Module 18 Understanding Defense Flashcards

1
Q

Assets

A

Anything of value to an org that must be protected, servers, infrastructure devices, end devices and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vuln

A

A weakness in a system or its design that could be exploited by a threat actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threats

A

Any potential danger to an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is asset management?

A

Inventorying all assets, and then developing and implementing policies and procedures to protect them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are assets?

A

The collection of all devices and information owned or managed by the organization are assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is asset management?

A

Inventory all assets you have, then develop and implement policies and procedures to protect them.
- Where are critical info assets stored?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What to identify vulnerabilities?

A

What are the possible vulnerabilities of a system, who may want to exploit those vulnerabilities to access specific information assets, and what are the consequences if sys vulnerabilities are exploited?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The e banking example - what are some vulnerabilities?

A

Data center destruction, data input errors, phony transactions using a customer pin, stolen customer data (attacker steals personal and financial data of bank customers from the customer database), internal system compromise, phony transactions from an external server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an indepth security approach?

A

Routers, firewalls, IPS, AMP (Advanced malware protection),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an edge router?

A

First line of defense, it allows or denies traffic it sees from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What would be a second line of defense?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a security onion?

A

Defense-in-depth approach. Firewall, IPS, content filtering, AAA ,hardened devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the analogy of the security artichoke?

A

Benefits the threat actor, threat actors no loner needs to peel away each layer, if they remove certain leaves, sensitive data will eb revealed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are business policies?

A

Guidelines that are developed by an org to govern its actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some guiding policies for a company?

A

Company policies, employee policies and security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are employee policies?

A

HR - salary, pay schedule, employee benefits, work schedule, vacations and more

17
Q

What are security policies?

A

Security policies identify a set of security objectives for a company, define the rules of behavior for users and administrators and system req.

18
Q

What is a company policy?

A

Rules of conduct for both employer and employees.

19
Q

What is the point of a security policy?

A

Inform users, staff and managers an organizations requirements for protecting technology and information assets.
- defines legal consequences of violations
- sets rules for expected behavior
- ensures consistency in system operations, software and hardware acquisition and use

20
Q

What are some type of policies within the security realm?

A

AUP, remote access policy, incident handling procedures, password policies, identification and authentication policy.

21
Q

What is a BYOD policy?

A

You bring your own mobile device to access company systems, networks, etc. BYOD security policy specifies which devices can be supported, level of access employees have, safeguards (if device is compromised) - how much security the device should have

22
Q

What are some BYOD best practices?

A

Back up data, provide antivirus software, manually control wireless connectivity, password protect access

23
Q
A