person or agency in authority or offering a gift. A low-tech method would be simply following someone into a secure building
Symmetric encryption
An algorithm that uses the same key in both the encryption and the decryption processes
Web Server
A computer that provides World Wide Web (WWW) services on the Internet. It includes the hardware, operating system, Web server software, and Web site content (Web pages). If the Web server is used internally and not by the public, it may be known as an “intranet server.”
Whaling Attack
Phishing attacks that attempt to trick highly placed officials or private individuals with sizable assets into authorizing large fund wire transfers to previously unknown entities.