Unit 6 Risk-Based Cybersecurity, Change Management Exposure and Response Flashcards

1
Q

6 OECD principles of governance

A
Fair and transparent markets
All classes of shareholders treat the same
Investments market duties
Rights of stakeholders
Clarity and accuracy of reporting
Board responsibilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PwC Ten guiding principles of change management

A

1, Address the human side of change systematically
2. Change starts at the top and begins on day one
3, Real change happens at the bottom
4. Confront reality, demonstrate faith and craft a vision
5. Create ownership not just buy in
6. Practice targeted over-communication
7. Explicitly address culture and attack the cultural centre
8. Assess the cultural landscape early
9. Prepare for the unexpected
10. Speak to the individual as well as to the institution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Best practice approach - 8 questions to ask?

A

Is employee and supplier security training mandatory?
Are employees unable to access organizational sensitive information on a personal device?
Do employees need to use more than 2 or 3 user names and passwords to access main business applications?
Can employees plug non organisational devices into main network without permission?
Do any key systems or applications fall over on week days?
Do employees and contractors feel organisation is a good place to work?
Has the organization been kept safe from cybersecurity breaches in last 12 months?
Does security extend to cloud, mobile, supplier services and social media service?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Contents of information asset register

A

List organisation’s assets
Identify key assets
Describe the assets
Identify the asset owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SIEM?

A

Security incident event management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two aspects of SIEM

A

Processes and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Five stages of SIEM process

A
Detection and reporting
Verification
Isolation (quarantining)
Cleaning (mitigation and restoration)
Review (analysis of patterns and process activities)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

6 stages of attack Lockheed Martin kill chain

A
Reconnaissance
Weaponisation
Delivery
Exploitation
Installation
Command and control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Six Lockheed Martin cyber kill chain defences

A

Detect - determine whether attacker investigating options
Deny - prevent information disclosure and unauthorized access
Disrupt - stop or change outbound traffic to atacker
Degrade - counter attack command and control
Deceive - interfere with command and control
Contain - network segmentation changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

8 emerging threats

A
More information
More processing power
More smaller devices
Subscription business models
Internet of things
Augmented reality
Nano technology
Wet wiring (devices wired to human nervous system eg artificial limbs).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

6 cyber security concerns related to Internet of Things

A
Critical functionality
Replication
Security assumptions
Not easily patched
Long life cycle
Proprietary industry specific protocols
Outside enterprise security perimeters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a security event?

A

A term used to describe a minor disruption to the digital landscape that is thought to be unintentional eg a single user forgetting a password.
Cybersecurity for beginners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a security incident?

A

Intentional damage, theft and/or unauthorised access that has a direct or indirect impact to any substantial part of an organisation’s information, systems, devices, services or products.
Cybersecurity for beginners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an alert status?

A

An escalation flag that can be assigned to a security incident to indicate that ir can not be managed inside allowable time limits or other acceptable tolerances that are defined by an organisation’s security processes.
Cybersecurity for beginners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a kill chain?

A

A conceptual cyber defence model that uses the structure of attack as a model to build a cyber defence strategy.
Cybersecurity for beginners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is augmented reality?

A

The overview pf a virtual digital layer of information onto a view of the real world.
Cybersecurity for beginners

17
Q

What is nanotechnology?

A

Incredibly small products and devices manufactured through the manipulation of particles as small as atoms and molecules eg may be able to correct vision.
Cybersecurity for beginners

18
Q

What is the singularity?

A

The predicted point in time when artificial intelligence exceeds human intelligence.
Cybersecurity for beginners

19
Q

What is wet wiring?

A

Creating connections between the human nervous system and digital devices eg artificial limbs.
Cybersecurity for beginners