Ch11: Implementing Policies to Mitigate Risks Flashcards

1
Q

Written security policies are

A

administrative controls that identify a security plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personnel create plans and procedures to

A

implement security controls and enforce the security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mandatory vacation policies

A

require employees to take time away from their job to help deter fraud and discover malicious activities while the employee is away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Separation of duties

A

prevents any single person or entity from controlling all the functions of a critical or sensitive process by dividing the tasks between employees. This helps prevent potential fraud (e.g. single person prints and signs checks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Job rotation policies

A

require employees to change roles on a regular basis. This helps ensure that employees cannot continue with fraudulent activity indefinitely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clean desk policy

A

requires users to organize their areas to reduce the risk of possible data theft. Reminds users to secure sensitive data and may include a statement about not writing down passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Background checks

A

investigate the history of an individual prior to employment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When an individual departs an organization, sometimes a _ is conducted

A

exit interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Improper use of social networking can result in…

A

inadvertent information disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_ occurs when users install P2P software and unintentionally share files

A

Data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Organizations often block P2P software…

A

at the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MOU/MOA

A

Memorandum of understanding or memorandum of agreement defines responsibilities of each party, but is not as strict as a SLA (service level agreement) or ISA (interconnection security agreement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If the parties will be handling sensitive data, they should include a…

A

ISA to ensure strict guidelines are in place to protect the data while in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A MOU/MOA often supports a..

A

ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public data…

A

is available to anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidential data…

A

is kept secret among a certain group of people

17
Q

Proprietary data…

A

is data related to ownership, such as patents or trade secrets

18
Q

Private data…

A

is information about individuals that should remain private

19
Q

Data classifications and data labeling help ensure…

A

personnel apply the proper security controls to protect information

20
Q

Cluster tip wiping

A

is a special process that removes the random data stored at the end of a file (can sanitize files stored on a system preventing random, possibly proprietary data showing up in this area)

21
Q

Owner

A

has overall responsibility for protection of data

22
Q

Steward or custodian

A

handles routine tasks to protect data

23
Q

Privacy officer

A

an executive responsible for ensuring the organization complies with relevant laws

24
Q

An incident response policy defines

A

a security incident and incident response procedures

25
Incident response procedures start with
preparation to prepare for and prevent incidents
26
_ allows personnel to analyze the incident and the response with the goal of preventing a future occurence
reviewing lessons learned
27
When collecting data for a forensic analysis, you should...
collect it from the most volatile to the least volatile. Order of volatility is cache, RAM, swap, hard drive, logs on remote systems, archived media
28
Forensic image
bit-by-bit copy of the data that does not modify the data during the capture
29
A chain of custody provides
assurances that evidence has been controlled and handled properly after its collection. It documents who handled the evidence and when they handled it
30
Legal hold
court order to preserve data as evidence
31
Role-based training
ensures that employees receive appropriate training based on their roles in the organization
32
Common roles that require role-based training
data owners, system admins, system owners, end users, privileged users, executive users