Week 4 - Mitigation, patching and insider threats Flashcards

1
Q

Define security control

A

any form of safeguard countermeasure to protect CIA of a database or infrastructure against risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

categories of security control directive

A

encourages less risky behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

categories of security control preventative

A

stops risky actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

categories of security control compensating

A

security controls that are too difficult to implement, a compensatory control is put in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

categories of security control detective

A

controls to identify attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

categories of security control corrective

A

controls to minimise impact if a risk materialises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

categories of security control recovery

A

repair damage after an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cyber security controls consist of

A

hardware
software
infrastructure
people and cultures
attitudes and processes
procedures and standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mandatory controls are?

A

legislation

legislation can mandate security controls to operate within the law i.e Data protection act 2018

industry-standard regulations

following specific regulations within their industry e.g financial transactions Card industry data security standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NCSC Cyber Essential

A

a simple set of guidelines for implementation of security controls to demonstrate compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

legislation, standards and regulations are?

A

the minimum level of security control for compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

software patching

A

software updates are designed to eliminate vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

legacy systems are kept because..

A

cost
risk of disruption to services

NCSC recommends replacement due to risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero days

A

a vulnerability in an application that is known to authors but not yet realised by hostile actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

defending against zero days

A

effective patch management

additional security measure
antivirus, firewall, blocking removable media.

develop a security conscious culture
training and awareness of phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

insider threats

A

someone trusted to work within a system but does not work in that systems interest

employees, contractors, partners, third-party vendors.

17
Q

factors that increase the risk of insider threats

A

economic factors
employees unhappy with benefits and wage decrease

cultural factors
employees working overseas - espionage

clashes in cultures

different part of a business having their own cultures causing conflict

political
not inline with the organisation

organisational specific factors

military and security or large income such as pharmaceuticals are prone, employees may take secrets with them.

18
Q

unintentional insider threats (UIT)

A

through action or inaction without malicious intent, causes harm

forgetting to lock a computer, fails to update software.

19
Q

6 psychological characteristics of insider threats frustration

A

difficult circumstances, negative attitude towards authority, poor social skills

20
Q

6 psychological characteristics of insider threats computer dependency

A

prefer to engage in online activities instead of socialising

21
Q

6 psychological characteristics of insider threats ethical flexibility

A

inadequate training in ethics and privacy and poor social skills.

22
Q

6 psychological characteristics of insider threats reduced loyalty

A

prefer their speciality with hacking with a sense of entitlement and lack of empathy

23
Q

6 psychological characteristics of insider threats entitlement

A

believe to have special privilege and become offended if given a task they consider menial or a punishment.

24
Q

6 psychological characteristics of insider threats lack of empathy

A

the distancing effect of using computers, attackers fail to recognise the potential or actual impact of their actions

25
Q

how to reduce insider threat

A

develop security solutions and workplace condition to minimise threats