Chapter 10 - Auditing, Testing, and Monitoring Flashcards

1
Q

Security auditing is…

A

crucial to avoid data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Auditing a computer system involves…

A

checking to see how its operation has met security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Audits can be…

A

manual or automated
narrow in scope or encompass the entire organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Assessing a system

A

defining how a system is supposed to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The first step in the auditing process, before we can even begin is…

A

assessing the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Purpose of audits

A
  • evaluate appropriate security levels
  • ensure that controls are correctly installed and working well
  • ensure that controls are effective in addressing the risk they were assigned to address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Steps in the security review cycle

A
  1. monitor
  2. audit
  3. improve
  4. secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Monitor

A

review and measure all controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Audit

A

Review the logs and overall environment analyze how well policies and controls are working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Improve

A

include proposals to improve the security program and controls in the audit results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure

A

ensure that new and existing controls work together to protect the intended level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security policy should…

A

define acceptable and unacceptable actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Promiscuous

A

everything is allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Permissive

A

anything not specifically prohibited is allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prudent

A

a reasonable list of things is permitted and all others are prohibited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Paranoid

A

very few things are permitted and all others are prohibited and carefully monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Service Organization Control (SOC)

A

a framework that defines scope and contents of three levels of audit reports

18
Q

SOC 1

A

an audit report focused on a service organization’s internal controls relevant to their clients’ financial reporting

19
Q

SOC 2

A

an audit report that focuses on the security and privacy of an organization’s information systems

20
Q

SOC 3

A

a general-use, public-facing version of a more detailed SOC 2 report, designed to reassure customers about an organization’s security

21
Q

Benchmark

A

the standard to which a system is compared to determine whether it is securely configured

22
Q

Example of a benchmark

A

the NIST cybersecurity framework

23
Q

How can we collect data for our audit?

A

questionnaires, interviews, observation, etc.

24
Q

Steps of an audit

A

Planning, fieldwork, reporting, and follow-up

25
Step 1. planning
Define the audit plan and the scope of the audit
26
Step 2. fieldwork
Analyze how well controls are working
27
Step 3. reporting
create audit logs and other reports
28
Step 4. follow up
review actions taken and determine whether issues outlined in the audit report have been solved.
29
Event logs
document general operating system and application software events
30
Access logs
document access requests to resources
31
Security logs
document security-related events
32
Audit logs
defined events that provide additional input to audit activities
33
Security Information and event management system (SIEM)
helps organizations manage log files by providing a common platform to capture and analyze entries from firewall, intrusion detection, and database server logs
34
The SIEM..
- Standardizes data - Produces visualizations of data - Monitor user activity and ensure that users act in a way that is in line with company policies
35
IDs
a control that identifies abnormal traffic
36
IPs
actively block malicious traffic
37
System hardening
Turn off or disable unnecessary services and protect the ones that are still running
38
Black-box testing
uses test methods that aren't based directly on knowledge of a program's architecture or design
39
White-box testing
based on knowledge of the application's design and source code
40
Grey-box testing
lies somewhere between black-box and white-box testing