2022 Paper Flashcards

(55 cards)

1
Q

What are the three tiers of Risk Management Hierarchy?

A

Tiers 1 and 2 describe systemic information security risks while tier 3 is used to support the implementation of a framework. Tier 1 is ‘Organisational’, Tier 2 is ‘Mission/Business Process Level’ and Tier 3 is ‘Information System Level’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of Threat Source are there?

A

Adversarial (Individuals, groups or organisations seeking to exploit), Accidental (Error by individuals), Structural (Failures of equipment or controls), Environmental (Natural Disasters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In John Adams’s book, what are the three types of risk?

A

Risks perceived directly (e.g. climbing a tree, riding a bike), Risks perceived through science (e.g. cholera, you need a microscope to see or understand) and Virtual Risks (Scientists don’t know or don’t agree e.g. pesticide)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a threat source and a threat event?

A

A threat source is a situation that could lead to the exploitation of a vulnerability or the intent to, while a threat event is the actual situation happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is MDM?

A

Mobile Device Management, a software which, when installed on a device, allows the organisation a certain level of control over the device such as monitoring and supervision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is MAM?

A

Mobile Application Management, a software which, when installed on a device, allows the organisation to control what software is on the device, allowing updates, installs, and deletion of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Biographical Identity?

A

Education, Qualifications, Where you lived, employment, any information that can be combined to identify someone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five components of Identity Management Systems?

A

Data Repository components, Security Components, Lifecycle Components, Consumable Value Components, Management Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Data Repository Components?

A

Storage and Management of identity information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Security Components?

A

Authentication Providers, Authorisation Providers and Auditing Providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Lifecycle Components?

A

Provisioning, the automation of all procedures and tools to manage the lifecycle of an identity, and Longevity, the creation of a historical record of an identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Consumable Value Components?

A

Single Sign-On, reducing number of usernames and passwords, Personalisation, preference management, and Self Service, enable users to self register for access to business services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Management Components?

A

User Management, managing user profile and preference, Access Control Management, managing authentication and authorisation, Privacy Management, implements privacy, and Federation Management, establishment of trusted relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Federated Identity Management?

A

Federated Identity Management systems support multiple identity providers and a distributed storage, allows multiple organisations to use identity storage, and use certain providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the issues with Federated Identity Management?

A

Identities can change, there could be a difference between federated identity and local identity to a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 Service Models for Cloud Computing?

A

Software as a Service (SaaS), the consumer uses an application which runs under the provider’s infrastructure, Platform as a Service (PaaS), the consumer can create their own applications on the infrastructure, and Infrastructure as a Service (IaaS), complete freedom by being given their own infrastructure to make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 4 Deployment Models for Cloud Computing?

A

Private Cloud, exclusive use for a single organisation, Community Cloud, exclusive use for a community of users, Public Cloud, open use by the general public, and Hybrid Cloud, a mixture of previous models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two key components of a supply chain?

A

Physical, the network of organisations, the linkages, the different processes and activities that produce value and goods, and Information, the full set of elements necessary to collect information, transform this information into data, and distribute this information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three main deployment models for Identity Management Systems?

A

Silos, Walled Gardens, Federations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Silos deployment model for Identity Management Systems?

A

Identity Management Environment is put in place by a single entity for a fixed user and resource community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the Walled Gardens deployment model for Identity Management Systems?

A

A closed community of organisations with a single identity management system deployed to serve the common user community of a collection of businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the Federations deployment model for Identity Management Systems

A

A truly distributed model with the main difference from Walled Gardens being that there is no single entity governing the system, and instead having multiple Identity Providers (IdP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If Remote Working is considered, what should be added?

A

Data Access should be more closely watched as the organisation might have legal obligations for data stored remotely; a VPN might be considered to prevent misdirected traffic; Single Sign On (SSO) should be considered to prevent laziness

24
Q

What are the steps of risk assessment for cloud computing?

A

Identify the Asset, Evaluate the Asset, Map Assets to Deployment Methods, Evaluate Cloud Service Models, Map Out Data Flow

25
What does it mean to evaluate the asset in cloud computing?
Check what is required for that asset's security; confidentiality, integrity and/or availability
26
What does it mean to map assets to deployment methods in cloud computing?
Determine if you are willing to make the asset public, private but internal, private but external, community, or hybrid
27
What does it mean to evaluate cloud service models in cloud computing?
Focus on how much control you have with which service you'll pick and if you have any specific requirements for a service model
28
What does it mean to map out the data flow in cloud computing?
Map out the data flow between your organisation, the cloud service, and any customers or clients. It also important you understand whether and how data can move in and out of the cloud
29
Name 5 of the Egregious 11 from the Cloud Security Alliance
Any 5 from: Insufficient Identity, Credential, Access Control Insecure Interfaces and API Misconfiguration and Inadequate Change Control Lack of Cloud Security Architecture and Strategy Insecure Software Development Unsecure Third-Party Resources System Vulnerabilities Accidental Cloud Data Disclosure Misconfiguration and Exploitation of Serverless and Container Workloads Organised Crime, Hackers and APT Cloud Storage Data Exfiltration
30
What are the 3 types of risk in the supply chain?
Supplier Focused, Internal Focused, Customer Focused
31
What is included in Supplier Focused Risk?
Relationship, HR, Market Dynamics, Disaster
32
What is included in Internal Focused Risk?
Operational, Technical and Financial risks
33
What is included in Customer Focused Risk
Distribution, Market, Brand/Reputation
34
What does the Cloud Security Alliance break risk management into?
The Cloud Security Alliance breaks down risk management into 14 different domains
35
Name 5 of the 14 different domains from the Cloud Security Alliance
Any 5 from: Cloud Computing Concepts and Architectures Governance and Enterprise Risk Management Legal Issues, Contracts and Electronic Discovery Compliance and Audit Management Information Governance Management Plane and Business Continuity Infrastructure Security Virtualisation and Containers Incident Response Application Security Data Security and Encryption Identity, Entitlement and Access Management Security as a Service Related Technologies
36
Name 5 Security Challenges for BYOD
Any 5 from: Lost Devices Personal use = Riskier Use Multiple Device Types and OSes Jailbroken/Modded Devices Applications, Social Media Lack of control over device, data and security Network Attacks Malware Intrusions Phishing Attacks Ineffective Management Employee Privacy
37
What are the 7 steps to a BYOD security plan?
Identify the risks; form a committee to understand the risks; decide how to enforce policies; build a project plan; evaluate solutions; implement solutions; periodically reassess solutions
38
What are the 2 key categories of BYOD risks?
Device Risks, technology with no control, and App Risks, employees installing third party apps
39
What are the 10 steps to a BYOD security policy?
Review current policy; determine which devices are supported; set expectations; write policies; make a PIN mandatory; enforce encryption at rest; determine apps allowed; provide training; look for apps that allow things like reporting; consider MDM
40
What is Requirements Analysis in the Secure Software Development Lifecycle (SSDLC)?
Determine what security measures need to be put in place
41
What is Specification in the Secure Software Development Lifecycle (SSDLC)?
Determine the main objectives of the system (Not security)
42
What is Implementation in the Secure Software Development Lifecycle (SSDLC)?
Getting the necessary components to implement the system
43
What does an ineffective Identity Management System cause?
Increased costs; inability to carry out function; reduced security; placement of liability; inability to charge for services
44
Where are the feedback loops in the Secure Software Development Lifecycle?
They always return to just after Scope and Policy. The first is after Requirement Analysis, then after Specification, then after Implementation, and finally after Management and Audit
45
What are three security benefits of Cloud Computing?
Any 3 from: Cheaper when implemented at a larger scale Security puts the cloud provider further in the market and is a motivator Standardised interfaces for managed security structures Rapid, smart scaling of resources for security purposes On demand audit and evidence gathering More timely, effective and efficient updates Audits force better risk management Resources are concentrated
46
When is an organisation forced to comply with the Payment Card Industry Data Security Standard (PCIDSS)?
Any entity that uses payment card processing is required to comply with PCIDSS
47
What is the scope of assessment for PCIDSS?
The PCI DSS security requirements apply to all system components, including all systems that provide security services, and virtualisation components such as virtual machines
48
What does the Cardholder Data Environment comprise of?
Technology that stores, processes or transmits cardholder data, network components, server types such as the web, and applications such as purchased ones
49
How do you determine the scope of review for assessment for PCIDSS?
Identify all locations and flows of cardholder data
50
What is network segmentation for PCIDSS?
Isolating the cardholder data environment from the remainder of the network. This can limit the scope of assessment
51
If using third parties, what do you need to do for PCIDSS?
The Report on Compliance must document the role of every service provider
52
What are the six key parts to the PCIDSS Report on Compliance?
Executive Summary Description of Scope Details about Reviewed Environment Contact Information and Report Date Quarterly Scan Results Findings and Observations
53
What is De-Identification?
Removing or altering data that could be used to identify a patient
54
Give 3 reasons why De-Identification is hard
Any 3 from: Personal Identifiers Removed Record Order Scrambling Dates Reduced Not Restricted to Medical Data
55
Why should there be different roles when doing the Secure Software Development Lifecycle?
Auditing and Operation is separate so that there is separation of duties, not giving too much power to one person to prevent a break if that person is unable to do their job or they seek harm