Ch11: Implementing Policies to Mitigate Risks Flashcards

1
Q

Written security policies are

A

administrative controls that identify a security plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personnel create plans and procedures to

A

implement security controls and enforce the security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mandatory vacation policies

A

require employees to take time away from their job to help deter fraud and discover malicious activities while the employee is away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Separation of duties

A

prevents any single person or entity from controlling all the functions of a critical or sensitive process by dividing the tasks between employees. This helps prevent potential fraud (e.g. single person prints and signs checks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Job rotation policies

A

require employees to change roles on a regular basis. This helps ensure that employees cannot continue with fraudulent activity indefinitely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clean desk policy

A

requires users to organize their areas to reduce the risk of possible data theft. Reminds users to secure sensitive data and may include a statement about not writing down passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Background checks

A

investigate the history of an individual prior to employment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When an individual departs an organization, sometimes a _ is conducted

A

exit interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Improper use of social networking can result in…

A

inadvertent information disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_ occurs when users install P2P software and unintentionally share files

A

Data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Organizations often block P2P software…

A

at the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MOU/MOA

A

Memorandum of understanding or memorandum of agreement defines responsibilities of each party, but is not as strict as a SLA (service level agreement) or ISA (interconnection security agreement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If the parties will be handling sensitive data, they should include a…

A

ISA to ensure strict guidelines are in place to protect the data while in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A MOU/MOA often supports a..

A

ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public data…

A

is available to anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidential data…

A

is kept secret among a certain group of people

17
Q

Proprietary data…

A

is data related to ownership, such as patents or trade secrets

18
Q

Private data…

A

is information about individuals that should remain private

19
Q

Data classifications and data labeling help ensure…

A

personnel apply the proper security controls to protect information

20
Q

Cluster tip wiping

A

is a special process that removes the random data stored at the end of a file (can sanitize files stored on a system preventing random, possibly proprietary data showing up in this area)

21
Q

Owner

A

has overall responsibility for protection of data

22
Q

Steward or custodian

A

handles routine tasks to protect data

23
Q

Privacy officer

A

an executive responsible for ensuring the organization complies with relevant laws

24
Q

An incident response policy defines

A

a security incident and incident response procedures

25
Q

Incident response procedures start with

A

preparation to prepare for and prevent incidents

26
Q

_ allows personnel to analyze the incident and the response with the goal of preventing a future occurence

A

reviewing lessons learned

27
Q

When collecting data for a forensic analysis, you should…

A

collect it from the most volatile to the least volatile. Order of volatility is cache, RAM, swap, hard drive, logs on remote systems, archived media

28
Q

Forensic image

A

bit-by-bit copy of the data that does not modify the data during the capture

29
Q

A chain of custody provides

A

assurances that evidence has been controlled and handled properly after its collection. It documents who handled the evidence and when they handled it

30
Q

Legal hold

A

court order to preserve data as evidence

31
Q

Role-based training

A

ensures that employees receive appropriate training based on their roles in the organization

32
Q

Common roles that require role-based training

A

data owners, system admins, system owners, end users, privileged users, executive users