Domain 1: Security and Risk Management Flashcards
(119 cards)
What is type 1 authentication?
Something you know (passwords, pass phrase, PIN etc.).
What is type 2 authentication?
Something you have (ID, passport, smart card, token, cookie on PC etc.).
What is type 3 authentication?
Something you are (and Biometrics) (Fingerprint, iris scan, facial geometry etc.).
What is type 4 authentication?
Somewhere you are (IP/MAC Address).
What is type 5 authentication?
Something you do (Signature, pattern unlock).
How does top down security management differ from bottom up security management?
Bottom-Up: IT Security is seen as a nuisance and not a helper, often change when breaches happen.
Top-Down: IT leadership is on board with IT Security, they lead and set the direction. (The exam).
What is OCTAVE?
OCTAVE® - Operationally Critical Threat, Asset, and Vulnerability Evaluation. Self Directed Risk Management.
What is COBIT?
COBIT - Control Objectives for Information and related Technology. COBIT is a control framework for employing information security governance best practices within an organization. Goals for IT – Stakeholder needs are mapped down to IT related goals.
What is COSO?
COSO – Committee Of Sponsoring Organizations. Goals for the entire organization.
What is FRAP?
FRAP - Facilitated Risk Analysis Process. Analyses one business unit, application or system at a time in a roundtable brainstorm with internal employees. Impact analyzed, threats and risks prioritized.
What is the purpose of ISO 27001?
ISO 27001: Establish, implement, control and improve the ISMS. Uses PDCA (Plan, Do, Check, Act)
What is the purpose of ISO 27002?
ISO 27002: (Formerly ISO 17799) Provides practical advice on how to implement security controls. It has 10 domains it uses for ISMS.
What is the purpose of ISO 27004?
ISO 27004: Provides metrics for measuring the success of your ISMS.
What does ISO 27005 contain?
ISO 27005: Standards-based approach to risk management.
What does ISO 27799 contain?
ISO 27799: Directives on how to protect PHI (Protected Health Information)
What are the four types of evidence?
Real Evidence, Direct Evidence, and Circumstantial Evidence, Corroborative Evidence
What is real evidence?
Real Evidence: Tangible and physical objects in IT Security: Hard disks, USB drives – NOT the data on them.
What is direct evidence?
Direct Evidence: Testimony from a firsthand witness, what they experienced with their 5 senses.
What is circumstantial evidence?
Circumstantial Evidence: Evidence to support circumstances for a point or other evidence.
What is corroborative evidence?
Corroborative Evidence: Supports facts or elements of the case: not a fact on its own, but support other facts.
What is hearsay?
Hearsay: Not first-hand knowledge – normally inadmissible in a case
What does the fourth amendment protect against?
The Fourth Amendment to the United States Constitution protects citizens from unreasonable search and seizure by the government
When do exigent circumstances apply? Who decides this?
Exigent circumstances apply if there is an immediate threat to human life or of evidence destruction. This will later be decided by a court if it was justified. Only applies to law enforcement and those operating under the “color of law” – Title 18. U.S.C. Section 242 – Deprivation of Rights Under the Color of Law.
What is entrapment?
Entrapment (Illegal and unethical): When someone is persuaded to commit a crime they had no intention of committing and is then charged with it.