Webinar Key Points Flashcards

1
Q

What are the key steps in cybersecurity frameworks?

A

1) Identify - your valuable assets
2) Protect - with appropriate security framework
3) Detect - any compromised account or device
4) Respond - quarantine the problem and identify counter measures
5) Recover - replace, restore, fix compromised assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different layers that APTs must to through to get to the data?

A

1) Perimeter
2) Network
3) Host
4) Application
5) Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 5 essential cyber defenses?

A

1) Firewalls
2) Configuration - secure settings for devices and software
3) Access permissions - control access to data and services
4) Nextgen Anti-malware - protect from malware
5) Patching - keeping devices and software up-to-date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the 14 point framework for defence?

A

1) Exec support
2) Reduce attack surface
3) Security architecture
4) Classify information assets
5) Zone the attack surface
6) Remove low value data
7) Use next-gen anti-malware
8) Strong user access controls
9) Dual authentication
10) Patch promptly
11) Other technical counter-measures
12) Set security settings high
13) Educate users
14) Ensure security reqmts included and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 6 OECD principles of governance?

A

1) Fair and transparent markets
2) Investments market duties
3) Clarity and accuracy of reporting
4) All classes of shareholders treated the same
5) Rights of stakeholders
6) Board resopnsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are McKinsey’s 6 imperatives for FinTech attackers?

A

1) Find - opportunities for mass recruitment
2) Reduce - costs of servicing customers
3) Identify - new indicators of credit worthiness
4) Target - specific market segments
5) Cooperate - with established financial services firms
6) Anticipate and digitise - responses to reg reqmts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 6 ways to counter FinTech attackers?

A

1) Use other analytics e.g. Facebook
2) Reduce costs
3) Design customer interface to equal online platforms
4) Tailor services to mobile phone access
5) Acquire marketing skills of online retailing platforms
6) Streamline org to allow implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 key elements of GPTs?

A
  • Pervasive
  • Can spawn new technologies
  • Improve over time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 4 benefits of using AI for predictive models?

A

The predictive models are:

  • more accurate
  • unbiased
  • fast
  • cheap
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does PACED in the context of Risk Mgmt mean?

A

Proportionate - to size of org and nature of risks

Aligned - to objectives of org and needs of stakeholders

Comprehensive - covering all types of risk

Embedded - in ongoing processes for strategic and operational decision making

Dynamic - able to change as the org and environment changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Hopkin’s 8 Rs of risk management?

A
Recognition
Rating
Ranking
Responding
Resourcing
Reaction Planning
Reporting
Reviewing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the COSO ERM Double Helix include?

A
  • Governance and Culture
  • Strategy and Objective-setting
  • Performance
  • Review and Revision
  • Information Communication and Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 components of risk assessment?

A

1) Risk identification - what might happen?
2) Risk analysis - how likely? what impact?
3) Risk evaluation - so what? is it within Risk Appetite and Risk Tolerance?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 7 stages of a cyber attack?

A

1) Reconnaissance
2) Tooling / Preparation
3) Infection
4) Persistence - stuxnet
5) Communication
6) Control
7) Realising Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 reasons that Advanced Persistent Threats usually occur?

A

1) Hackers use opportunistic tactics
2) Hackers use highly evolved tactics
3) Hackers use inside information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 key ingredients of cyber risk frameworks?

A

1) Ownership - who is accountable?
2) Lifecycle - identified, investigating, analysing, treating, monitoring, closed
3) Risk info - probability and impact

17
Q

What are 5 ways to treat a ditigal risk?

A

1) Prevention
2) Reduction
3) Acceptance
4) Contingency
5) Transfer

18
Q

What is the 6-step riskbased approach to cybersecurity management?

A

1) Identify - highest value info targets first
2) Identify - the digital assets that info needs to flow through and onto
3) Verify - business case for how and where info is needed
4) Consider - threats to the org and probability of them occurring
5) Minimise - footprint of sensitive data based on business case
6) Control - efficiently add appropriate security controls

19
Q

What are 10 key considerations for Change Mgmt?

A

1) Address human side of chg systematically
2) Change starts at the top on day 1
3) Real change happens at the bottom
4) Confront reality, demonstrate faith and craft a vision
5) Create ownership, not just buy-in
6) Practice targeted over-communication
7) Explicitly address culture and attack cultural centre
8) Assess cultural landscape early
9) Prepare for the unexpected
10) Speak to the individual as well as the institution

20
Q

What are the 5 stages of a SIEM (Security Incident and Event Mgmt) process?

A

1) Detect and report
2) Verify
3) Isolate (quarantine)
4) Clean (mitigate and restore)
5) Review (analyse patterns and process activities)

21
Q

What are the 6 stages in the Lockheed Martin cyber kill chain?

A

1) Reconnaissance
2) Weaponisation
3) Delivery
4) Exploitation
5) Installation
6) Command and control

22
Q

What are the 6 Lockheed martin cyber kill chain defences?

A

1) Detect - determine whether attacker investigating options
2) Deny - prevent info disclosure and unauthorised access
3) Disrupt - stop or change outbound traffic to attacker
4) Degrade - counter attack command and control
5) Deceive - interfere with command and control
6) Contain - network segmentation changes

23
Q

What are the emerging cyber threats?

A
  • More information
  • More processing power
  • More smaller devices
  • Subscription business models
  • Internet of things
  • Augmented reality
  • Nano technology
  • Wet wiring
24
Q

What emerging threats does the IoT bring with it?

A
  • Critical functionality
  • Replication
  • Security assumptions
  • Not easily patched
  • Long life cycle
  • Proprietary industry specific protocols
  • Outside enterprise security perimters