Chapter 8 Flashcards

1
Q

We further need to protect information and environments from…

A

Employees, contractors, partners, customers, service providers, and others

Inappropriate actions of human being may compromise our security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an RSA breach?

A

An example of social engineering attack

Hardware authentication tokens of RSA was stolen by attacking a company’s environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

We need a solid security awareness and training program to…

A

avoid social engineering attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

We need to consider following items to build security awareness among users

A
o protecting data 
o passwords
o social engineering
o network usage
o malware
o the use of personal equipment
o clean desk
o policy knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data protection is essential in business because of

A

o Reputation and customer retention

o Avoid any penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the practices of Data Protection?

A

o Regular training to educate employees and users

o May consider gamification techniques to increase users participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Most OSs and tools enforce certain levels of password strength:

A

at least eight characters, at least one upper case, at least one lower case, at least one symbol, at least one number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

balance the complexity of the password with the importance of what is being protected. For example…

A

bank account vs family photos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Use a policy of resetting password in a _____ interval

A

regular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

We can stipulate that new passwords cannot be a _____ of the previous 10 passwords used

A

variation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Users’ Mistakes include:

A
  • Write their password down and stick it to the underside of their keyboard
  • Passwords being shared among users
  • Passwords being created based on pet names, birthdates, or other such personal information
  • More damaging user behaviours is manually syncing passwords between systems or applications
  • Train employees and users to avoid the above actions
  • Users also need to use strong passwords in every applications and systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering refers to…

A

psychological manipulation of people into performing actions or divulging confidential information

•”Any act that influences a person to take an action that may or may not be in their best interests”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pretexting means:

A

Attackers establish fabricated scenarios to access victim’s sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Direct pretexting:

A

face-to-face communication

  • Attacker’s confidence or body language is important
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Indirect pretexting:

A

Over some communication medium

over the phone or through e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pretexting requires…

A

strong communication and psychological skills, specialized knowledge, and a quick mind in order to be successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Phishing happen mostly through…

A

mail, texting, or phone calls (electronic communications)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Phishing involves convincing the potential victim to click on a link in the e-mail to…

A

to send the victim to a fake site designed to collect personal information or credentials, or to have the victim install malware on their system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fake sites are usually well-known websites

A

Some sites are cleverly crafted; thus, difficult to distinguish from the legitimate pages that they are imitating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If the fake sites are not relevant for target victims, the attack will not be ______

A

successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Spear phishing is a…

A

targeted attack against a specific company, organization, or person

22
Q

The requirements for spear fishing are…

A

an advanced investigation to conduct a legitimate attack

The fake site may look valid

e-mail must be seen to come from a valid sender
E.g., from human resources, a manger, the corporate IT support team, a peer, or friend

23
Q

Tailgating is…

A

The act of following someone through an access control point

E.g., secure door

24
Q

Tailgating is common in locations that use _____ access controls

25
Tailgating attackers may play on the _______ of others
sympathies
26
Network Usage involves...
wired vs. wireless OR closed vs. open networks | Institute, hotel, airport etc.
27
An enterprise network gives _____ from outsiders. o Foreign devices are not ______ in corporate network o Offer alternative network, e.g., _____ wireless network
protection allowed guest
28
To protect resources in outside networks, one must:
o Implement a VPN to access the corporate network o configure the VPN client to automatically connect the device to the VPN whenever it finds itself on a foreign network
29
Users awareness about what devices they connect to which networks is important and how they need to handle _____ data that these devices might contain
sensitive
30
We must train users about some _____ ____ to avoid malware
common items
31
Common items for malware are (5 items):
1) mail attachments from people that you do not know 2) E-mail attachments containing certain file types (exe, zip, pdf, etc.) 3) Web links using shortened URLs such as http://bit.lyoWeb links using names that differ slightly from what we expect (myco.org when we expect myco.com) 4) Smart phone applications from nonofficial download sites 5) Pirated software
32
Contact ______ for assistance in the presence of unfamiliar items
helpdesk
33
Depending on policies employees may connect their ______ equipment to corporate or guest network
personal
34
Noncorporate-owned devices such as vendor laptops or MP3 players may take a bit more work to ________
communicate
35
Data needs to be handled appropriately regardless of ________ ___ _________ form
electronic or non-electronic
36
Sensitive information is not to be left out on a desk when it is to be _______ for any significant period of time
unattended
37
Sensitive data on physical media such as paper or tape needs to be disposed via
use of shred bins, data destruction services, media shredders, and so on
38
How do you convey policies and regulations with which an organization must comply?
Convey most critical information Some portion of this critical information should be condensed and communicated directly to users as a policy crib notes or highlights reel
39
We need to modifying the behavior of users in our environments in the direction of being more ______
secure
40
The security awareness and training program may consist of...
instructor-led or computer-based training
41
Security training must happen...
o during the new-employee onboarding process o at some regular interval o followed up by a mandatory quiz or attestation of understanding by the person taking the training
42
An effective way of training employees about security is
the gamification for training and educating users
43
Humans are considered____when it comes to cyber security a. Strong link b. Weak link c. Liability d. Asset
b.Weak link
44
In business, data protection is essential because of a.Reputation b. Customer retention c. Saving money d. None of the above
a. Reputation | b. Customer retention
45
A policy of changing password every _________ in a university with 30,000 users is considered a good practice. a. 15 days b. 30 days c. 90 days d. 120 days
c.90 days
46
______ is the act of unauthorized individuals entering a restricted-access building following an authorized individual. a. Tailgating b. Pretexting c. Vishing d. Dumpster Driving
a.Tailgating
47
In order to avoid malware, you must a. Use pirated software b. Download an exe c. Avoid shortened URLs d. None of the above
c.Avoid shortened URLs
48
Why might we not want to allow personal equipment to be attached to the network of our organization
Answer: It is because a personal device may not have proper security and firewall configuration. Thus, the device can lead to compromising the enterprise network. The attackers can access the secured enterprise network through the non-secured personal device. Therefore, the enterprise can configure a guest wireless network to support personal equipment from employees.
49
Why is it important not to use the same password for all of our accounts?
Answer: Using the same password for different services and applications is a bad practice. If the password is somehow disclosed or one of our accounts is compromised, then all our accounts can be compromised. It is better to use different and strong passwords for different accounts.
50
Why might using the wireless network in a hotel with a corporate laptop be dangerous?
Answer: The WiFi in hotels, cafes, or airports is an open wireless network (WPA or WPA2). Thus, these locations are the sweet spots for packet sniffing and active hearing. Therefore, if someone connects a corporate device having sensitive information to such WiFi, hackers can easily access that information.