S3-m2 Flashcards
COSO objectives
operations, reporting, compliance
Operational Objectives
Include performance measures and safeguards that can help increase the likelihood that an organizations IT assets are protected against cybersecurity threats and fraud
Reporting Objectives
Related to increasing the likelihood that cybersecurity controls are in place so that they do not affect internal and external financial and nonfinancial reporting. Focus of transparency, reliability, timeliness, and trustworthiness
Compliance Objective
Based on adherence to governmental laws and compliance regulations. Compliance with industry standards such as those issued by NIST
Control Environment
the tone at the top
-sets ethical values for an organization by creating a top down approach
Risk Assmesment
Performing risks assessments to evaluate internal and external factors. Applied to cyber threats by tailoring the organizations risk assessment procedures to analyze cyber risks, likelihood of occurrence and the magnitude of their impact
Control Activities
Policies and procedures put in place to help to determine whether the tone at the top set by the control environment is being implemented at all levels of the organization
Information and Communication
Focuses on using consistent and relevant language, following best practices for sharing information, and communicating internally and externally with the right stakeholders
-BIA reports reviewed by management that outline the impact of interrupting key business functions
-Periodic emails addressing cybersecurity internal controls to the entire company
Monitoring Activities
Component that should be practiced on an ongoing basis to identify areas of risk vulnerability and to determine effectiveness and efficiencies.
-penetration testing
-vulnerability scanning
-Periodic phishing reports
Uppermost level of an security rules
security policies, which serve as an overview of an organizations security needs and strategic plan for what should be implemented
Mid level of security rules
set of standards that organizations use as a benchmark to accomplish the goals defined by the security policies
Bottom level of security rules
Standard operating procedures that are typically detailed documents that specially outline how to perform business processes
Acceptable Use Policy (AUP)
A control document created by an organization to regulate and protect technology resources by assigning varying levels of responsibilities to job roles, listing acceptable behaviors by employees and vendors, specifying consequences for those who violate the AUP
-Definition, scope, and purpose
-acceptable use of personal devices of business activities
Bring your own device (BYOD)
allows employees to use their personally owned devices for work related activities. It may include some of the same elements as an AUP but will address monitoring and enforcment of actions on personnel devices
What is a network?
a system of physical and virtual devices that are connected using wired cables or wireless technology that communicate using a mix of different protocols so that users can send, receive, and store data.
What is a security standard?
organizational requirements that are either mandatory by law or adopted by companies as guidelines for best practices. the next level of security rules beneath policies that serve as a course of action to achieve security polices
Standard Operating Procedures (SOPs)
The lowest level of documentation that provide detailed instructions on how to perform specific security tasks or controls. These SOPs usually involve a combination of systems, software, and physicals actions so that goals of the security policy and standards are achieved
Access Point (AP)
Network Hardware
a wireless connection point for users to directly connect to a wired network using wireless devices
Bridges
Network Hardware
connects separate networks that use the same protocol, even if those networks have different topologies or transmission speeds. Operate at the data link layer
Computers
Network Hardware
are user endpoint devices that are the primary mean of user interaction with a network
Gateway
Network Hardware
Connects multiple networks that use different protocols, translating one protocol to another so that the two networks can interact. Can operate in all layers but generally in the application
Hub
Network Hardware
Connection points that link multiple systems and devices using the same protocol within a single network
Mobile Phones and Tablets
Network Hardware
Devices that are another means through network connection
Modems
Network Hardware
Devices that modulate between digital info and analog signal to support networks.
Proxies
Network Hardware
A form of a gateway that does not translate protocols but rather acts as a mediator that performs functions on behalf of another network using the same protocol instead of just connecting the networks
Routers
Network Hardware
Devices that control data flow on an network
Servers
Network Hardware
Devices that support computer and networks by performing different core functions such as running apps with application servers, storing files with a file server
Single Modifiers
Network Hardware
Devices such as amplifiers, concentrators, and repeaters receive signals and modify them by increasing the signal strength, combining multiple signals
Switches
Network Hardware
Similar to hubs, but instead of broadcasting received signals to every other networked device , switches only route traffic to target destinations, connecting various devices within a network
Network Segmentation or Isolation
Security Method
The process of controlling network traffic so that it is either inaccessible or separated from outside communications or other segments within an organizations own network
Firewall
Security Method
Are physical devices, software, or both that filter and monitor incoming and outgoing network traffic to a public network to block malicious activity from attackers
Service Set Identifier (SSID)
Security Method
The name assigned to a wireless network is known as an SSID and is broadcast by a wireless access point within a certain range so that wireless enabled devices can connect. One way to improve wireless network security is to make networks less visible by disables SSID broadcasting so that the device, stops acting as a beacon that transmits a signal to nearby devices
Virtual Private Network
Security Method
A virtual network built on top of existing physical networks that provides a means of secure communications using encryption protocols such as tunneling or internet protocol security
Wifi Protected Access (WPA)
Security Method
Security protocol that encrypts traffic between a wireless access point, such as a switch, and a mobile device. Does not encrypt traffic
Endpoint Security
Security Method
The notion that every device , also called hosts, connected to
a network should have some form of local security that is separate from any other security measure in place on the network or communications channel
System Hardening
Security Method
Is a multipronged comprehensive security approach that reduces risk by minimizing the number of access points through which a company can be attacked. Access points are referred to as attack vectors and include all aspects of IT infrastructure, including applications, databases, operating systems, servers, and networking equipment
Media Access Control (MAC) Filtering
Security Method
A form of filtering in which an access point blocks access to unauthorized devices using a list of approved MAC addresses. A MAC address, also referred to as a physical or hardware address, is a unique identifier found on devices in a network that is used as an address for communicating with other devices
Tunneling
A process in which data, or packets, in one protocol are encapsulated in packers within a different protocol, which creates a tunnel of protection
IPsec
uses cryptography to encrypt communications, provides access control, and authenticate using IP protocols. Similar to tunneling, but it can also be used to only encrypt certain pieces of data, the payload, rathe than the entire IP packet