Module 7: Handling Insider Threats Flashcards

1
Q

What makes an insider threat so dangerous

A

They misuse their authorized privileges on resources that directly affect the CIA of the information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of potential impacts that insider threats have on an organization

A
  • Bad reputation
  • Stealing PII or other private information
  • Website defacement
  • Posting confidential information on any public website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to EC Council what is the structure of how an insider threat occurs

A
  • Understand business process
  • Gain credentials and trust
  • Install logic bombs and rootkits
  • Activate those logic bombs and rootkits
  • Damage the company for financial gain or revenge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the the greatest risk according to the insider risk matrix

A

If the insiders’ technical literacy and process knowledge is high

See page 415 for the graph of the matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some different ways to detect an insider threat

A
  • Checking the logs (event, email, database, app, file access, and remote access)
  • Alerts from various network security devices and applications
  • Implementing control measures
  • Identifying the behavior of users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 3 different techniques to detect an insider threat

A
  • Correlation
  • Detecting Anomaly (anything out of the norm?)
  • Discovering Pattern
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TRUE or FALSE: Placing suspected users in a quarantined network is a good way to response to an insider threat

A

TRUE

This is done so that the damage is minimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TRUE or FALSE: The user doesn’t need to have their accounts blocked because it might tip them off they IT security is looking at them

A

FALSE

It is a good idea to block malicious users from their accounts as soon as possible before they do even more damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TRUE or FALSE: The organization should not share or provide the details of the insider’s incident response plan with all employees

A

TRUE

The organization should share the response plan with those who have the capability to understand and perform the plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is an incident response plan necessary for an insider threat situation

A

It helps the organization to minimize or limit the damage cause due to malicious insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

While it may not seem important to IT Security, what are some ways HR can help to mitigate the threat of insider threat

A
  • Background checks
  • Manage negative workplace issues
  • Prepare an information security policy document and have employees sign the doc
  • Respond to suspicious behavior of employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network security is an important aspect to help mitigate insider threats by

A
  • Configured firewalls
  • Strict passwords
  • DLP
  • Prevent file sharing

The good news is that we have this implemented in our environment…Woot GO Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are users able to get access privileges

A

It is based on their routine performance of their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who should vet a user’s access requests

A

Their supervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who should employees ask before accessing sensitive systems

A

Data owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TRUE or FALSE: When an employee is terminated from his job the employers should disable all their access rights

A

TRUE

17
Q

What should be enforced that is used to limit the misuse of resources

A

Separation-of-duties

18
Q

TRUE or FALSE: Employees shouldn’t be made aware of an organization’s security policies and controls

A

FALSE

19
Q

What should be disabled to ensure accountability

A

Default administrative accounts

20
Q

What technique is implemented to view all the actions performed by admins

A

Non-repudiation

21
Q

TRUE or FALSE: IT security needs to monitor the activities of system admins who have permissions to access sensitive info

A

TRUE

22
Q

What kind of methods need to be enforced to prevent admins from accessing backup tapes

A

Encryption

23
Q

How can a business continue operations after the incident

A

Implement secure backup and recovery processes

24
Q

What part of the CIA needs to be checked when backups are done

A

Integrity and Availability

25
Q

TRUE or FALSE: The BCP is the document that shows who accessed and handling of the backup media

A

FALSE

Chain-of-Custody

26
Q

Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness, or unexplained absenteeism. What technique helps in detecting insider threats

A

Correlating known patterns of suspicious and malicious behavior

27
Q

When an employee is terminated from his/her job, what should be the next immediate step taken by an organization

A

All access rights of the employee should be disabled