IS3110 CHAP 8 Flashcards
A check to see if an organization is following rules and guidelines. A vulnerability assessment check to see if internal policies are followed
Audit
A series of events recorded in one or more logs. It records who, what, where, and when. They can be in operating system logs like the MicrosoftSecurity log, or application logs like a firewall log.
Audit trail
A formal process requiring that changes be made only after they have been reviewed and submitted. This reduces outages caused by unauthorized changes.
Change management
___ testing that tries to exploit vulnerabilities. Vulnerability testing identifies potential vulnerabilities, and ___ determines if the vulnerabilities can actually be exploited. ___ can take down systems.
(All blanks are the same term)
Exploit testing
A report created by comparing exploits that should be controlled, with the exploits that are controlled. Any uncontrolled exploits represent a gap in analysis. A ___ is often performed when an organization is trying to comply with legal requirements such as HIPAA.
Gap analysis
A security principle that grants users only the minimum rights and permissions needed to perform their job. This is similar to the need-to-know principle. However, the need-to-know principle focuses only on permissions for data, not rights.
Least-privilege principle
A security principle that grants users access only to the data they need to perform their job. This is similar to the least-privilage-principle. However, the least-privilege principle includes rights and permissions, while the ___ principle focuses only on permissions for data.
Need-to-know principle
Testing performed to see if a vulnerability can be exploited. ___ is done after a vulnerability assessment. It can be invasive and can take systems down.
Penetration testing
Tactics used to trick people into revealing sensitive information or taking unsafe actions. ___ tactics include conning people over the phone or in person. It also includes phishing and other technical tactics.
Social engineering
An attempt that targets a specific company. ___ looks as if it came from someone within the company and is more successful against unaware employees.
Spear phishing
A process used to identify and evaluate potential threats. The goal is to identify as many potential threats as possible. These threats are then evaluated to determine the likelihood of the threat.
Threat assessment
A database term that allows several database statements to succeed as a whole, or if any single statement fails, the entire ___ fails. A failed ___ is not applied to the database.
Transaction
- The two major categories of threats are human and ___.
Natural
- A threat is any activity that represents a possible danger, with the potential to affect confidentiality, integrity, or availability.
TRUE OR FALSE
FALSE
- Which of the following methods can be used to identify threats?
- Review historical data
- Perform threat modeling
- 1 & 2
- None of above
Review historical data
Perform threat modeling