Information Security Flashcards

1
Q

What are the three threat categories in information asset protection?

A

Intentional,
Natural,
Inadvertent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kinds of companies are particularly vulnerable to counterfeiting and piracy?

A

Startups,
Early stage firms,
Small and medium size companies that are rich in intangible assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to the FBI, what are the six steps of protecting a business from espionage?

A

Recognize the (insider or outsider) threat,
Identify and valuate trade secrets,
Implement a proactive plan for protecting trade secrets,
Secure physical and electronics versions of trade secrets,
Confine intellectual knowledge to “need to know”,
Train employees on intellectual property protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does layered protection apply to information protection?

A

Apply multiple levels of protection to information assets,
Ensure that layers of protection complement each other,
Build a coordinated strategy that integrates families of protective measures (e.g. technical, physical, access control).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access to internal information should be restricted to which groups?

A

Company personnel and those who have signed a nondisclosure agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How should obsolete Prototypes, models, and test items be disposed of?

A

They should be destroyed so they can’t be reversed engineered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a patent?

A

A patent is a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a trademark?

A

Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a copyright?

A

Legal protection of the expression of ideas in literary, artistic, and musical works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the best way to start addressing infringements of patents, copyrights, and trademarks?

A

By registering those rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How long is US patent protection?

A

20 years from filing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What qualifies something as a trade secret?

A

The information added value or benefit to the owner,
The trade secret was specifically identified,and the owner provided a reasonable level of protection for the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an intrusion detection system?

A

And intrusion detection system monitors for malicious programs and unauthorized changes to files and settings. It also monitors network traffic and provides alarms for network based attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three methods of sanitizing electronic media?

A

Overwriting,
Degaussing,
Physical destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two primary aspects of recovery after an information loss?

A

Return to normal business operations as soon as possible,

Implement measures to prevent a recurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During which stage of a project is critical information most vulnerable?

A

The intermediate phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When is it appropriate to recycle papers that contain proprietary information?

A

When the papers have been properly destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What access control protocol passes credentials between the reader and the control panel in plain text?

A

Wiegand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the difference between embedded and host based systems?

A

Embedded systems were typically programmed at the manufacturer and run proprietary or non-standard operating systems, e.g. cameras, card readers, and video converters.
Host based systems run on more standard operating systems such as windows and Linux and are easier to change.

20
Q

What are the two components of a legacy HID card?

A

A secret facility number,

An ID number that is printed on the card.

21
Q

What is a gecko?

A

A gecko is an inexpensive tool that can be used to give an intruder complete control over a door.

22
Q

What three aspects of information must be protected?

A

Confidentiality,
Integrity,
Availability.

23
Q

What is the fundamental equation of information systems security?

A

Residual Risk =

Threat x Vulnerabilities
————————————
Countermeasures

24
Q

What are the three categories of information system threat agents?

A

Nature,
People,
Virtual threats.

25
Q

What is the first job of a person tasked with an organizations information system security?

A

Create an information security management system appropriate for the size of the organization.

26
Q

What are the five general types of vulnerabilities of information systems?

A
Information systems infrastructure,
People using the infrastructure,
People maintaining the infrastructure,
Executive and senior management,
Information management processes.
27
Q

What are the five information systems infrastructure management counter measures?

A

Vulnerability and patch management,
System monitoring and log review,
Information system security metrics,
Physical security of the information system infrastructure,
IT staff training in information security.

28
Q

What are the seven layers of the open systems interconnect (OSI) network model?

A
Physical,
Data link,
Network,
Transport,
Session,
Presentation,
Application.
29
Q

What is a buffer overflow attack?

A

A buffer overflow attack occurs when a user or programmer gives a computer more information than the program is expecting. The extra characters may give the computer instructions to do some thing not originally intended.

30
Q

What is the “AAA triad” of information security with regard to access control?

A

Authentication,
Authorization,
Auditing/accountability.

31
Q

What is the IT infrastructure library

(ITIL)?

A

And international standard for managing IT - Particularly service-level agreements, the way an organization negotiates for IT security services.

32
Q

What is an escalation of privilege attack?

A

An escalation of privilege attack occurs when an email program is tricked into executing an email as if it were a program rather than text.

33
Q

What are the three major vulnerabilities of a printer?

A

They often connect to the network, so communications can be intercepted.
They may contain onboard memory, which must be wiped when printing confidential information.
The hardcopies they create can be taken from one place to another.

34
Q

What is a security information and event manager (SIEM)?

A

A security information and event manager is a device that looks at all the log activity on the network and attempts to point out what is most important to facilitate response to incursions and other problems on the network.

35
Q

What are ISO 27001 and 27002?

A

ISO 27001 and 27002 are the first acknowledged worldwide standards to identify a code of practice for the management of information security.

36
Q

What are the six elements of the payment card industry data security standard (PCI DSS)?

A

Build and maintain a secure network,
Protect cardholder data,
Maintain a vulnerability management program,
Implement strong access control measures,
Regularly monitor and test networks,
Maintain and information systems policy.

37
Q

According to ISO 27002, which three elements of guidance should information security policies include, at a minimum?

A

Definition of information security and its objectives/scope,
Statement of management intent,
Brief explanation of security policies/principles/standards important to the organization.

38
Q

What is the fundamental idea behind an information security management system?

A

Continual improvement.

39
Q

On what does the effectiveness of an information security program ultimately depend?

A

Peoples behavior.

40
Q

Which five information security systems (ISS) issues can also weaken physical security in a converged system?

A
Denial of services,
Insertion of incorrect data,
Data theft,
Data modification,
Data destruction.
41
Q

What are four main vectors via which network security systems can be attacked?

A

Social engineering,
Direct hacking,
Malware,
Web attack.

42
Q

What are three main reasons that malware is effective?

A

Out of date antivirus software,
Users open booby-trapped emails or websites,
System administrator’s allow users to install software on the desktop.

43
Q

What is cross site scripting?

A

A cross site scripting error on a website enables an attacker to run a malicious code from a second website on the browser of the person viewing the first website.

44
Q

What is cross site request forgery?

A

A cross site request forgery is an attack where the victim’s browser is tricked into issuing a command to a vulnerable web application.

45
Q

What is an injection attack?

A

An injection attack allows an adversary to execute a command directly on a database contrary to allowed access rights.