Other stuff Flashcards

1
Q

Identification -> Assessment -> Treatment -> Tracking -> Review. What’s this?

A

Risk management phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the annual loss expectancy?

A

Single loss expectancy x annual rate of occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the 6 types of security controls.

A

Physical, technical, administrative. Preventive, detective, corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s MAC?

A

Mandatory access control - set by administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s DAC?

A

Discretionary access control - set by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s RBAC?

A

Role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s a standard?

A

Mandatory rules that must be followed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s a baseline?

A

Provides the minimum necessary security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s a guideline?

A

Flexible, but recommended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s a procedure?

A

Step-by-step guides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Promiscuous, Permissive, Prudent, Paranoid. Explain?

A

Promiscuous - wide open. Permissive - only block “known bad”. Prudent - block all “known bad”, but allow based on business needs. Paranoid - no bad at all!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name 6 of the 9 vulnerability types.

A

Misconfiguration, Buffer overflow, Default installation, Unpatched, Open services, Default passwords, Design flaws, OS flaws, App flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the CC?

A

Common Criteria for Information Technology Security Evaluation - an itnernational standard (SIO/IEC 15408)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the EAL and how can it be ranked?

A

Evaluation Assurance Level - from 1 to 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s the TOE?

A

Target of evaluation - what’s being tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the ST?

A

Security target - a document that identifies the security properties of the TOE

17
Q

What’s the PP?

A

Protection profile - a document that identifies the security requirements for the service or product

18
Q

Name 5 relevant laws or standards and what they’re relevant to.

A
HIPAA - medical
SOX - corporate disclosure
PCI-DSS - cards, ATMs, PoS
COBIT - IT governance framework
ISO/IEC 27001 - standards for secure IS
FISMA - US legislation to protect government information
19
Q

What’s HIPAA for?

A

Medical

20
Q

What’s SOX for?

A

Corporate disclosure

21
Q

What’s PCI-DSS for?

A

Cards, ATMs, PoS

22
Q

What’s COBIT?

A

IT governance framework created by ISACA and ITGI

23
Q

What’s ISO/IEC 27001?

A

International standards for secure IS

24
Q

What’s FISMA?

A

US legislation to protect government information

25
Q

Name the standards that govern medical systems.

A

HIPAA

26
Q

Name the standards that govern corporate disclosure.

A

SOX

27
Q

Name the standards that govern cards, ATMs, point of sale.

A

PCI-DSS

28
Q

Name the IT governance framework created by ISACA and ITGI.

A

COBIT

29
Q

Name the international standards for secure IS.

A

ISO/IEC 27001

30
Q

Name the US legislation to protect government information.

A

FISMA

31
Q

Name the four attack types.

A

OS attacks, Application attacks, Shrink-wrap code, Misconfiguration.

32
Q

What’s an OS attack?

A

Default settings, default passwords, admin panels

33
Q

What’s an application attack?

A

Programming code, software logic

34
Q

What’s shrinkwrap code?

A

Build-in code and scripts (eg jQuery)

35
Q

What’s misconfiguration?

A

Easier for users = less secure

36
Q

Name the 3 phases of the pen-test.

A

Preparation (scope, ROE), assessment, reporting

37
Q

What’s GBLA?

A

The Gramm-Leach-Bliley Act (GLBA) requires financial institutions to take steps to protect customer information. It also forces them to provide their privacy practices to the public.