Security Part 2 Flashcards

1
Q

What is computer security?

A

the policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, interruption or physical damage to information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 security services?

A
authentication
access control
data confidentiality
data integrity
availability
non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define authetication

A

assurance that the other party is the one

claimed (i.e. not an imposter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define access control

A

prevention of the unauthorized use of a

resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define data confidentiality

A

protection of data from unauthorized

disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define data integrity

A

assurance that data received is exactly what authorized entity sent (i.e. it has not been tampered with).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define availability

A

assurance that services are available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define non-repudiation and two types

A

protection against denial by one of the
parties in a communication

1) the sender denies sending the data
2) the receiver denies receiving the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to password crackers work? (3)

A

-try common passwords
-words with a suffix + variations
to target a specific person gather info about them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 authentication approaches to control access?

A
  1. something you know (password)
  2. something you have (card, token)
  3. something you are (biometrics)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Best method for passwords (2)

A

Use a password manager or convert a phrase meaningful to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 4 ways to secure your system? (bare minimum)

A
  • software/hardware firewalls
  • look for unusual activities
  • antivirus software -> look for bit patterns in programs called a signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 2 best practices for securing your system?

A

isolate and encrypt sensitive data

minimize your attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how can you effectively isolate and encrypt sensitive data?

A

AES-256 encrypted documents are safe

have a separate user account for banking and financial activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how can you minimize your attack surface?

A

configure the firewall in your OS and your modem/router

disconnect from internet when not in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the business value of security and control

A

Inadequate security and control can result in lost of business and may create serious legal liabilities.

Failure to do so can lead to costly litigation for data exposure or theft.

17
Q

What are the legal and regulatory requirements for security/control?

A

companies must be able to respond to legal requests for electronic documents relevant to a civil case (a discovery request)

Internal controls must be put in place to govern the accuracy of information in financial statements

18
Q

What is the bottom line for the security and control network?

A

Many companies assume that a disaster too improbable and so security and control is not worth the investment in time and
money

19
Q

What is the greatest cause of computer security breaches?

A

Lack of knowledge or lack of motivation

20
Q

What are the 6 tools for the security and control framework?

A
Risk assessment
security policy
acceptable use policy
disaster recovery planning 
business continuity planning
security auditing
21
Q

Explain a risk assessment

A

To do a risk assessment is to determine the level of risk to the firm for various classes of risks

22
Q

explain security policy (3)

A

A security policy identifies:

  • main security risks (e.g. power failures)
  • acceptable security goals (downtime ≤ 3 minutes per year)
  • mechanisms to achieve these goals (uninterruptible power supplies + diesel generator backup)
23
Q

Explain acceptable use policy

A

Acceptable Use Policy (AUP) states the acceptable uses and
users of information and computers

For example:
-privacy, user responsibility, personal use of devices, access rules for different employees

  • technical measures used to enforce the policies
24
Q

Explain disaster recovery planning

A

Getting the IT systems (computing and communication) up and running after a disruption

Example: back-up files and maintain back-up systems

25
Q

Explain business continuity planning

A

Getting the business up and running after a disaster

26
Q

What are the 3 steps in business continuity planning?

A

• Identify and document critical business processes
- not relying on people who may be unavailable.

  • Create action plans for these processes.
  • Line up offsite resources, e.g. the cloud.
27
Q

Explain security auditing

A

A security audit investigates if the current security and control framework is adequate

28
Q

Explain how to perform a security audit

A

Create a comprehensive assessment of a company’s computer security policies, procedures, technical measures, personnel, training, documentation

May even simulate an attack.