chapter 2 part 3 Flashcards
what is technical security architecture?
a plan that has all countermeasures including: firewalls, hardened hosts, intrusion detection, etc.
how is legacy security systems best dealt with in a company by IT?
it is not replaced all at once due to cost so instead new security systems are combined with old systems to close as many gaps in the systems security as possible.
defense in dept vs weakest links?
defense in depth: multiple independent countermeasures in series while… weakest links are single countermeasures that when breached allow attacker full access.
what are Central Security Management Consoles used for?
.provides control of all security implemented on all corporate devices (updates, etc from one location). used to counter an attack on a network and is used by the security department. often has to be carefully protected because it is a big vulnerability to the network if broken into.
inter-organizational systems?
two or more companies link networks together, neither can enforce or learn of other security practices.
centralized security management allows for what and why is this attractive?
allows all devices to be secured and updated remotely from one or a few central devices. this makes it easier to enforce security on the network because you don’t have to rely on several employees.
what is corporate security policy?
commitment of firm to strong security
major security policy is what>?
email, hiring, termination etc. strong policies when it comes to what employees should do.
PII ?
personally identifiable info.
personally identifiable info policies.?
specific policies for encryption, access controls.
AUP?
Acceptable use policy: how employees are to use devices and not to use for personal reasons.
policy teams consist of what people?
not just IT or security people as more ppl = more/broader scope of coverage and ideas.
implementation guidance?
limits discretion of implementer to simplify implementations. acts as a guide
baselines?
tells what should be achieved without telling how
promulgation?
the process of making users/employees aware of new security policies
security metrics
measurable indicators of security success/failure
fraud and abuse triangle?
how an employee becomes a criminal: opportunity, pressure (through job to hide poor performance, often found when expectations are too high.) and finally -Rationalization: person convinces themselves that they are a good person
sanctions?
person is disciplined
security governmental frameworks / guidelines (3 organizations) ?
COSCO
Cobit
ISO/IEC 27000 family
Control framework objectives: ?
strategic, operations, reporting and compliance
COBIT?
control objectives for IT : plan, organize, monitor and support (main auditing firm for I.T.)
ISO/IEC 27000 family?
certification by 3rd party. provides 11 broad areas of security including: security policy, asset management, IT security incident management, etc.