InfoSec Final Flashcards

1
Q

What is the assessment of physical and logical vulnerabilities in InfoSec and related systems. These systems may be technical/nontechnical. Prevention, Inside Out!

A

What is vulnerability testing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a set of security tests and evaluations that simulate attacks by a hacker or other malicious external source (ethical hack). Basically an authorized security test and evaluation. This is a control, Outside in!

A

What is penetration testing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are: scanners (tools designed to identify if a system represents security threats). Patch management and Endpoint Configuration.

A

What are examples of vulnerability testing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are: White box test (complete info), Black box test (high-level info), Gray box test (limited info).

A

What are examples of penetration testing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a generic outline that describes what the intended security control will look like. The framework/model basically outlines the organization-specific blueprint. The blueprint includes the details on how to get there.

A

What is an InfoSec framework/model?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is set of responsibilities & practices exercised with the goal of providing strategic direction by executive management, ensuring that objectives are achieved, ascertaining that risks are managed appropriately, and verifying that the enterprise’s resources are used responsibly.

A

What is good InfoSec Governance?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is The overall planning for unexpected adverse events.

A

What is Contingency Planning and why is it necessary?
Why is it necessary – the main goal of CP is to restore normal modes of operation with minimum cost and disruption to normal business activities as quickly as possible after an unexpected adverse event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 components of CP?

A

BIA, IR PLan, DR Plan, and BC Plan in that order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What (keep threats from happening, guard the perimeter). Firewalls, IPS, Proxy Servers, SETA.

A

Prevention Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(designed to find threats after they have occurred). Example: anti-malware, log monitors, SIEM, IDS

A

Detection Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(correct any threats procedurally that were found by the detective internal controls) Example: changes to a Firewall to block the recurrence of an attack. Forensic procedures, employee retention. CP plans.

A

Corrective controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of Risk Management

A

Ø Risk Identification (where and what is the risk)
Ø Risk Analysis (how severe is the current level of risk)
Ø Risk Evaluation (Is the current level of risk acceptable)
Ø Risk Treatment (What can be done to bring risk to acceptable level)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the following?
Ø Defense: Applying controls/safeguards that eliminate/reduce the remaining uncontrolled risk.
Ø Transference: Shifting risks to other areas or to outside entities.
Ø Mitigation: Reducing the impact to information assets.
Ø Acceptance: the decision to do nothing beyond the current level of protection to protect an information asset from risk, and to accept the outcome from any resulting exploitation
Ø Termination: Removing/discontinuing the information asset from the orgs operating environment.

A

Examples of Risk Treatment strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Prevent, Detect, Respond/Correct (PDR): Problems can be used to satisfy time-based model. Multiple controls, no single point of failure. Residual risk is always greater than 0. Layering to where the risk is below risk appetite.

A

Layers of Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Implementing a combination of p, d and r controls that protect info assets long enough to enable an org to recognize that an attack is occurring and thwart it. Dim & DaR encryption, multi-factor authentication, firewalls, WAN/LAN segmentation and role-based access, Host and App Hardening Pen and Vul. Testing, Lastly, Log monitoring (SIEM & DLP)

A

Time-Based Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does applying layers of defense to protect the perimeter? We PLAN by inventorying assets, analyzing our risks to develop security policy. Then PROTECT by implementing InfoSec Controls, then RESPOND by Monitoring and Revising when needed. Do it over again.

A

A Phased Approach to Implement InfoSec Program

17
Q

What Keeps monitoring for new and emerging threats, threat vectors, review and update policies regularly, change out initial controls when needed. Monitor and revise as needed.

A

Best Practices for Org with an Ineffective Program