Day 2 12/22/2018 @27th march Flashcards

1
Q

Abstraction

A

similar elements are put into same group/class ,that are assigned security controls , restrictions or permissions as a collective .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Difference between Data hiding and Security through obscurity

A

Data hiding is the act of intentionally positioning data so that its not viewable from unauthorized subject. Security through obsecurity is the idea not informing subject about the object and thinks that data will be protected that way(no secuirty)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Factor associated with Merger and Acquisition

A

Inappropriate information disclosure , data loss,downtime or failure to achieve sufficient return on investment .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Divestiture

A

selling off business or employee reduction, Data disclosure risk . Assets has to be sanitized to prevent data leakage , storage media should be removed and destroyed.employee exit interview , nda …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Change Management

A

The goal of change management
> Change does not lead to reduced or compromised security
> Rollback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Change Control process

A

> > implement changes in a monitored and orderly manner
a formalized testing process ensures that expected results will be found
all the changes can be reversed or roll back
users are informed of changes before they occur to prevent loss of productivity
analyze if there is any negative impact
changes are reveiwed and approved by CAB .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Control Framework

A
COBIT   best IT security practices crafted by ISACA.Itis also used by auditors. Business focused .
5 Principals
Stake khete end to end a gelam ask korlo single kina, holistic approach niye bollam separate governence from management
1. Meet stake holder needs
2. covering the enterprise end to end
3. apply single integrated framework
4. enabling holistic approach
5. separate governence from management.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ITIL

A

developed by british government. customized it security solution starting point , IT services management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IEC/ISO 270002 Starndard

12 security controls and their objectives

A

12 security controls and their objectives

  1. R isk Assessment
  2. S ecurity policy
  3. O riganization information security
  4. A sset Management
  5. H uman Resource Security
  6. P hysical and Environment security
  7. C ommunication and operations managment
  8. A ccess control
  9. I nformation system acquisition, development and maintennace
  10. I nformation security incident management
  11. B usiness continuity management
  12. C omplaince
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Modeling

A

Identify threats, categorize and anaylize, 3 types of threat modeling 1. asset based(identify valuable asset first then find vulnerabilities) 2. threat based (identify attackers and their goals) 3. software based (for companies who develop softwares, even those have own websites)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
S
T
R
I
D
E
Model
A

developed by microsoft , threat categorization scheme
S - spoofing
T - tempering - unauth changes and manipulation of data
R - repudation
I - information disclosure
D - denial
E - elevation of privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

D R E A D model

A

its a rating system of threats ,
D - Damage potential (how severe)
R - Reproducibility
E - exploitability - how hard its perform to attack
A - Affected users
D - Discoverability - how hard its to identify the weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Precautions to be taken before integration with 3rd party

A
  1. On site assessment take interviews to know their work procedure
  2. Document exchange and review
  3. process/policy review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOC1 vs SOC2 Audit

A

SOC1 for companies who hosting financial information of customers .
SOC2 security controls in relation to CIA .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

job description

A

job descriptions are important to the design and support of a security solution, SOC2 and ISO 27001 requires annual job description review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

seperation of duties

A

Least privilege, prevent collusion -> means two three people make some illegal thing to happen

17
Q

job rotation

A
  1. All gets same knowledge , so many alternatives, with the help of cross training its also possible to achieve
  2. Theft protection which can happen due to single person is the only handler
  3. also prevents collusion
18
Q

NCA

A

Non complete agreement , not often enforceable in court ,NCA used to prevent worker from jumping one company to another company for salary increase .

19
Q

onboard

A

adding new employee in Identity and access management system or reward or promote exsting employee to different role

20
Q

Life cycle risk threat vulnerability

A
Assets------ Threat
       \                \
Safeguards     Vulnerabilites 
        \                / 
         Risk -- Exposure
21
Q

For Risk Assessment rather than internal employees

A

external consultant will be preferred

22
Q

SLE single loss expectency

A

SLE=AV(asset value)X EF(exposure factor)-> if any loss happens then what is the percentage .

23
Q

ALE (annual loss expectancy)

A

=SLE * ARO (annual rate of occurrence)

24
Q

Qualitive Risk analysis technique

A
  1. Brainstorming 2. Delphi technique 3. story boarding

4. Focus groups 5.Surveys 6..questionnaires 7.checklists 8.one to one meeting 9.interviews

25
Q

Delphi technique

A

Feedback and response process used for a group to come to an consensus.

26
Q

Risk Acceptance

A

clearly written as sign off letter, why safeguard not implelemted , who is responsible for this .

27
Q

RISK Avoidance

A

choosing alternate option which has less risk , suppose dont build home near river .

28
Q

Residual Risk=remaining Risk

A

=total Risk(=Threat * vulnerability*asset value) - control gap

29
Q

Quantititve Vs qualitive

A

Quantitative risk assessment—Deals with dollar amounts. It attempts to assign a cost (monetary value) to the elements of risk assessment and the assets and threats of a risk analysis.
Qualitative risk assessment—Ranks threats by nondollar values and is based more on scenario, intuition, and experience

30
Q

Risk Rejection

A

Rejected—Depending on the situation, any one of the preceding methods might be an acceptable way to handle risk. Risk rejection is not acceptable, as it means that the risk will be ignored on the hope that it will go away or not occur

31
Q

Points to be remembered

A

Another item that is sometimes overlooked in quantitative risk assessment is the total cost of a loss. The team should review these items for such costs:

Lost productivity
Cost of repair
Value of the damaged equipment or lost data
Cost to replace the equipment or reload the data

32
Q

RISK Rating Qualitative

A

Low—Minor inconvenience; can be tolerated for a short period of time but will not result in financial loss.
Medium—Can result in damage to the organization, cost a moderate amount of money to repair, and result in negative publicity.
High—Will result in a loss of goodwill between the company, client, or employee; may result in a large legal action or fine, or cause the company to significantly lose revenue or earnings