Chapter 13: Security Operations Flashcards Preview

CISSP > Chapter 13: Security Operations > Flashcards

Flashcards in Chapter 13: Security Operations Deck (30):
1

What is the need to know principle?

The requirement that users are granted access only to data or resources they need to perform assigned work tasks.

2

What is the principle of least privilege?

Subjects are granted only the privileges necessary to perform assigned work tasks and no more.

3

What is separation of duties and responsibilities?

Ensuring that no single person has total control over a critical function or system.

4

What is separation of privilege?

Similar to separation of duties and responsibilities. Applies the principle of least privilege to applications and processes.

5

What is segregation of duties?

Ensuring that individuals do not have excessive system access that may result in a conflict of interest. Combines separation of duties with least privilege.

6

What is split knowledge?

Combines separation of duties and two-person control into a single solution. Information or privilege to perform an operation is divided among multiple users.

7

What is two-person control?

Requiring approval of two individuals for critical tasks.

8

What is job rotation?

AKA rotation of duties. Employees are rotated through jobs or job responsibilities.

9

What are the benefits of job rotation/rotation of duties?

Provides peer review, reduces collusion and fraud, enables cross-training.

10

What are examples of privilged operations that should be monitored for administrative accounts?

accessing audit logs
changing system time
configuring interfaces
managing user accounts
controlling system roboots
controlling communication paths
backing up and restoring the sstem
running script/task automation tools
configuring security mechanism controls
user operating system control commands
using database recovery tools and log files.

11

What is PII?

Personally Identifiable Information.

Any information that can distinguish or trace a person's identity. Name, SSN, date/place of birth, mother's maiden name, biometric info.

12

What is one common way sensitive information is compromised?

Loss of backup tapes.

13

What is data reminance?

Data that remains after it has supposedly been removed.

14

List terms commonly associated with destroying data.

Erasing, clearing, purging, declassification, sanitization, degaussing, destruction.

15

What is erasing?

Performing a delete operation against a file, selection of files, or the entire media. Usually only deletes an index.

16

What is clearing?

Unclassified data is written over all addressible locations on the media. Data can't be recovered using traditional recovery tools.

17

What is purging?

More intense form of clearing. Provides a level of assurance that the data is unrecoverable using all known methods. Often multiple clearing passes.

18

What is declassification?

Any process that purges media or a system in preparation for reuse in an unclassified environment.

19

What is sanitization?

A combination of processes that removes data from a asystem or from media. Ensures data can't be recovered by any means.

20

What is degaussing?

Erasing data using a strong magnetic field. Not usually recommended for hard disks. Doesn't work on optical media.

21

What is destruction?

Final stage in the media life cycle, after proper sanitization. Incineration, crushing,shredding, dissolving.

22

Why would organizations buy smartphones for their employees?

It gives them control over the devices which they can use to secure them for example enabling encryption, screen locks, GPS, and remote wipe capabilities.

23

How can you overcome remote wipe capabilities?

Remove the SIM card.

24

What are the steps of patch management?

1. Evaluate patches
2. Test patches
3. Approve patches
4. Deploy the patches
5. Verify that patches are deployed

25

What is CVE?

Common Vulnerabiltiies and Exposures

26

Who maintains the CVE dataase?

MITRE.

27

What is the CVE database used for?

Usually used by patch management and vulnerability management tools for scanning for specific vulnerabilties.

28

What is baselining?

In configuration management, it's the starting configuation for a system.

29

What are the steps in the change management process?

1. Request the change
2. Review the change
3. Approve/disapprove the change
4. Schedule and implement the change
5. Document the change

30

What are common items to check in a security audit?

Patch management, vulnerability management, configuration management, change management