LAB3 - Policy Flashcards

1
Q

Why do organisations need security policies?

A

Policies define how things should be done in an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 9 things do security policies cover?

A

Internet usage, email, external devices, passwords, software, personal devices, disposal of equipment, backup, device hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defining reponsiblities

A

Who is reponsible for what, how to report concerns, reporting to staff/employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 security parameters

A

Password policy, acceptable software/installation/usage policy, device hardening parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Password policy - 3 dos

A

Create long password - harder to crack, combination of upper and lowercase letters and symbols - more complex, change password regularly - reduce the likelihood of someone working them out, limit length of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password policy - 4 don’ts

A

Make the password a single word - ‘dictionary hack’ may be used, use the name of children, pets, other familiar names, write it down, share it with others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 disadvantages of using non-approved software

A

Deliberately or accidently be affected with malware, support issues - bugs, incompatibility, licencing issues - not have the right to use the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 security parameters for acceptable software policy

A

List software applications approved for use, forbid installation on non-approved software, staff may make request for authorisation to install additional software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define disaster recovery policy

A

sets out how an organisation will repond to a variety of disasters to ensure staff can return to normal working as soon as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5 things to consider for disaster recovery policy

A

Who is reponsible for what, dos and don’ts for staff, defining backup process, timeline for data recovery, location alternative provision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 actions to take following a cyber attack

A

Investigate, respond, manage, recover, analyse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens at the Investigate stage (1)

A

Identify type of attack, when did it start, severity, what parts of system affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens at the Repond stage (2)

A

Depending on severity:

  • inform stakeholders
  • inform appropriate authorities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens at the Manage stage (3)

A
  • contain the attack: disconnect/shut down infected systems to prevent attack from spreading, preserve evidence for analysis
  • designated peronnel to manage the attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens at the Recover stage (4)

A

Disinfect digital systems, restore data from backups, return systems to full working order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens at the Analyse stage (5)

A

Identify source of attack, how was it able to gain access, modify procedures, policies, implement staff training