security Flashcards
skill set
WHAT ARE SOME STRATEGIES FOR SECURE SYSTEMS
RISK ASSESSMENT
WHAT IS MOST IMPORTANT
LOSS OF EVENTS
FREQUENCY
IMPACT
MITIGATION
IMPLEMENTATION
COST
MAKE DECISION
A concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved. COST VS BENEFITES
REASONABLE ASSURANCE
INCLUES HARDWARE, SOFTWARE, DATA, NETWORK, FACILITIES PLAN A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster.
DISASTER RECOVERY
CRITICAL BUSINESS PROCESS AND WHO SUPPORTS A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.
BUSINESS CONTINUTIY PLAN
WHAT NEEDS DONE - DELICATES RESPONSIBILITIES An organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
SECURITY POLICY
sysadmin, audit, network, security
SANS
WHAT DOES CIA TRIAD STAND FOR
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
WHAT LEVEL OF CIA IS AUTHENTICAION METHOD SINGLE FACTOR
APPLICATION
WHAT LEVEL OF CIA IS USER ROLES AND ACCOUNTS
APPLICATION
WHAT LEVEL OF CIA IS DATA ENCRYPTION USED
APPLICATION
AT WHAT LEVEL OF CIA IS EDUCATION USED
END USER
AT WHAT LEVEL OF CIA IS AUTHENTICATION USED
END USER
AT WHAT LEVEL OF CIA IS ANTI VIRUS USED
END USER
AT WHAT LEVEL OF CIAS IS DATA ENCRYPTION USED
END USER
COMPANY MONITORS, MANAGES, MAINTAINS COMPUTER SECURITY
MSSP
MANAGED SECURITY SERVICE PROVIDER
WHAT ARE STEPS TO RESPOND TO CYBER ATTACK
INCIDENT NOTIFICATION
PROTECTION OF EVIDENCE/ACTIVITY LOG
INCIDENT CONTAINMENT
ERADICATION
INCIDENT FOLLOW UP
WHAT ARE THE TWO CERTIFICATION NEEDED FOR COMPUTER FORENSICS FOR LEGAL MATTERS
CCE - CERTIFIED COMPUTER EXAMINER
ENCE CERTIFIED EXAMINER MASTERED COMPUTER INVESTIGATION
NAME SOME AUTHENTICATION METHODS FOR SECURE NETWORKS
FIREWALL
NEXT GENERATION FIREWALL
ROUTERS
ENCRYPTION
ENCRYPTION KEY
TLS - TANSPORT LAYER SECURITY
PROXY SERVER
VPN
INTRUSION DETECTION SYSTEM
hardware or software (or a combination of both) that serves as the first line of defense between an organization’s network and the Internet; also limits access to the company’s network based on the organization’s Internet-usage policy can be configured to serve as an effective deterrent to unauthorized web surfing by blocking access to specific objectionable websites.
FIREWALL
A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
NGFW - NEXT GENERATION FIREWALL
a gateway that passes data between one or more local area networks (LANs)
ROUTER
communications protocol is used to secure sensitive data. a communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet enables a client (such as a web browser) to initiate a temporary, private conversation with a server (such as an online shopping site or bank)
TLS - TRANSPORT LAYER SECURITY
serves as an intermediary between a web browser and another server on the Internet that makes requests to websites, servers, and services on the Internet for you
PROXY SERVER
is software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment
IDS - INTRUSION DETECTION SYSTEM
enables remote users to securely access an organization’s collection of computing and storage devices and share data remotely.
VPN - VIRTUAL PRIVATE NETWORK
An evaluation of whether an organization has a well-considered security policy in place and if it is being followed.
SECURITY AUDIT
an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack. Creating such a strategy typically begins with performing a risk assessment to identify and prioritize the threats that the organization faces.
SECURITY STRATEGY
Business processes that are more pivotal to continued operations and goal attainment than others.
MISSION CRITICAL PROCESS
An organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
SECURITY POLICIES
BRING YOUR OWN DEVICE
BYOD
PROS - MORE EFFICEINT/FAMILIAR WITH DEVICE
CONS - EXPOSE TO MALAWARE/PASSWORD PROTECTION/PRIVACY
NAME SOME AREAS OF POSSIBLE ENTRY POINTS TO ORGANIZATIONS DATA INFORMATION
CLOUD COMPUTING
NETWORK COMPUTERS
MOBILE DEVICES
VIRTUALIZATION
OPERATING SYSTEMS
APPLICATIONS
WEB SITES
SWITCHES
ROUTERS
GATEWAY
Established in 2003 to protect the nation’s Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.
U.S. COMPUTER EMERGENCY READINESS TEAM US-CERT
FEDERAL GOV’T DOES NOT HAVE TO INFORM ORGANIZATION OF VULNERABILITY
VEP - VULNERABILITY EQUITIES PROCESS
NAME SOME CAUSES OF POOR SOFTWARE DESIGN
DO NOT KNOW HOW TO DESIGN QUALITY
DO NOT TAKE TIME
DO NOT FOLLOW RIGOUROUS ENGINEERING PRINCIPLES
NOT LEARNING FROM PAST MISTAKES
NOT UNDERSTANDING ENVIRONMENT
PRESSURE TO GET TO MARKET
METHOD OR TECHNIQUE HAS CONSISTENTLY SHOWN RESULTS SUPERIOR TO THOSE ACHIEVED BY OTHER MEANS
BEST PRACTICE
ORGANIZATION CHOOSES TO ELIMINATE VULNERABILITY THAT GIVES RIST TO PARTICULAR RISK IN ORDER TO AVOID RISK ALTOGETHER
AVOIDANCE
An approach to minimizing the impact of software errors by independently implementing the same set of user requirements N times (where N could be 2, 3, 4 or more); the N-versions of software are run in parallel; and, if a difference is found, a “voting algorithm” is executed to determine which result to use.
N-VERSION PROGRAMMING
A description of how a product or process could fail to perform the desired functions described by the customer.
FAILURE MODE