IS 414 CH. 8 Flashcards

1
Q

Trust Services Framework organizes IT-related controls into five principles

A
  1. Security
  2. confidentiality
  3. privacy
  4. processing integrity
  5. availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Security
A

access (both physical and logical) to the system and its data is controlled and restricted to legitimate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. confidentiality
A

sensitive organizational information (marketing plans, trade secrets) is protected from unauthorized disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. privacy
A

personal info about customers, employees, suppliers, or business partners is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. processing integrity
A

data are processed accurately, completely, in a timely matter, and only with proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. availability
A

the system and its information are available to meet operational and contractual obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

info security

A

foundation of systems reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security management issue too, not only technology

A

step 1. assess the information security-related threats that the organization faces and select an appropriate response
step 2. developing info security policies and communicating them to all employees
step 3. acquisition or building of specific technology tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

defense-in-depth

A

employing multiple layers of controls to avoid a single point-of-failure
involves the use of a combination of preventive, detective, and corrective controls

P = time it takes attacker to break throught
D = time it takes to detect
C = time it takes to respond
if P > D + C = effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

time based model of security

A

implementing a combo of preventive, detective, and corrective controls that protect info assets long enough to enable an organization to recognize the attack is occurring and take steps to thwart it before any information is lost or compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Understanding targeted attacks

A
  1. conduct reconnaissance (research) - learn as much as possible about the target to identify vulnerabilities
  2. Attempt social engineering
  3. Scan and map target - if the attacker cannot successfully via social engineering, will identify points of remote entry
  4. Research - find version of software, research vulnerabilities for those programs
  5. execute the attack
  6. cover tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Preventive control

A

people - creation of a “security aware” culture, training
processes - under access controls (authentication and authorization)
IT solutions - antimalware, network access controls (Firewalls, intrusion prevention systems, etc), device and software hardening (config. controls), encryption
physical security - access controls (locks, guards)
change controls and change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Detective

A

log analysis
intrusion detection systems
penetration testing
continuous monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

corrective

A

computer incident response teams
chief info security officer
patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

authentication

A

verifying the identity of the person or device attempting to access the system

  1. something they know (password, pin)
  2. something they have (smart cards, ID badges)
  3. something physical or behavioral characteristic aka biometric identifier (fingerprints, typing patterns)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

biometric identifier

A

physical or behavioral characteristic that is used as an authentication credential

17
Q

multifactor authentication

A

2+ types of authentication

18
Q

multimodal authentication

A

use of multiple authenticaiton creds of the SAME type

19
Q

authorization

A

process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform

20
Q

access control matrixx

A

table used to implement authorization

21
Q

compatibility test

A

matching the user’s authentication creds against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action

22
Q

IT solutions: Anti-malware controls

A
  1. Malicious software awareness education
  2. Installation of anti-malware protection tools on all devices
  3. Centralized management of patches and updates to anti-malware software
  4. Regular review of new malware threats
  5. filtering of incoming traffic to block potential sources of malware
  6. training employees not to install shared or unapproved software
23
Q

border router

A

device that connects an organizations information system to the internet

24
Q

firewall

A

special-purpose hardware device or software running a general-purpose computer that controls both inbound and outbound communication between the system and behind the firewall and other networks

25
Q

demilitarized zone

A

separate network located outside the organizations internal info systems that permits controlled access from the internet

26
Q

router

A

special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send (route) the packet next

27
Q

how info flows on networks

A

Transmission protocol TCP header: contains fields that specify the sequential position of that packet in relation to the entire file and the port numbers (addresses) on the sending and receiving devices from which the file originates and where it is to be reassembled

Internet protocol (IP) header - specify the network address (IP address) of the sending and receiving devices

Ethernet header - contains the MAC addresses of the sending and receiving device, which is used to control the flow of traffic on the local area network (LAN)

28
Q

access control list (ACL)

A

a set of IF THEn rules used to detemine what to do with arriving packets

29
Q

packet filtering

A

a process that uses various fields in a packet’s IP and TCP headers to decide what to do with the packet

30
Q

deep packet inspection

A

a process that examines the data in the body of a TCP pack to control traffic, rather than looking only at the information in the IP and TCP headers

31
Q

intrusion prevention system

A

software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks

32
Q

endpoints

A

collective term for the workstations, servers, printers, and other devices that comprise an organization’s network

endpoint configuration, user account management, software design

33
Q

vulnerability scanners

A

tools designed to identify whether a given system possesses any unused and unnecessary programs that represent potential treats

34
Q

change controls and change management

A

formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability

35
Q

log anaylsis

A

process of examining logs to identify evidence of possible attacks

36
Q

intrusion detection system

A

system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions

37
Q

Comp incident response team (CIRT)

A

team that is responsible for dealing with major security threats

  1. Recognition that a problem exists
  2. Cotainment of the prob
  3. Recovry
  4. Follow up
38
Q

exploit

A

program take advantage of a known vulnerability