Part 2 Flashcards

1
Q

What are the security planning principles?

A

1) Risk Analysis
2) Comprehensive security
3) Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Risk Analysis?

A

The process of balancing threat and protection costs for individual assets.

Annual cost of protection should not exceed the expected annual damage. Goal is not to eliminate risk but to reduce it to an economically rational level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does comprehensive security mean?

A

Comprehensive security means closing off all avenues of attack

Attackers only has to find one weaknesses to succeed. Therefore, we need to cover all bases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does defense in depth mean?

A

Defense in depth means having several layers of defense.

Such that if one protection layer breaks down, the attack will not succeed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 aspects of cyber security?

A

Technical and Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the focus of the technical aspect of cyber security?

A

The main focus is on developing technical expertise and technologies for computer security. These include: encryption techniques, firewalls, biometric-based security technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the focus of the managerial aspect of cyber security?

A

The main focus is on developing security policies and procedures. These include: policies and mechanisms, operational issues and human issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does cyber security implementation rely on?

A

Process, Technology and People

Process: Policies must be developed, communicated, maintained and enforced. Processes must be developed that show how policies will be implemented.

Technology: Systems must be built to technically adhere to policy.

People: People must understand their responsibilities regarding policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are policies?

A

Policies are statements of **what **should be done under specific circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do policies need to be acceptable to users?

A

If policies are not acceptable (sensible) then users will ignore and bypass it, which will be dangerous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is implementation important?

A

Implementation helps to make sense of policies in the local context with local and technical expertise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 2 forms of implementation guidance?

A

Standards and Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distinguish Standards and Guidelines

A

Standards are mandatory but guidelines are discretionary - optional but must be considered carefully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is oversight important in policy-based security?

A

Oversight checks that policies are being implemented successfully. It may uncover implementation problems or problems with the specification of the policy.

Oversight staff are separate from implementers. Policies are given to implementers and oversight staff independently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the different ways of oversight in policy-based security?

A

1) Auditing
2) Log files
3) Vulnerability analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What makes good protection in policy-based security?

A

Good implementation and good oversight

17
Q

What is the bottom-up approach to cyber security, its advantages and disadvantages?

A

The bottom-up approach entails the system administrators (such as security, systems and network technicians) improving the system security themselves.

Advantages: They have the technical expertise, and understand the users’ behaviour.

Disadvantages: They are at the bottom of the company hierarchy and have no power. Hence, they may not have the support of their superiors.

18
Q

What is the top-down approach to cyber security and why is it advantageous?

A

The top-down approach entails policies, procedures and processes initiated by the upper management. They 1) dictate the goals and expected outcomes of the project, and 2) determine who is accountable for each required action.

Advantages:
- Dedicated funding
- Clear planning