Infosec Bootcamp Day 1 Flashcards

1
Q

Identification, Authentication, Authorization

A
  • Identification - identifying factors of user
  • Authentication - confirming identification of user
  • Authorization - once I&A is completed, system will authorize user based on permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protecting Integrity

A
  • Least privilege - only giving access based on need to know
  • Separation of duties - different parts of process is done by different personnel to ensure integrity of process
  • Rotation of Duties - determines if primary user is doing something wrong
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protecting Availability

A
  • Redundancy - multiple instances of critical components
  • **Fault Tolerance **- systems can suffer disruption and continue to run
  • Contingency Planning - i.e. Back up plans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Non-repudiation

A

Sender cannot deny having sent a message to recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bulk Data is typically sent with what kind of algorithm?

A

Symmetric!! i.e. AES, private key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Data owner
  • Data custodian
A

* data owner - classifies data and determines who needs access
* data custoadian - day to day activities; administer, maintain, protect data, back up data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deming Model

A

PDCA
* Plan
* Do
* Check
* Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GDPR drivers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OECD Fair Information Practices

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privacy Law

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Criminal Law
  • Common Law
  • Civil (Tort) Law
  • Administrative Law
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Code of Ethics

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Calculation of ALE

Tonardo is estimated to damage 50% of a facility if it hits. The value of the facility is $1,000,000. What is the probability of one tornado in ten years?

A

AV x EF = SLE
1,000,000 x .5 = 500,000
SLE x ARO = ALE
500k x 1/10 = 50k

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

STRIDE

A
  • Spoofing - false identity
  • Tampering - unauthorized changes
  • Repudiation - attacker deny having performed action
  • Information disclosure
  • Denial of service
  • Elevation of privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BIS
CFAA
ECPA
COPPA

A

Bureau of Industry and Security - sets regultaions on export of encryption products outside of U.S.

CFAA - computer fraud

ECPA - governemnt wiretap restrictions

COPPA - children’s online privacy protection act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Due Diligence vs Due Care

A

Due diligence is establishing a plan, policy, and process to protect the interests of an organization.

Due care is practicing the individual activities that maintain the security effort.

17
Q

During the annual review of the company’s deployed security infrastructure, you have been reevaluating each security control selection. How is the value of a safeguard to a company calculated

A

ALE before safeguard – ALE after implementing the safeguard – annual cost of safeguard

18
Q

Governance

A

compares the security processes and infrastructure used within the organization with knowledge and insight obtained from external sources.

19
Q

Gamification

A

Gamification is a means to encourage compliance and engagement by integrating common elements of game play into other activities, such as security compliance and behavior change.

20
Q

Renee’s organization is establishing a partnership with a firm located in France that will involve the exchange of personal information. Her partners in France want to ensure that the transfer will be compliant with the GDPR. What mechanism would be most appropriate?

A

The European Union provides standard contractual clauses that may be used to facilitate data transfer. That would be the best choice in a case where two different companies are sharing data. If the data were being shared internally within a company, binding corporate rules would also be an option. The EU/US Privacy Shield was a safe harbor agreement that would previously have allowed the transfer but that is no longer valid. Privacy Lock is a made-up term.

21
Q
  • GLBA
  • SOX
A

GLBA - regulations on how financial institutions handle private information belonging to their customers

SOX - mandates certain practices in financial record keeping and reporting for corporations

22
Q

Delphi Technique

A

qualitative risk assessment that seeks to rech an anonymous consensus

23
Q
  • Copyright
  • Patent
A
  • Copyright - i.e. Coding, music, 70 years after death of last author
  • Patent - i.e. invention, 20 year from time of submission to USPTO
24
Q

BCP vs DRP

A

BCP - continues operations during the disaster
DRP - recovery efforts to normalcy after disaster

25
Q

CIA

A
  • **Confidentiality **- most important in government agencies like FedRAMP, DOD; prevents unauthorized disclosure of sensitive information; encryption
  • **Integrity **- most important in banking/financial; prevent unauthorized modification to information - password security, hashing
  • Availability - most important in health industry and infrastructure (pipeline criss); prevent disruption in services and ensures information is available when needed; BC/DR
26
Q

Ignore Risk vs Accept Risk

A

In both scenarios, no action is done on the risk that is presented however when accepting risk, that means management has reviewed a control to determine the risk will be accepted whereas if a risk is ignored, there is no review of the risk, it is simply ignored and no action is done on the risk