Security Flashcards

0
Q

Describe the confidentiality component of security

A

Providing protection from unauthorised access or disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the three components of security?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the integrity component of security

A

Ensuring that systems and information are complete and free from unauthorised change or modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the availability component of security

A

Ensuring that information, services and resources are available when and where required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security should be regarded as a horizontal / vertical component within an organisational structure

A

Horizontal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the concept of “defence in depth”?

A

The idea of a series of overlapping protective measures embracing the whole organisation. Each of the controls may be cheap and not necessarily particularly strong, but taken together they integrate to form a total solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List some of the component controls of “defence in depth”

A
Physical security
Policies and procedures
Personnel security
Organisational culture
Clear desk policy
Document security
Audit trails
Business continuity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In terms of security, why is it not advisable to rely on one control?

A

It creates a single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In defining the controls required in a security system, what three points should be taken into consideration?

A
  1. Security is a management issue not an information technology issue
  2. The controls put in place should not interfere with legitimate business processes
  3. Users may need to be made aware what the controls are designed to achieve, and trained to maximise the potential effect of the controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical security: what is the first defensive point of any organisation?

A

The perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Personnel security: what supplements a physical control quite well?

A

If staff have to show ID on entering the building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Backups. At a minimum, how often should smaller organisations perform backups?

A

Backup of whole system once a week

Backup of data only, daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where should backups be stored?

A

Off-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What risk do backups pose in terms of security?

A

Whereas the original data may be password controlled, the backup may not be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

With regard to application security, what five controls should be considered to minimise the risk of corruption of operational systems?

A

Updating operational program libraries should only be performed by the nominated librarian upon management authorisation
If possible, operational systems should only hold executable code
Executable code should not be implemented on an operational system until evidence of successful testing and UAT is obtained
Audit log should be maintained of all updates to operational program libraries
Previous versions of software should be retained as a contingency measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

At what level should vendor-supplied software used in operational systems be maintained?

A

At a level supported by the supplier

16
Q

When should physical or logical access to applications be given to suppliers?

A

For support services when necessary, and with management approval

17
Q

With regards to application security, what does version control achieve?

A

It ensures recent versions of the software are not overwritten by earlier versions

18
Q

With regards to application controls, why should distribution of software be controlled?

A

So that the number of copies of software do not exceed the number of software licenses held by the organisation.

19
Q

What six things should operating procedures specify for the detailed execution of each job?

A

Processing and handling of information
Scheduling requirements, including interdependencies with other systems
Instructions for handling errors or other exceptional conditions
Support contacts in event of unexpected difficulties
Special output handling instructions
System restart and recovery procedures in event of system failure

20
Q

Documented operating procedures should also be documented for system housekeeping activities such as…

A
Computer startup and shutdown
Backup
Equipment maintenance
Computer room and mail handling management
Safety
21
Q

Each operational procedure should have an owner who is responsible for what five things?

A

Writing the original procedure
Maintaining the procedure in the light of operational needs
Ensuring its contents are circulated to relevant staff
Ensuring it is filed in control manual
Removing procedure when no longer required

22
Q

— — — is a way of reducing the risk of accidental or deliberate system misuse

A

Segregation of duties

23
Q

When segregation of duties is difficult due to the small size of an organisation, what should be considered?

A

Other controls such as monitoring of activities, audit trails and management supervision

24
Q

With respect to segregation of duties, the initiation of an event should be separated from its —

A

Authorisation

25
Q

It is important to segregate activities that require — in order to defraud

A

Collusion

26
Q

Other than physical separation, how can segregation of duties be enforced?

A

Access control policy and user profiles

27
Q

In a small organisation where segregation of access is difficult to achieve, how could a user with conflicting duties be handled?

A

Could be given separate user IDs for each function. Prevents accidental breaching of job segregation.

28
Q

With respect to the segregation of development, test and operational facilities, what kind of serious problems can development and test activities cause?

A

Unwanted modification of files or system environment

System failure

29
Q

What might happen if development and test staff have access to the operational system and its information?

A

They may be able to introduce unauthorised and untested code or alter operational data.

30
Q

Give five options for the segregation of development, test and operational environments

A
  1. Development and operational software should run on different computer processors, or in different domains or directories
  2. Development and testing activities should be separated as far as possible
  3. Compilers, editors and other system utilities should not be accessible from operational systems when not required
  4. Different login procedures should be used for operational and test environments. Different passwords should be used
  5. Development staff should only have access to operational passwords where controls are in place for issuing passwords for the support of operational systems. Passwords should be changed after use
31
Q

Why should developers’ access rights to the live environment be kept to the absolute minimum necessary for them to undertake their work?

A

Because of the nature of their knowledge, they pose a risk in the live environment even if they have a different ID to that used in the development area

32
Q

When monitoring the use of information processing facilities, what areas may need to be considered?

A

Authorised access
All privileged operations such as use of supervisor account, system startup and stop, input/output device attachment
Unauthorised access attempts
System alerts or failures
Result of monitoring activities should be reviewed regularly