Various Flashcards
A hidden software-access mechanism that will bypass normal security controls to grant access into the program
Trapdoor
Work tasks and data processing that were lost by a disaster, disruption, or failure
Lost work in process (LWIP)
A shared connection used in common by other devices
Bus
Level of permission granted to individual user for reading data, writing data, or executing specific programs
Access rights
Samples collected by the auditor to prove or disprove the audit findings
Audit evidence
Older term for the building that houses the data center
Information processing facility (IPF)
The initial loading of software to start a computer
Boot strapping, also known as initial program load (IPL)
Matching the combined security of subject (user or program), object (data), and context of usage (need or purpose) to determine whether the request should be approved or denied
Attribute-based access control (ABAC)
A unique serial number burned into the network interface card by the manufacturer. The address operates in the Data-Link layer (layer 2) of the OSI model.
Media Access Control (MAC) address
Test run by software quality assurance to check the system security mechanisms by exploiting known vulnerabilities
Penetration testing
What is it called when the auditor places restrictions on the nature, use, or content of their findings? The audit may have encountered problems in scope, time, thoroughness of tests, or content of available evidence.
Qualified opinion
What is the list of objectives, tasks in sequence, skills matrix, written procedures, written test procedures, and forecast illustrating scope, time, and cost estimates?
Audit plan
This is the most restrictive level of access that grants users the minimum amount of access to perform their jobs.
Least privilege
Technique used by programmers in computer software to disable the functionality of the program based on a specific date
Time bomb
What is the term used to describe the development of well-defined specifications while ensuring adherence to those specifications?
Quality. Quality starts during initial design with the gathering of specifications. Quality originates in the beginning, not by postinspection after the product (or service) is created.
A type of audit to determine whether internal controls are present and functioning effectively
Compliance audit
What is an attack that has not been seen before called?
Zero-day attack
Which access control model allows the system owner to establish access privileges to the system?
Discretionary access control (DAC)
What is the term for a continuous threat of breach through electronic attacks?
Persistent electronic threat
What is the purpose of the chain of custody, and why is it so important when you are collecting evidence?
The chain of custody ensures control in the preservation of evidence. It ensures that extra care is taken not to alter or taint the sample.
The protection of information held in secret for the benefit of authorized users
Confidentiality
An attempt to overpower the system or attempt every possible combination until access is granted
Brute-force attack
Information synonymous with public records or unprotected data that is accessible by anyone
Unclassified
What is it called when you manage a series of individual projects to create an ongoing operation, also known as a functional support program?
Program management
What is another name for a proxy server?
A circuit-level firewall
What do you call a set of commands and macros developed into a custom template inside an integrated development environment (IDE) programming tool?
Pseudocode
The process of determining risks affecting the actual steps necessary to produce the desired product or service, as in use by the organization
Business impact analysis (BIA)
What is two-factor authentication?
Using two methods for authentication. One method is something you know; the other method is something you have, such as an ATM card, electronic token, or physical characteristics (fingerprint, iris scan).
Name for specific mid-level controls over any technology shared across multiple departments. IT systems exist in almost all departments, and therefore IT-type controls must also exist in each department regardless of who is in charge.
Pervasive controls
What type of plan addresses the continued operation of an organization after a disaster occurs?
Business continuity plan (BCP)
Special command used on the network to request a response from a specific machine on the same subnet
Ping
What is the name of the administrative process for subdividing services to allocate for a user?
Provisioning
This refers to the cost savings for doing it right the first time. Proper training and planning are examples of how this conserves money and time by avoiding the additional costs of failure.
Price of conformance (POC)
Where in the network should public web servers be located?
The screened subnet (DMZ)
When a computer program sends data as input to another database program operated by someone else, with or without their permission
SQL injection
The process of driving through a neighborhood with technical tools to detect insecure wireless access points
War driving
A type of audit used to evaluate the process method by measuring the inputs, sequence of activities, and output to determine whether the process method meets the published requirements (specifications)
Process audit
The boundaries and limitations of the individual audit. Normally, this indicates particular systems or functions that will be reviewed during the audit.
Audit scope
This attack targets an individual server, user, database, or network device.
Spear-phishing
Software that is readily available via nonproprietary programming methods in its design. The recipient will receive the human-readable source code with the ability to make any internal changes they desire.
Open system
What does the acronym IDS stand for?
Intrusion detection system (IDS)
Eavesdropping and other covert techniques used to collect information
Passive attack
What is cryptography?
The process of either hiding information from other people or authenticating valid users. It’s an area of high interest to governments, businesses, and individuals.
What it’s called when an online vendor provides the use of commercial software through subscription
Software as a Service (SaaS)
A planned method of testing and tracking minor software updates prior to implementing them into production. The cost of separate testing can be justified by using the price of failure (price of nonconformance).
Patch management
Kerberos is an example of what?
Single sign-on (SSO)
A public record of a unique design or function to which the author or inventor is granted exclusive rights for a limited period of time. The entire design and complete method of building a working copy must be fully disclosed to the public.
Patent
What is the difference between a virus and a worm?
Typically, worms are malicious programs that operate independently exploiting authentication holes between systems. Viruses attach to programs or files and travel when the host file is transferred.
What is the most important first step in understanding the auditee’s IT infrastructure?
A network diagram with complete documentation of the existing systems
The first person to arrive on the scene during an emergency, regardless of training or experience. Even a four-year-old child calling 911 for help will direct the emergency response activities until relieved by a more qualified person.
Incident commander (IC)
A process of ranking information based on its value or requirements for secrecy
Data classification
The selection of projects based on the principles of “highest and best use” of available resources for generating the best return on investment (ROI). This is similar to trading stock investments or baseball cards to improve the overall value of the collection.
Portfolio management
What type of control specifies policies and guidelines for hiring, promotion, termination, data backup, and audits?
Administrative control
The process of manually verifying that records match
Manual reconciliation
An individual with a significant amount of direct experience, or special training with direct experience, and the ability to deduce a correct conclusion when everyone else would form an incorrect conclusion
Expert
A hardware or software device that is watching the communications traffic flowing across the network to other systems
Network-based device
A newer security protocol used in wireless networks with automatic encryption-key generation and authentication
Extensible Authentication Protocol (EAP) in IEEE 802.11i Robust Security Networks
The likelihood that an unfortunate event will occur and cause a loss to assets
Risk
Information in the computer’s working memory (RAM) that will be lost when the power is shut off
Volatile data