SEC+ Chapter 7 Flashcards
What is Asset Tracking in cybersecurity?
The process of tracking critical systems, components, devices, and valuable objects in an inventory, and collecting and analyzing asset information for informed decision-making.
What are the key tools and solutions for Asset Tracking?
Asset Management Software (e.g., Lansweeper, ManageEngine, SolarWinds), Asset Management Database (storing details like type, model, serial number, asset ID, location, user(s), value, service information), and Hardware Solutions (e.g., Barcodes, RFID tags for physical asset tracking).
What are the types of assets in asset management?
Technical Assets: Require configuration (e.g., computers, servers).
Non-Technical Assets: No configuration required (e.g., furniture, buildings).
What is Asset Assignment/Accounting?
Designating specific individuals or teams responsible for particular assets to establish accountability for asset security, maintenance, and management.
What is Asset Classification and its benefits?
Categorizing assets based on criteria such as value, sensitivity, and criticality to the organization. Benefits include consistent application of security controls, prioritized maintenance, and appropriate budget allocation.
What are the Monitoring/Asset Tracking Activities?
Inventory and Enumeration: Creating and maintaining a comprehensive list of all assets.
Tools and Techniques: Manual Inventory, Network Scanning (e.g., Nmap, Nessus, OpenVAS), Asset Management Software, Configuration Management Database (CMDB) (e.g., ServiceNow, BMC Remedy), Mobile Device Management (MDM) (e.g., Microsoft Intune, VMware Workspace ONE), and Cloud Asset Discovery tools (e.g., AWS Config, Azure Resource Graph, CloudAware, CloudCheckr).
What is Asset Acquisition/Procurement and its importance in cybersecurity?
The process of selecting and purchasing hardware/software with strong security features (e.g., encryption, secure boot, regular updates/patches). Importance lies in ensuring secure infrastructure and reducing vulnerabilities.
What are the considerations during Asset Acquisition/Procurement?
Integration: Seamless integration with existing security infrastructure (firewalls, IDS, SIEM).
Total Cost of Ownership (TCO): Includes initial purchase price, ongoing maintenance, updates, and potential security incident costs.
What are the best practices for Asset Acquisition/Procurement?
Prioritize cybersecurity during acquisition and procurement.
Ensure compatibility with security tools and policies.
Assess vendor security practices and compliance with regulations.
What are Asset Protection Concepts?
Safeguarding critical resources, information, and infrastructure from threats and unauthorized access. Key elements include Asset Identification, Standard Naming Conventions, Configuration Management, and Documentation.
What is Asset Identification in asset protection?
Using barcodes, RFID tags, or identification numbers to uniquely identify assets.
Why are Standard Naming Conventions important in asset management?
They provide consistent naming for hardware and digital assets, simplifying management and identification (e.g., Host and DNS names adhering to organizational standards).
What is Configuration Management in asset protection?
Ensuring assets adhere to approved configurations through processes like change control and change management to prevent configuration drift. Frameworks like ITIL® are used for documenting and managing configurations.
What are Configuration Items (CIs) in a CMDB?
Assets that require specific management, labeled and defined by their attributes and relationships within the Configuration Management Database.
What is a Baseline Configuration?
The minimum security settings required for assets to ensure they are securely configured.
What is a Configuration Management System (CMS)?
Tools and databases used for managing Configuration Items (CIs). Can range from spreadsheets for small networks to dedicated applications for large organizations.
Why is Documentation important in asset management?
It supports testing processes and ensures clear communication by using diagrams to capture relationships and configurations.
What is the role of Data Backups in asset management?
Ensuring the availability and integrity of critical data and systems by protecting against hardware failure, data corruption, and cyberattacks, and serving as a safety net for data recovery.
What are the challenges of Data Backups in enterprise settings?
Scalability, performance, granularity and customization, compliance and security, and implementing effective disaster recovery plans.
What are the critical capabilities for enterprise backup solutions?
Support for various environments (virtual, physical, cloud), data deduplication and compression, instant recovery and replication, ransomware protection and encryption, granular restore options, reporting, monitoring, and alerting, and integration with virtualization platforms, cloud providers, and storage systems.
What is Snapshotting in asset management?
Capturing the state of a system at a specific point in time. Types include VM Snapshots (e.g., VMware vSphere, Microsoft Hyper-V), Filesystem Snapshots (e.g., ZFS, Btrfs), and SAN Snapshots (e.g., NetApp, Dell EMC). Benefits include rollback to previous states, quick recovery from failures, and data consistency.
What is Replication in asset management?
Creating and maintaining exact copies of data on different storage systems or locations. Types include Synchronous Replication (immediate data copying for consistency) and Asynchronous Replication (delayed copying, more cost-effective). Use cases include database mirroring and disaster recovery.
What is Journaling in asset management?
Recording changes to data in a dedicated log to track and revert changes and ensure data integrity. Examples include file system journaling (e.g., JFS, NTFS). Advanced methods include Remote Journaling, SAN Replication, and VM Replication.
Why is Encrypting Backups important?
To protect data from unauthorized access or theft, ensure compliance with data protection regulations (e.g., GDPR, HIPAA), and secure sensitive data in backups (e.g., customer data, intellectual property).
What are the methods for Encrypting Backups?
Encryption at Rest: Encrypting stored backup data.
Encryption in Transit: Encrypting data during backup transfer.
What are the best practices for Encrypting Backups?
Use strong encryption algorithms.
Manage and protect encryption keys securely.
Regularly update encryption protocols to address vulnerabilities.