Domain1 Flashcards
If its indicate best practices and it is discretionary
guideline
the attacker pulled several pieces of generic info to determine a specific sensitive value
Inference attack
siphon off minute of money to accumulate large amount of funds
Salami attack
the attacker laters or change the contents of database
Data Diddling attack
framework is broadly adopted by thread modeling and threat intelligence org and widely used in many software packages and tools
MITRE’s ATTACK
STRIDE
PASTA
MITRE’s ATTACK
an individual should have the minimum set of permission to carry out their work
Least Privilege
no single person should have the right to perform two distinct task
Separation of Duty
notifications posted at each door reminding employees to be careful in allowing people
Directive control
Used when controls like lock are not sufficient and people need to put another control like signs,alarms.
Compensating Control
__ rely on a preponderance of evidence
Civil case
must be proven beyond reasonable doubt
Criminal case
How many years?
Patents
Copyright
Trademarks
Trade secret
Patents has shortest duration which is 20years; Copyright last 70years; Trademarks renewable indefintely and trade secret no expiration
After risk acceptance strategy what is next?
After risk acceptance strategy
Requiring callback authorizations on voice only requests are sample of
social engineering attack
BCP training should be done
quarterly
semi annual
annually