Lecture 6 Flashcards

1
Q

?

Everyone in an organization needs to be trained and aware of information security; not every member needs formal degree or certificate in information security

Identify

1/3 ?

A

Security Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

?

When formal education for individuals in security is needed, an employee can identify curriculum available from local institutions of higher learning or continuing education

Identify

2/3 ?

A

Security Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

?

A number of universities have formal coursework in information security

Identify

3/3 ?

A

Security Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

?

Involves providing members of organization with detailed information and hands-on instruction designed to prepare them to perform their duties securely

Identify

1/2 ?

A

Security Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

?

Management of information security can develop customized in-house training or outsource the training program

Identify

2/2 ?

A

Security Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

?

One of least frequently implemented but most beneficial programs is the ? program

Identify

1/4 ?

A

Security Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

?

Designed to keep information security at the forefront of users’ minds

Identify

2/4 ?

A

Security Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

?

Need not be complicated or expensive

Identify

3/4 ?

A

Security Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

?

If the program is not actively implemented, employees begin to “tune out” and risk of employee accidents and failures increases

Identify

4/4 ?

A

Security Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

?

Continuous availability of info systems

Identify

1/3 ?

A

Continuity Strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

?

Probability high for attack

Identify

2/3 ?

A

Continuity Strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

?

Managers must be ready to act

Identify

3/3 ?

A

Continuity Strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

?

Prepared by organization

Identify

Continuity Strategies - 1/3 ?

A

Contingency Plan (CP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

?

Anticipate, react to, & recover from attacks

Identify

Continuity Strategies - 2/3 ?

A

Contingency Plan (CP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

?

Restore organization to normal operations

Identify

Continuity Strategies - 3/3 ?

A

Contingency Plan (CP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3 Components of Contingency Plan

Enumerate

Continuity Strategies - 3 Components of Contingency Plan

A
  • Incident Response (IRPs)
  • Disaster Recovery (DRPs)
  • Business Continuity (BCPs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

?

Focus on immediate response

Identify

Continuity Strategies - 1/3 Components of Contingency Plan

A

Incident Response (IRPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

?

Focus on restoring system

Identify

Continuity Strategies - 2/3 Components of Contingency Plan

A

Disaster Recovery (DRPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

?

Focus establish business functions at alternate site

Identify

Continuity Strategies - 3/3 Components of Contingency Plan

A

Business Continuity (BCPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

?

Before planning can begin, a team has to plan effort and prepare resulting documents

Identify

1/4 ? (continued)

A

Continuity Strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

?

??: high-level manager to support, promote, and endorse findings of project

Identify

2/4 ? (continued)

A
  • Continuity Strategies
  • Champion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

?

??: leads project and makes sure sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed

Identify

3/4 ? (continued)

A
  • Continuity Strategies
  • Project Manager
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

?

??: should be managers or their representatives from various communities of interest: business, IT, and information security

Identify

4/4 ? (continued)

A
  • Continuity Strategies
  • Team members
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

?

Investigate & assess impact of various attack

Identify

1/5 ?

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

?

First risk assessment – then ?

Identify

2/5 ?

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

?

Prioritized list of threats & critical info

Identify

3/5 ?

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

?

Detailed scenarios of potential impact of each attack

Identify

4/5 ?

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

?

Answers question: “if the attack succeeds, what do you do then?”

Identify

5/5 ?

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

5 BIA (Business Impact Analysis) Sections

Enumerate

5 BIA Sections

A
  • Threat attack identification & prioritization
  • Business Unit analysis
  • Attack success scenario development
  • Potential damage assessment
  • Subordinate Plan Classification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

5 BIA (Business Impact Analysis) Sections

?

  • Attack profile – detailed description of activities that occur during an attack
  • Determine the extent of resulting damage

Identify

1/5 BIA Sections

A

Threat attack identification & prioritization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

5 BIA (Business Impact Analysis) Sections

Threat attack identification & prioritization

  • ? - detailed description of activities that occur during an attack
  • Determine the extent of resulting damage

Identify

1/5 BIA Sections

A

Attack Profile

32
Q

5 BIA (Business Impact Analysis) Sections

?

  • Analysis & prioritization-business functions
  • Identify & prioritize functions within orgs units

Identify

2/5 BIA Sections

A

Business Unit analysis

33
Q

5 BIA (Business Impact Analysis) Sections

?

  • Series of scenarios showing impact
  • Each treat on prioritized list
  • Alternate outcomes (Best, worst, probable cases)

Identify

3/5 BIA Sections

A

Attack success scenario development

34
Q

5 BIA (Business Impact Analysis) Sections

?

  • Estimate cost of best, worst, probable
  • What must be done under each
  • Not how much to spend

Identify

4/5 BIA Sections

A

Potential damage assessment

35
Q

5 BIA (Business Impact Analysis) Sections

?

  • Basis for classification as disastrous not disastrous

Identify

5/5 BIA Sections

A

Subordinate Plan Classification

36
Q

?

covers identification of,
classification of, and response to an incident

Identify

1/3 ?

A

Incident Response Planning (IRPs)

37
Q

?

Attacks classified as incidents if they:
* Are directed against information assets
* Have a realistic chance of success
* Could threaten confidentiality, integrity, or availability of information resources

Identify

2/3 ?

A

Incident Response Planning (IRPs)

38
Q

?

?? is more reactive, than proactive, with the exception of planning that must occur to prepare IR teams to be ready to react to an incident

Identify

3/3 ?

A
  • Incident Response Planning (IRPs)
  • Incident Response (IR)
39
Q

?

Set of activities taken to plan for, detect, and correct the impact

Identify

1/3 ?

A

Incident Response

40
Q

?

??
* Requires understanding BIA scenarios
* Develop series of predefined responses
* Enables org to react quickly

Identify

2/3 ?

A
  • Incident Response
  • Incident Planning
41
Q

?

??
??? – intrusion detection systems, virus detection, system
administrators, end users

Identify

3/3 ?

A
  • Incident Response
  • Incident Detection
  • Mechanisms
42
Q

Incident Detection

4 Possible Indicators

Enumerate

Incident Response - Incident Detection - 4 Possible Indicators

A
  • Presence of unfamiliar files
  • Execution of unknown programs or processes
  • Unusual consumption of computing resources
  • Unusual system crashes
43
Q

Incident Detection

4 Probable Indicators

Enumerate

Incident Response - Incident Detection - 4 Probable Indicators

A
  • Activities at unexpected times
  • Presence of new accounts
  • Reported attacks
  • Notification form IDS
44
Q

Incident Detection

4 Definite Indicators

Enumerate

Incident Response - Incident Detection - 4 Definite Indicators

A
  • Use of dormant accounts
  • Changes to logs
  • Presence of hacker tools
  • Notification by partner or peer
  • Notification by hackers
45
Q

Incident Detection

4 Predefined Situation

Enumerate

Incident Response - Incident Detection - 4 Predefined Situation

A
  • Loss of availability
  • Loss of integrity
  • Loss of confidentiality
  • Violation of policy
  • Violation of law
46
Q

?

  • Actions outlined in the IRP
  • Guide the organization
    - Stop the incident
    - Mitigate the impact
    - Provide information recovery
  • Notify key personnel
  • Document incident

Identify

?

A

Incident Reaction

47
Q

?

  • Sever affected communication circuits
  • Disable accounts
  • Reconfigure firewall
  • Disable process or service
  • Take down email
  • Stop all computers and network devices
  • Isolate affected channels, processes, services, or computers

Identify

?

A

Incident Containment Strategies

48
Q

?

  • Get everyone moving and focused
  • Assess Damage
  • Recovery
    - Identify and resolve vulnerabilities
    - Address safeguards
    - Evaluate monitoring capabilities
    - Restore data from backups
    - Restore process and services
    - Continuously monitor system
    - Restore confidence

Identify

?

A

Incident Recovery

49
Q

?

  • Provide guidance in the event of a disaster
  • Clear establishment of priorities
  • Clear delegation of roles & responsibilities
  • Alert key personnel
  • Document disaster
  • Mitigate impact
  • Evacuation of physical assets

Identify

?

A

Disaster Recovery Plan (DRPs)

50
Q

?

Disaster recovery personnel must know their responses without any supporting documentation

Identify

1/3 ?

A

Crisis Management

51
Q

?

Actions taken during and after a disaster focusing on people involved and addressing viability of business

Identify

2/3 ?

A

Crisis Management

52
Q

?

?? responsible for managing event from an enterprise perspective and covers:
* Support personnel and loved ones
* Determine impact on normal operations
* Keep public informed
* Communicate with major players such as major customers, suppliers, partners, regulatory agencies, industry organizations, the media, and other interested parties

Identify

3/3 ?

A
  • Crisis Management
  • Crisis Management Team
53
Q

?

Outlines reestablishment of critical business operations during a disaster that impacts operations

Identify

1/3 ?

A

Business Continuity Planning (BCPs)

54
Q

?

If disaster has rendered the business unusable for continued operations, there must be a plan to allow business to continue functioning

Identify

2/3 ?

A

Business Continuity Planning (BCPs)

55
Q

?

Development of ? somewhat simpler than IRP or DRP; consists primarily of selecting a continuity strategy and integrating off-site data storage and recovery functions into this strategy

Identify

3/3 ?

A

Business Continuity Planning (BCPs)

56
Q

?

There are a number of strategies for planning for business continuity

Identify

1/4 ?

A

Continuity Strategies

57
Q

?

Determining factor in selecting between options usually cost

Identify

2/4 ?

A

Continuity Strategies

58
Q

?

In general there are three exclusive options: hot sites; warm sites; and cold sites

Identify

3/4 ?

A

Continuity Strategies

59
Q

?

Three shared functions: time-share; service bureaus; and mutual agreements

Identify

4/4 ?

A

Continuity Strategies

60
Q

?

??

  • Fully configured computer facilities
  • All services & communication links
  • Physical plant operations

Identify

1/6 ?

A
  • Alternative Site Configurations
  • Hot Sites
61
Q

?

??

  • Does not include actual applications
  • Application may not be installed and configured
  • Required hours to days to become operational

Identify

2/6 ?

A
  • Alternative Site Configurations
  • Warm Sites
62
Q

?

??

  • Rudimentary services and facilities
  • No hardware or peripherals
  • Empty room

Identify

3/6 ?

A
  • Alternative Site Configurations
  • Cold Sites
63
Q

?

??

  • Hot, warm, or cold
  • Leased with other orgs

Identify

4/6 ?

A
  • Alternative Site Configurations
  • Time-shares
64
Q

?

??

  • Provides service for a fee

Identify

5/6 ?

A
  • Alternative Site Configurations
  • Service bureau
65
Q

?

??

  • A contract between two or more organizations that specifies how each will assist the other in the event of a disaster.

Identify

6/6 ?

A
  • Alternative Site Configurations
  • Mutual agreements
66
Q

?

To get sites up and running quickly, organization must have ability to port data into new site’s systems

Identify

1/4 ?

A

Off-Site Disaster Data Storage

67
Q

?

??
* Transfer of large batches of data
* Receiving server archives data
* Fee

Identify

2/4 ?

A
  • Off-Site Disaster Data Storage
  • Electronic vaulting
68
Q

?

??

  • Transfer of live transactions to off-site
  • Only transactions are transferred
  • Transfer is real time

Identify

3/4 ?

A
  • Off-Site Disaster Data Storage
  • Journaling
69
Q

?

??

  • Duplicated databases
  • Multiple servers
  • Processes duplicated
  • 3 or more copies simultaneously

Identify

4/4 ?

A
  • Off-Site Disaster Data Storage
  • Shadowing
70
Q

Model for a Consolidated Contingency Plan

? supports concise planning and encourages smaller organizations to develop, test, and use IR and DR plans

Identify

1/2 Model for a Consolidated Contingency Plan

A

Single document set

71
Q

Model for a Consolidated Contingency Plan

? is based on analyses of disaster recovery and incident response plans of dozens of organizations

Identify

2/2 Model for a Consolidated Contingency Plan

A

Model

72
Q

The Planning Document

6 steps in contingency planning process

Enumerate

The Planning Document - 6 Steps in Contingency Planning Process

A
  • Identifying mission- or business-critical functions
  • Identifying resources that support critical functions
  • Anticipating potential contingencies or disasters
  • Selecting contingency planning strategies
  • Implementing contingency strategies
  • Testing and revising strategy
73
Q

?

  • When incident at hand constitutes a violation of law, organization may determine involving law enforcement is necessary
  • Questions:
    - When should organization get law enforcement involved?
    - What level of law enforcement agency should be involved (local, state, federal)?
    - What happens when law enforcement agency is involved?
  • Some questions are best answered by organization’s legal department

Identify

?

A

Law Enforcement Involvement

74
Q

Benefits and Drawbacks of Law Enforcement Involvement

Involving law enforcement agencies has ?:
* Agencies may be better equipped at processing evidence
* Organization may be less effective in convicting suspects
* Law enforcement agencies prepared to handle warrants and subpoenas needed
* Law enforcement skilled at obtaining witness statements and other information collection

Identify

?

A

Advantages (of Law Enforcement Involvement)

75
Q

Benefits and Drawbacks of Law Enforcement Involvement

Involving law enforcement agencies has ?:
* Once a law enforcement agency takes over case, organization loses complete control over chain of events
* Organization may not hear about case for weeks or months
* Equipment vital to the organization’s business may be tagged evidence
* If organization detects a criminal act, it is legally obligated to involve appropriate law enforcement officials

Identify

?

A

Disadvantages (of Law Enforcement Involvement)

76
Q

Summary

? is control measure that reduces accidental security breaches and increases organizational resistance to many other forms of attack

Identify

1/2 Summary

A

Information security education, training, and awareness (SETA)

77
Q

Summary

? made up of 3 components:
* Incident Response Planning (IRP)
* Disaster Recovery Planning (DRP)
* Business Continuity Planning (BCP)

Identify

2/2 Summary

A

Contigency Planning (CP)