Topic 3.2 Information Systems Control For Systems Reliabilty Flashcards

1
Q

What are the features in the trust service framework?

A

Security
- access to the system and data is controlled and restricted to legitimate uses

Confidentially
- sensitive organisational data is protected

Privacy
- personal information about trading partners, investors, and employees are protected

Processing integrity
- data are processed accurately, completely, in a timely manner, and only with proper authorisation

Availability
- system and information are available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Good way to remember trust service framework

A

Like a building

The roof =system reliability

The walls =confidently, privacy, processing integrity, availability

The foundation = security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the security life cycle? And whose issue is it?

A

1) assess threats & select risk response
2) develop and communicate policy
3) acquire & implement solutions
4) monitor performance

Security is a management issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the security approach formula?

A

Time-based model, security is effective if:

P > D + C where or
P - D + C

P - is the time it takes an attacker to break through preventive control

D - is time it takes to detect an attack in progress

C - is time it takes to respond to the attack and take corrective action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to prevent or respond to risk in AIS?

A

Preventive controls

  • people
  • Process
  • IT solutions
  • Physical security

Detective controls

  • Log analysis
  • intrusive detective systems
  • Continuous monitoring

Response

  • Computer Incident Response Terms (CIRT)
  • Chief Information Security Officer (CISO)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can people be a prevention to attacks?

A

Culture of security
- tone set at the top with management

Training 
    -follow safe computing practices:
Never open bad emails
Use only approved software
Do not share password
Physically protect laptops and cellphones

Protect against social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can prevention processes access prevent attacks?

A

Authentication - verifies the person e.g questions before login or app

Authorisation- determines what person can access e.g scan card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can prevention processes of changing controls and changing management help attacks?

A

Formal process used to ensure that modifications to hardware, software or processes do not reduce systems reliability

Good change management and controls requires

  • documentation
  • approval
  • testing
  • develop “backout” plan
  • monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can preventive IT solutions help prevent attacks

A

anti malware controls

network access controls

device and software hardening controls

  • endpoint configuration
  • users accounts
  • software design

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can prevention physical securities access controls help prevent attacks?

A

Physical security access controls

  • limit entry to building
  • restrict access to network and data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to Detect attacks

A

Log analysis - examining logs to identify evidence of possible attacks

Intrusive detection systems (IDSs) - system that creates logs of network traffic that was permitted to pass the firewall and then analysis those logs for signs of attempted or successful intrusions

Continuous monitoring - employee compliance with organisation’s information security polices and overall performance of business processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud computing is generally more secure than traditional computing. true or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logs need to be analysed regularly to detect problems in a timely manner. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination

A

Internet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The steps that criminals take to identify potential points of remote entry is called

A

Scanning and mapping the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The steps that criminals take to trick an unsuspecting employee into granting them access is called

A

Social engineering

17
Q

In the time based model of information security, R represents

A

The time it takes to respond and stop the attack