Information Security Flashcards
What is a firewall?
A firewall consists of hardware, or software, or both, that help detect security problems and enforce security policies on a computer system. Like a door with a lock for a computer system. There are multiple types, and levels, of firewalls.
Describe some characteristics of a “strong” (i.e., good) password.
At least eight characters long; uses both upper and lower case letters; uses at least one numeral; uses at least one special character; must be periodically changed.
Define “biometric controls.”
A physical characteristic is used to gain access instead of a password. Common choices for biometric controls include fingerprint or thumbprint, retina patterns, and voice print patterns. Biometric controls can be very reliable, but generally require special input equipment.
Why does multi-factor authentication increase control?
All authentication techniques may fail. Requiring multi-factor authentication procedures—the use of several separate authentication procedures at one time (e.g., user name, password, one-time password and fingerprint) enhances the authentication process.
Describe smart cards and identification badges.
These have identification information embedded on a magnetic strip on the card and require the use of additional hardware (a card reader) to read the data into the system. Depending on the system, the user may only need to swipe the card to log onto the system, or may need to key in other information in order to log on.
Describe the operation of “one-time” passwords.
The “one time” password derives from an algorithm which usually involves the date and time. The user enters this password along with their user name and personal password. Once received, the computer independently recalculates the “password.” If the entered value and computed value are the same, the computer then recognizes the individual.
List some examples of security tokens.
Includes (1) devices which provide “one-time” passwords that must be input by the user and (2) “smart cards” that contain additional user identification information and must be read by an input device.
Why are “one-time” passwords used by organizations?
They provide an additional level of authentication. Used to strengthen the standard password by requiring access to a physical device which displays a new “one-time password” every 30-60 seconds.
What are logical access controls?
Control electronic access to systems via internal and external networks.
Describe four electrical system risks.
- Failure (outage), 2. reduced voltage (brownout), 3. Sags, spikes, and surges, 4. Electromagnetic interference (EMI).
What purpose does setting file attributes serve?
This logically restricts the ability of the user to read, write, update, and/or delete records in a file.
Describe a good location site for a computer operations facility.
Climate controlled including air-conditioned; away from risks of natural disasters (fire, flood, humidity), away from windows. Not on a top floor or basement.
What purpose do file protection rings or locks serve?
Physically prevent the media from being overwritten.
Define “social engineering.”
A set of techniques used by attackers to fool employees into giving them access to information resources.
What considerations should be given by an organization regarding fire-suppression systems?
Such systems are required in IT operations. Need to be appropriate for electrical fires (not halon). Should be periodically inspected.