Chp 10: Cybersecurity tools, techniques and reporting Flashcards

1
Q

What are the three levels of forensic analysis in cybersecurity?

A
  1. System level analysis - is the entire system affected or just certain parts
  2. Storage analysis - has any data stored by the organisation been affected?
  3. Network analysis - could the threat have come from an outside source?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four steps suggested by the National Institute of Standard and Technology (NIST) for handling a cybersecurity breach?

A
  1. Prevention - try to reduce incidents, where possible, before they occur
  2. Detection and analysis - incidents need to be analysed, prioritised and communicated to the right people
  3. Containment, eradication and recovery - ensure you gather evidence before removing the threat, recovery would involve restoring data form back ups
  4. Post-incident activity - classic feedback loop, learn from the experience
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the five steps the International Association of Chiefs of Police recommend when dealding with cybersecurity incidents?

A
  1. Assess the situation
  2. Conduct initial investigation
  3. Identify possible evidence
  4. Secure devices and obtain court orders
  5. Analyse results with prosecutors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is decompilation and disassembly?

A

Decompilation - A form of reverse engineering that turns binary code into source code, which is much easier for humans to read

Disassembly - similar to the above but converts it into assembler or native code, which is harder for humans to read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is White, Grey and Black-box testing?

A

Levels of penetration testing

  • White-box allows testers access to the entire network and typically review how the system works
  • Grey-box grants access up to a certain level
  • Black-box provides no access and testers must find a way in themselves, thereofre assessing the output of the system. Typically takes longer and is therefore more expensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three tiers of software security?

A
  • Tier 1 simply stops the cybersecurity attacks
  • Tier 2 stops attacks and alerts security functions
  • Tier 3 protects sensitive data, while stopping the attack and alerting security functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the following acronyms?
IPSec
MIKEY-SAKKE

A
  • IPSec - IP Security is a suite of protocols that provide secure, private communications across IP networks
  • MIKEY-SAKKE - A protocol which allows organisations to provide secure communicatinos with end-to-end encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five key features that the National Cyber Security Centre (NCSC) recommends for controlling, directing and communicating cyber security risk management activites?

A
  1. Covers how cybersecurity happens and who leads it
  2. Depends on the organisation (size regulation etc.)
  3. Link cybersecurity with organisational objectives
  4. Identifies individual(s) with responsibility for making security decisions
  5. System of feedback, empowermnet and accountability to ensure effective governance to existing arrangements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

According to the NCSC what are the internal and external reporting requirements for cybersecurity risk management?

2 internal; 3 external

A

Internal
1. The organisations core values and why
2. The risk an organisation is prepared to make (and those they’re not)

External
1. The risk management and decision-making context
2. What needs to be protected and why
3. The reliance placed on one party by another when protecting it’s assets (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three components for comparative purposes of the SOC for cybersecurity framework?

A
  1. Decription criteria - managment describes the CRMP
  2. Control criteria - management assess the effectiveness of the controls used
  3. Attestation - independent certified accountants provide their opinion on the above two criteria
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What would be in a SOC for cybersecurity report?

3 items

A
  1. Description of CRMP, in line with agreed description criteria
  2. Written assertion by managemend that: the description is in line; controls were effective in achieving security objectives
  3. Opinion from certified accountant that: description is in line; controls were effective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between SOC 2 and SOC?

4 points

A

SOC 2 is similar but is porduced by service organisations

  • intended for users to assesss their service organisations controls
  • Specific SOC 2 criteria that must be used and are reviewed by a certified accountant
  • Description criteria includes types of services provided, the system used and the boundaries of the system
  • Written assertion by management that the design and controls were effective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a SOC 2 report differ from a SOC report?

A

Also includes a detailed list of all the tests that were carried out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly