Lecture 12 Flashcards

1
Q

What is social engineering?

A

Psychological manipulation to trick people into making security mistakes or giving away sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who was Kevin Mitnick?

A

Once known as the world’s most-wanted hacker, later became a security consultant; famous for using social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to Kevin Mitnick, what is the biggest threat to a company’s security?

A

The human element, not technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Information Security Governance?

A

Information Security Governance is the system by which an organization directs and controls its information security efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is COBIT?

A

A framework to help organizations develop, implement, and monitor IT governance and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two examples of COBIT control practices.

A

Using unique user IDs and conducting regular reviews of user access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between effective and non-effective security governance?

A

Effective governance involves active senior management participation and accountability; non-effective governance neglects information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a security policy?

A

A high-level, broad statement outlining an organization’s security goals and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are procedures and processes in security?

A

Step-by-step instructions on how to implement security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are standards in security management?

A

Mandatory elements detailing how a policy is to be enforced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are guidelines in security management?

A

Recommended but not mandatory steps related to a policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should an organizational security policy address?

A

Scope, purpose, IT security requirements, risk management, incident handling, training, and business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of an IT Security Officer?

A

Oversees security strategies, policies, incident handling, and awareness programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of organizational security policies?

A

Acceptable use policy, access control policy, data protection policy, physical security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the four steps of the policy lifecycle?

A

Plan, Implement, Monitor, and Evaluate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is IT Security Management?

A

A process to protect critical assets in a cost-effective manner by identifying risks and applying safeguards.

17
Q

Who is responsible for security management?

A

Management, IT security staff, IT staff, users, third parties.

18
Q

Name a few information security job roles.

A

Chief Security Officer, Information Security Manager, Physical Security Manager, Security Technician.

19
Q

What is the purpose of security awareness programs?

A

To inform employees about security responsibilities and promote a security-conscious culture.

20
Q

What is ISO 27002?

A

A code of practice providing guidelines for organizational information security management and controls.

21
Q

What is ISO 27001?

A

Specifies the requirements for establishing and maintaining an Information Security Management System (ISMS).

22
Q

What is the difference between ISO 27001 and ISO 27002?

A

ISO 27001 defines how to manage security controls; ISO 27002 provides best-practice security controls.

23
Q

Why is asset management important?

A

To understand what needs protection and how much investment it requires.

24
Q

What are key elements of human resource security?

A

Background checks, security training, proper termination procedures.

25
What is the goal of security during hiring?
Ensure new hires understand security responsibilities and reduce risks like theft or misuse.
26
What must employment agreements include?
Confidentiality agreements, acknowledgment of security policies, employee responsibilities.
27
What are essential during employment?
Awareness programs, least privilege, separation of duties, and reducing human error risks.
28
What is important during termination of employment?
Removal of access rights, retrieval of assets, and notifying security departments.
29
What are concerns related to email and Internet use policies?
Productivity loss, malware risk, inappropriate online conduct.
30
Why have security incident response procedures?
For quick recovery, legal compliance, and learning from incidents.
31
What is physical security?
Measures like fences, locked doors to protect access to sensitive areas.
32
What is access control?
Managing and restricting access to data, services, and systems.
33
Why consider security during systems development and maintenance?
To maintain operational security through patches, secure support, and proper project management.
34
What is business continuity planning?
Measures ensuring operations can continue after major failures or disasters.
35
What is compliance in security management?
Meeting legal, regulatory, and contractual obligations while minimizing business process disruptions.
36
What is PCI-DSS?
A standard for organizations that handle credit card data, ensuring secure payment processing.
37
What is IT Security Operations?
Managing daily operations to ensure security of people, applications, and assets post-implementation.
38
What is a Security Operations Center (SOC)?
A facility for monitoring, assessing, and protecting enterprise IT systems and networks.