Chp 9: Cybersecurity processes Flashcards

1
Q

What are the three principles that cybersecurity policies should be based on according to AICPA?

A
  1. Protection - determining what to portect and the contorls required to protect them
  2. Detection - implementing systems for monitoring, recording and escalating threats once identified
  3. Response - both proactive and reactive measures, including specialist teams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should an organisation’s cybersecurity policy consider?

5 items

A
  1. Hiring and developing personnale to manage the risks, including a Chief Information Officer
  2. The connection between cybersecurity and the organisations integrity and ethical values
  3. How the board is able to oversee cybersecurity risks
  4. Monitoring and reporting of performance by the board to ensure it is successful (someone must be accountable)
  5. A connection between cybersecurity risks and other risks within the organisation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are three startegies to consider to help avoid being hacked?

A
  1. Reconnaissance - being aware of how you appear to others outside your organisation, do you appear vulnerable?
  2. Simulation - assume you will be hacked at some point and prepare for it
  3. Digital identity - find ways of identifying everyone and everything that interacts with you digitally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do Transport Layer Security (TLS) certificates do?

A

Authenticate messages or transactions

Protects form the ‘Man in the Middle’, when two organisations are communciating but the messages are being intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the following four types of encryption?
Digital Signature
Digital Envelope
Authentication
Dial-back security

A
  • Digital Signature - encyrption by using private keys, ensuring th esneder is who they claim to be
  • Digital Envelope - sending the key sperately to the encrypted message
  • Authentication - adds an extra field to a record, ysing an algorithim that has been pre-agreed between the parties
  • Dial-back security - requires someone to dial into a network and identify themselves, the sytem then dials them back in on an authorised number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four business continuity arrangements that organisations should consider for their cybersecurity disaster planning?

A
  1. Hot back-up sites - duplicated versinos of hardware and software which are called into action as soon as disaster occurs (very expensive)
  2. Warm back-up sites - similar to hot ones but take longer to implement
  3. Cold back-up sites - provide locations for business continuity but take longer than wamr sites (cheapest)
  4. Mirror sites - a duplicate website used when there is excessive traffic or in response to a disaster (very expensive)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four controls present in an information system?

A
  1. General controls - software and hardward: personnel controls, passwords etc.
  2. Application controls - Input controls (checking data entry), processing controls (reconciliations and control totals) and output controls (audit trails, suspense accounts and exception reports)
  3. Software controls - controls over the use of unauthorised software (buying from reputable suppliers, inspecting software)
  4. Network controls - protection from risks acorss any network (firewalls, encryption etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the six steps recommended in ISO 27001 as best practice for organisations cybersecurity response?

A
  1. Methodology is agreed a cross the organisation to ensure consistency
  2. Assessment of all data risk is carried out
  3. A record of the treatment of risks (TARA)
  4. A report covering all results is produced
  5. The report is accredited by an auditor (a security profile showing all controls and their status)
  6. A risk treatment plan is compiled (what needs to be done, by who and when?)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are seven potential outputs form cybersecurity monitoring systems?

A
  1. Informing regulators
  2. Identification of responsible staff
  3. Weaknesses in systems
  4. Consistent trends in events
  5. Trianing needs
  6. Policy changes needed
  7. Analysis of audit trails could also indicate a root cause
How well did you know this?
1
Not at all
2
3
4
5
Perfectly