401_2 Flashcards
(141 cards)
Why are most worms successful?
A prevalence of undefended perimeters
OSs are left unchanged and unpatched
One application automatically installing another.
What is the CIA triad?
Confidentiality, Integrity, and Availability
What is Risk?
The probability of a threat crossing or touching a vulnerability
What is the impact of vulnerabilities in the risk calculation?
Vulnerabilities reduces the risk
How does threat affect risk?
Threats drive the risk calculation
What is the key focus of risk?
Confidentiality / Disclosure
Integrity / Alteration
Availability / Destruction
What are the primary threats?
Malware
Insider
Natural Disasters
Terrorism
What is a threat?
Any activities that represent possible danger to information or operation.
Anything that would negatively impact CIA.
Threats are the agents of Risk
What is the relationship between vulnerabilities and threats?
Vulnerabilities are the gateway by which threats are manifested.
What is a vulnerability?
A weakness in a system or process that could be exploited by a threat
What are the primary vulnerability types?
Software
Electronic
Human
Physical
What are the 4 approaches to Defense-in-Depth?
Uniform protection
Protected enclaves
Information centric
Threat vector analysis
When discussing Defense-in-Depth, how does uniform protection treat all system?
As equally important
Gives no special consideration or protection to the critical intellectual property of an organization.
To what type of threat is the uniform protection approach to Defense-in-Depth most vulnerable?
Insider
What two things are needed to manage configurations?
A baseline
A way to detect when a change occurs to the baseline
What are the dangers associated with malware?
Destroying Data
Leaking Information
Providing Backdoor Access
An effective malware defense strategy should incorporate the following items.
- Antivirus software at multiple locations
- up-to-date virus signature files
- A practice of reviewing and installing security patches
- Lock-down of system configuration and dangerous application features
- Blocking file attachments (#1 to stop email viruses)
What are the 3 primary defensive techniques incorporated into an antivirus product?
Scanners
Activity monitors
Integrity checkers
What is another word for Activity monitors?
Behavior blockers
List 2 examples of integrity verification software
Tripwire
AIDE
What are some classic locations for antivirus products?
Workstations
File and print servers
Mail servers
Internet gateways
What is a security policy?
It establishes what you must do to protect information stored on computers and contains sufficient definition of “what” to do so you can identify, measure, or evaluate the “how.”
How does a security policy protect people?
Allows people to take necessary actions without fear of reprisal
compels the safeguarding of information
eliminates, or at least reduces, personal liability
How do you sell the need for a security policy to executives and users?
To sell to executives talk about the money
To sell to users talk about how it makes their job easier