Corporate Security #1 Flashcards

(30 cards)

1
Q

Note: Cyber Essential ‘the 5 Basic Requirements’ are also refered to as ….

A

the 5 Technical Controls’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 Cyber Essentials Basic Requirements?

A

1) Firewalls 2) Security Configurations 3) Security Update Management 4) User Access Control 5) Malware Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The five Cyber Essentials Requirements (Firewall, etc) apply to all software/devices that do what 3 things?

A

1) Accept incoming connections from Internet 2) Establish outbound connections to Internet 3) Control the flow of data between devices and internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Firewall?

A

A Firewall is a Network Security Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a Firewall do?

A

Firewalls block/allow traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Goal/Aim of a Firewall?

A

Make sure only necessary network services are accessed by the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Firewall has three requirements. What is the first requirement, about a Firewall’s default behaviour?

A

By default, Firewalls block all inbound connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Firewall has three requirements. What is the second requirement, about a Firewall’s inbound connection rules?

A

Every inbound rule that accepts connections must be motivated and documented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Firewall has three requirements. What is the third requirement, about uneccessary Firewall rules?

A

Remove or disable Firewall rules when they’re not needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Secure Configuration?

A

A set of best practices for the configuration of computers/devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the first Goal/Aim of Secure Configuration, about network device vulnerabilites?

A

Ensure that network devices are properly configured to reduce vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the second Goal/Aim of Secure Configuration, about network device services?

A

Ensure that network devices are properly configured to only offer the services required of their role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure Configuration has 4 requirements. What is the first requirement, about unnecessary software?

A

Remove or disable unnecessary software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure Configuration has 4 requirements. What is the second requirement, about auto-run?

A

Disable auto-run features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Secure Configuration has 4 requirements. What is the third requirement, about passwords?

A

Change guessable passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Configuration has 4 requirements. What is the fourth requirement, about authentication?

A

Authenticate users before granting access

17
Q

What is Security Update Management?

A

A set of best practices for the maintenance and update of software

18
Q

What is the Aim of Security Update Management?

A

Ensure that devices and software are not vulnerable to known security issues that have patches available

19
Q

Security Update Management has 3 requirements. What is the first requirement, about software licensing?

A

All software must be licensed or removed

20
Q

Security Update Management has 3 requirements. What is the second requirement, about automatic updates?

A

Have automatic software updates enabled where possible

21
Q

Security Update Management has 3 requirements. What is the third requirement, about when to apply updates?

A

Make sure updates are applied (manually, if required) within 14 days of release

22
Q

What is User access control?

A

A set of processes to manage accounts

23
Q

What is the Aim of User access control?

A

Ensure that user accounts are assigned to authorised people only, and provide access only to the things the user needs to carry out their role

24
Q

User access control has 3 requirements. What is the first requirement, about removing accounts?

A

Remove/disable accounts when no longer required

25
User access control has 3 requirements. What is the second requirement, about removing privileges?
Remove/disable special access privileges when no longer required
26
User access control has 3 requirements. What is the third requirement, about administrative accounts?
Use separate accounts to perform administrative activities only
27
What is the Aim of Malware Protection?
To restrict execution of known malware and untrusted software, from causing damage or accessing data
28
What does Malware Protection do?
Verify if software is malicious
29
Malware Protection has two listed requirements for each device. What is the first requirement?
Anti-malware software
30
What is the second requirement for Malware Protection, about applications?
Application whitelisting: only approved applications are allowed to execute on devices