Operation Security Flashcards

1
Q

What are the operations security triples?

A

threats, vulnerabilities, and assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security baselining

A

is the process of capturing a point-in-time understanding of the current system security configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

term vulnerability management

A

is used rather than just vulnerability scanning to emphasize the need for management of the vulnerability information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zero-day exploit

A

rather than vulnerability, refers to the existence of exploit code for a vulnerability that has yet to be patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

zero-day vulnerability

A

The term for a vulnerability being known before the existence of a patch is zero-day vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Configuration Management

A

is a process of identifying and documenting hardware components, software, and the associated settings.

Involves development of a security-oriented baseline configuration.

It involves tasks such as disabling unnecessary services; removing unnecessary programs; enabling security capabilities such as firewalls, antivirus, and IDS; and the configuration of security and audit logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Configuration Management process

A
o	The change is requested.
o	The change is approved.
o	The change is documented in the change log.
o	The change is tested and presented.
o	The change is implemented.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Change management

A

purpose of the change control process is to understand, communicate, and document any changes with the primary goal of being able to understand, control,
and avoid direct or indirect negative impact that the changes might impose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The general flow of the change management process includes:

A
  • Identifying a change
  • Proposing a change
  • Assessing the risk associated with the change
  • Testing the change
  • Scheduling the change
  • Notifying impacted parties of the change
  • Implementing the change
  • Reporting results of the change implementation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fail-safe systems

A

provide the ability to automatically terminate the processes in response to a failure.

An example would be an automated locking system that defaults to unlock in case of power failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fail-secure state

A

refers to the ability of a system to maintain and preserve implies that a system should be able to protect itself and its information assets if critical processes are terminated and if a system becomes unusable.

An example would be an automated locking system that defaults to lock in case of power failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

active-active HA cluster

A

a load balancing - actively processes data in advance of a failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

active-passive

A

hot standby, configuration in which the backup systems only begin processing when a failure is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SANs

A

o Consists of dedicated block level storage on a dedicated network.
o Made of numerous storage devices such as tape libraries, optical drives and disk arrays.
o They utilize protocols like iSCSI to appear to operating systems as locally attached devices.
o Can provide warm or hot spares.
o Provide additional drive capacity.
o Commonly used in data centers and can occur over long distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NASs

A

o Used to serve and store files.

o Common used as FTP servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIST Special Publication 800-61 outlines the incident response life cycle - step 1 & 2

A

1) Preparation: training, tools, policies,HW/SF
2) Detection and analysis (identification): analyze events to is determined whether an incident is actually occurring or has occurred.

6) Lesson learned: final report and feedback It is important to remember that the final step feeds back into the first step.

17
Q

NIST Special Publication 800-61 outlines the incident response life cycle - Step 3 containment

A

3) Containment: Keep further damage from occurring as a result of the incident but the threat still there, perform a binary (bit by bit) forensic backup, Capture volatile data,

18
Q

NIST Special Publication 800-61 outlines the incident response life cycle - step 4 Eradication

A

4) Eradication (Remediation and review):
1. removing any malicious software from a compromised system
2. Understanding the root cause of the incident.
3. Restore the system to a good state and should not be vulnerable to further impact. The restore involves either rebuilding the system from scratch or restoring from a known good backup.
4. Strengthening the defenses of the system

19
Q

NIST Special Publication 800-61 outlines the incident response life cycle - step 5 Recovery

A

5) Recovery: involves cautiously restoring the system or systems to operational status.
It ensures that the system is validated, properly restored to operation status, and monitored for potential further compromise.

20
Q

NIST Special Publication 800-61 outlines the incident response life cycle - Step 6 Lesson Learned

A

6) Lesson learned: final report and feedback It is important to remember that the final step feeds back into the first step.