Exam 1 (Material from Chapters 1 - 4) Flashcards

(149 cards)

1
Q

Internet vs World Wide Web

A

The World Wide Web is a specific subset of the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____ is the level of exposure to some event that has an effect on an asset

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Definition of a vulnerability

A

A weakness that allows a threat to be realized or to have an effect on an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition of a threat

A

Any action, either natural or human induced, that could damage an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ are hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations.

A

Information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the collection of activities that protect the information system and the data stored in it?

A

Information systems security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the things we are securing?

A

Privacy of individuals
Corporate intellectual property
Online B2C and B2B transactions
Government intellectual property

(More examples on slide 11 from CH01 slides)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is confidentiality?

A

Only authorized users can view information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is integrity?

A

Only authorized users can change information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is availability?

A

Information is accessible by authorized users whenever they request the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidential information includes?

A
  • Private data of individuals
  • Intellectual property of businesses
  • National security for countries and governments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cryptography?

A

Practice of hiding data and keeping it away from unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encryption?

A

The process of transforming data from cleartext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ciphertext?

A

The scrambled data that results from encrypting cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Availability Time Measurements

A

Uptime
Downtime
Availability [A = (Total Uptime)/(Total Uptime + Total Downtime)]
Mean time to failure (MTTF)
Mean time to repair (MTTR)
Mean time between failures (MTBF)
Recovery point objective (RPO)
Recovery time objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the seven domains of a typical IT infrastructure?

A
  • User Domain
  • Workstation Domain
  • LAN Domain
  • LAN-to-WAN Domain
  • WAN Domain
  • Remote Access Domain
  • System/Application Domain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Common Threats in the User Domain

A
  • Unauthorized access
  • Lack of user awareness
  • User apathy toward policies
  • Security policy violations
  • User inserting CD/DVD/USB with personal files
  • User downloading photos, music, or videos
  • User destroying systems, applications, and data
  • Disgruntled employee attacking organization or committing sabotage
  • Employee romance gone bad
  • Employee blackmail or extortion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Common Threats in the Workstation Domain

A
  • Unauthorized workstation access
  • Unauthorized access to systems, applications, and data
  • Desktop or laptop operating system and software vulnerabilities
  • Desktop or laptop application software vulnerabilities and patches
  • Viruses, malicious code, and other malware
  • User inserting CD/DVD/USB with personal files
  • User downloading photos, music, or videos
  • Security risk due to user violation of acceptable use policy (AUP)
  • Bring Your Own Device (BYOD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Common Threats in the LAN Domain

A
  • Unauthorized access to LAN
  • Unauthorized access to systems, applications, and data
  • LAN server operating system software vulnerabilities
  • LAN server application software vulnerabilities and software patch updates
  • Unauthorized access by rogue users on wireless LANs (WLANs)
  • Compromised confidentiality of data on WLANs
  • LAN servers with different hardware, operating systems, and software make them difficult to manage and troubleshoot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Common Threats in the LAN-to-WAN Domain

A
  • Unauthorized network probing and port scanning
  • Unauthorized access through the LAN-to-WAN Domain
  • Denial of service (DoS)/distributed denial of service (DDoS) attacks
  • IP router, firewall, and network appliance operating system vulnerability
  • IP router, firewall, and network appliance configuration file errors or weaknesses
  • Remote user download of sensitive data
  • Download of unknown file type attachments from unknown sources
  • Unknown email attachments and embedded URL links received by local users
  • Lost productivity due to local users surfing the web
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Common Threats in the WAN Domain (Internet)

A
  • Open, public, and accessible data
  • Most Internet traffic sent as cleartext
  • Vulnerable to eavesdropping
  • Vulnerable to malicious attacks
  • Vulnerable to DoS and DDoS attacks, TCP synchronize (SYN) flooding, and IP spoofing attacks
  • Vulnerable to corruption of information/data
  • Insecure Transmission Control Protocol/Internet Protocol (TCP/IP) applications
  • Hackers, attackers, and perpetrators email Trojans, worms, and malicious software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Common Threats in the WAN Domain (Connectivity)

A
  • Commingling of WAN IP traffic on the same service provider router and infrastructure
  • Maintaining high WAN service availability
  • Maximizing WAN performance and throughput
  • Using Simple Network Management Protocol (SNMP) applications and protocols maliciously (ICMP, Telnet, SNMP, DNS, etc.)
  • SNMP alarms and security monitoring 24/7/365
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Common Threats in the Remote Access Domain

A
  • Brute-force user ID and password attacks
  • Multiple logon retries and access control attacks
  • Unauthorized remote access to IT systems, applications, and data
  • Private or confidential data compromised remotely
  • Data leakage in violation of data classification standards
  • A mobile worker’s laptop is stolen
  • Mobile worker token or other authentication stolen
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Common Threats in the System/Application Domain

A
  • Unauthorized access to data centers, computer rooms, and wiring closets
  • Downtime of servers to perform maintenance
  • Server operating systems software vulnerability
  • Insecure cloud computing virtual environments by default
  • Susceptibility of client-server and web applications
  • Unauthorized access to systems
  • Data breach where private data is compromised
  • Corrupt or lost data
  • Loss of backed-up data as backup media are reused
  • Recovery of critical business functions potentially too time consuming to be useful
  • Downtime of IT systems for an extended period after a disaster
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the weakest link in security?
Humans
26
What are some strategies for reducing risk?
- Check background of job candidates carefully - Evaluate staff regularly - Rotate access to sensitive systems, applications, and data among staff positions - Test applications and software and review for quality - Regularly review security plans - Perform annual security control audits
27
Who defined a policy regarding acceptable use of Internet geared toward U.S. citizens
U.S. government and Internet Architecture Board (IAB)
28
A _____ is a short written statement that defines a course of action that applies to entire organization
policy
29
A ____ is a detailed written definition of how software and hardware are to be used
standard
30
___ are written instructions for how to use policies and standards.
Procedures
31
A ______ is a suggested course of action for using policy, standard, or procedure
guideline
32
Data Classification Standards
- Private data --- Data about people that must be kept private - Confidential --- Information or data owned by the organization - Internal use only --- Information or data shared internally by an organization - Public domain data --- Information or data shared with the public
33
U.S. federal government data classification standards:
- Top secret --- Applies to information that the classifying authority finds would cause grave damage to national security if it were disclosed - Secret --- Applies to information that the classifying authority finds would cause serious damage to national security if it were disclosed - Confidential --- Applies to information that the classifying authority finds would cause damage to national security
34
____ activities should align with the organization’s strategic goals
Risk Management
35
T/F: Risks can be positive or negative
True
36
What is a common pitfall when building a risk management plan?
Limiting the scope of the risk identification process to just inside the organization. Organizations sometimes forget to consider vendors or supply chain.
37
Risk = ______ x _________
Risk = Threat x Vulnerability
38
A ___ is an opportunity to exploit a vulnerability.
Threat
39
An exploited vulnerability results in an ___.
Impact
40
A ____ is a description of how you will manage risk.
Risk methodology
41
What is a risk register?
A list of identified risk
42
The process of identifying, assessing, prioritizing, and addressing risks is apart of what?
Risk Management
43
This is an analysis of an organization’s functions and activities that classifies them as critical or noncritical
Business impact analysis
44
This identifies the impact to the business if one or more IT functions fails and identifies the priority of different critical systems
Business impact analysis
45
What are the BIA Recovery Goals and Requirements?
Recovery point objective (RPO) Recovery time objective (RTO) Business recovery requirements Technical recovery requirements
46
This is the target state of recovered data that allows an organization to continue normal processing; the maximum amount of data loss that is acceptable
Recovery Point Objective (RPO)
47
What is the maximum allowable time in which to recover the function
Recovery Time Objective (RTO)
48
This identifies any other business functions that must already be in place for the specified recovery function to occur and help in determining the recovery sequence
Business recovery requirements
49
This defines technical prerequisites that are needed to support each critical business function
Technical recovery requirements
50
This is a written plan for a structured response to any events that result in an interruption to critical business activities or functions
Business continuity plan (BCP)
51
What are the order of priorities for a business continuity plan?
Order of priorities: Safety and well-being of people Continuity of critical business functions and operations Continuity of components within the seven domains of an IT infrastructure
52
What are the elements of a complete BCP?
- Statement defining the policy, standards, procedures, and guidelines for deployment - Project team members with defined roles, responsibilities, and accountabilities - Emergency response procedures and protection of life, safety, and infrastructure - Situation and damage assessment - Resource salvage and recovery - Alternate facilities or triage for short- or long-term emergency mode of operations and business recovery
53
This directs the actions necessary to recover resources after a disaster
Disaster Recovery Plan (DRP)
54
This extends and supports the BCP by identifying events that could cause damage to resources that are necessary to support critical business functions
Disaster Recovery Plan (DRP)
55
Explain a hot site, warm site, cold site, and mobile site.
Hot site -- Has environmental utilities, hardware, software, and data like original data center Warm site -- Has environmental utilities and basic computer hardware Cold site -- Has basic environmental utilities but no infrastructure components Mobile site -- Trailer with necessary environmental utilities that can operate as warm or cold site
56
What are the 5 DRP tests?
Checklist test Structured walk-through Simulation test Parallel test Full-interruption test
57
The difference between the security controls in place and controls you need to address vulnerabilities
Security gap
58
The comparison of the security controls in place and the controls you need to address all identified threats
Gap analysis
59
What are the steps for conducting gap analysis?
- Identify the applicable elements of the security policy and other standards - Assemble policy, standard, procedure, and guideline documents - Review and assess the implementation of the policies, standards, procedures, and guidelines - Collect inventory information for all hardware and software components - Interview users to assess knowledge of and compliance with policies - Compare the current security environment to policies in place - Prioritize identified gaps for resolution - Document and implement the remedies to conform to policies
60
Name the compliance laws
- Family Education Rights and Privacy Act (FERPA) - Federal Financial Institutions Examination Council (FFIEC) - Children’s Online Privacy Protection Act of 1998 (COPPA) - Gramm-Leach-Bliley Act (GLBA) - Government Information Security Reform Act (Security Reform Act) of 2000 - The USA PATRIOT Act of 2001 - Federal Information Security Management Act (FISMA) - Sarbanes-Oxley Act (SOX) - California Security Breach Information Act (SB 1386) of 2003 - Health Insurance Portability and Accountability Act (HIPAA) - Federal Information Security Modernization Act (FISMA) - European Union General Data Protection Regulation (GDPR) of 2016 - Payment Card Industry Data Security Standard (PCI DSS) - California Consumer Privacy Act (CCPA) of 2018
61
T/F: Cannot undo a confidentiality violation
True
62
Give examples of how to keep data confidential.
Authentication controls: -- Passwords and PINs -- Smart cards and tokens -- Biometric devices -- Digital certificates -- Challenge-response handshakes -- Kerberos authentication -- One-time passwords Authorization controls: -- Authentication server rules and permissions -- Access control lists -- Intrusion detection and prevention -- Physical access control -- Connection and access policy filters -- Network traffic filters
63
What are some BYOD Concerns?
Data ownership Support ownership Patch management Antivirus management Forensics Privacy Acceptable use policy Onboard camera/video Onboarding/ offboarding Adherence to corporate policies User acceptance Architecture/ infrastructure considerations Legal concerns
64
What are the risk management key principles?
- Do not spend more to protect an asset than it is worth. - Every countermeasure requires resources to implement and therefore should be aligned with a specific risk.
65
Definition: The likelihood that something bad will happen to an asset
risk
66
Something bad that might happen to an organization is a what?
Threat
67
Any exposure that could allow a threat to be realized is a what?
Vulnerability
68
The amount of risk or harm caused by a threat or vulnerability that is exploited by a perpetrator is the definition of what?
Impact
69
A measurable occurrence that has an impact on the business is a ____?
Event
70
Any event that violates or threatens to violate your security policy is a ____.
Incident
71
___ includes both safeguards and countermeasures.
Control
72
____ address gaps or weaknesses in controls that could lead to a realized threat.
Safeguards
73
Counters or addresses a specific threat is the definition of what?
Countermeasure
74
Component parts of risk:
- Assets - Vulnerabilities - Threats
75
Perform ___ to identify new or changed risks over time
risk assessments
76
More than a quarter of all reported attacks are by _______
insiders
77
The impact of insider attacks is proportionately _____ than attacks by outsiders
worse
78
T/F: Risk can be reduced to zero
False. Risk can never be reduced to zero.
79
_____ focuses on planning to anticipate and respond to risk without interrupting the most critical business functionality
Contingency planning
80
Explain the risk management process.
- Identify risks - Assess and prioritize risks - Plan risk response - Implement Risk Responses - Monitor and Control Risk Responses
81
How do you identify risks?
- Brainstorming - Surveys - Interviews - Working groups - Checklists - Historical information
82
What are the risk register components?
- A description of the risk - The expected impact if the associated event occurs - The probability of the event’s occurring - Steps to mitigate the risk - Steps to take should the event occur - Rank of the risk
83
______ assessments are where the cost or value of the identified risk and its financial impact are examined
Quantitative risk
84
This attempts to describe risk in financial terms and put a dollar value on each risk
Quantitative risk assessment
85
______ risk assessments are examined by assigning a rating for each identified risk
Qualitative
86
_____ assessments ranks risks based on their probability of occurrence and impact on business operations
Qualitative risk
87
Quantitative assessments are hard or soft data?
hard
88
Qualitative assessments are hard or soft data?
soft
89
What is the formula for single loss expectancy(SLE)?
SLE = Asset Value * Exposure Factor
90
What is the formula for annualized rate of occurrence (ARO)?
ARO = Number of incidents per year
91
What is the formula for annualized loss expectancy (ALE)?
ALE = Single loss expectancy(SLE) * annualized rate of occurrence (ARO)
92
In Qualitative Risk Analysis you judge risk on two scales. What are these two scales?
- Probability or likelihood - Impact
93
What are some examples of negative risks?
Reduce (reduction/mitigation) Transfer (transference/assignment) Accept (acceptance) Avoid (avoidance)
94
What are some examples of positive risks?
Exploit (exploitation) Share (sharing) Enhance (enhancement) Accept (acceptance)
95
______ = Total Risk - Mitigating controls
Residual Risk
96
_____ manage the activity phase of security—the things people do
Administrative controls
97
___ controls correspond to the life cycle of a security program
Activity phase
98
T/F: Countermeasures might pose new risk to the organization
True
99
Protecting ______ is a top-of-mind consideration for any organization
intellectual property
100
The central asset of many organizations are:
Patents Drug formulas Engineering plans Sales and marketing plans Scientific formulas Recipes
101
____ assets are among highest-profile assets in any organization
Financial
102
Loss of ___ assets due to malicious attacks is a worst-case scenario for all organizations
financial
103
_____ can have long-term effects on a company’s reputation and brand image
Finances and Financial Data breaches
104
_____ must be available for use when organizations need them
critical services
105
____ is the time during which a service is not available due to failure or maintenance
downtime
106
____ is the result of technical failure, human error, or attack
Unintentional downtime
107
___ is the amount of money a company loses due to either intentional or unintentional downtime
Opportunity cost
108
T/F: Companies that suffer from security breaches and malicious attacks that expose assets are likely to face serious negative consequences in the public eye even if the company’s response were swift and solved the problem effectively
True
109
____ hackers try to break IT security and gain access to systems with no authorization to prove technical prowess or potentially steal sensitive data
Black-hat
110
____ hackers are information systems security professionals who have authorization to identify vulnerabilities and perform penetration testing
White-hat
111
White-hat hackers are also known as what?
ethical hackers
112
____ hackers are with average abilities who may one day become black-hat hackers but could also choose to become white-hat hackers
Gray-hat
113
____ transfers software companies’ risk to its end users from having vulnerable software and being held liable for a software vulnerability
End-User Licensing Agreement (EULA)
114
Hackers continuously look for known software ____ as a means to find an exploitable weakness
vulnerabilities
115
____ is the gap in time between the announcement of a vulnerability and the application of a patch
Vulnerability window
116
____ is a vulnerability window of zero days because there is no patch yet for a known software vulnerability
Zero day
117
What are the three threat types listed in the slides?
Disclosure threats Alteration threats Denial or destruction threats
118
What are the four categories of attacks?
Fabrications Interceptions Interruptions Modifications
119
What Are Common Attack Vectors?
Attacks on availability Attacks on people Attacks on IT assets
120
Focus on _____ and implement security controls that can help mitigate the risk caused by threats and vulnerabilities
countermeasures
121
Best strategy for countermeasures is to identify _____ and reduce them to avoid attacks
vulnerabilities
122
What are two ways that people like to communicate?
Real-time communications -- Occurs instantaneously Store-and-forward communications -- Acceptable delay in transmitting communication
123
IoT Applications That Impact Humans
Health monitoring and updating Home security and smart home control systems Online calendars Near real-time tracking and monitoring via global positioning systems (GPS) Online banking, bill paying, and financial transactions Online e-commerce purchases Automobiles with smart computers and always-on Wi-Fi Internet access
124
IoT’s Impact on Business
Retail stores Virtual workplace Remote sensors Traffic-monitoring applications Business-to-consumer (B2C) service delivery model Anything as a Service (AaaS) IoT applications
125
What is B2C?
Business-to-consumer
126
Customers purchase goods and services directly from their website describes what?
Business-to-consumer (B2C)
127
What is B2B?
Business-to-business
128
Businesses conduct sales with other businesses describes what?
Business-to-business(B2B)
129
Payment Card Industry Data Security Standard (PCI DSS) protects what?
private customer data
130
What are some internet business challenges?
Growing the business through the Internet Changing an existing conventional business into an e-business Building secure and highly available websites and e-commerce portals Building a web-enabled customer-service strategy Finding new customers with Internet marketing
131
What are some issues with mobile computing?
Network speed Usability Security
132
T/F: Mobile IP enables user to move between local area network (LAN) segments and stay connected without interruption
True
133
What is a MN?
Mobile Node
134
What is a HA?
Home agent
135
What is a FA?
Foreign Agent
136
What is a COA?
Care of address
137
What is a CN?
Correspondent node
138
A mobile node connect to what?
A Foreign Agent
139
A home agent assigns a ____ to a mobile node?
Care of address (COA)
140
A care of address is a ____ for the mobile node?
Local address
141
A correspondent node sends a message to the ____?
Mobile node
142
Privacy challenges must be addressed by manufacturers and defined in the right-of-use and software ______?
End-User Licensing Agreement (EULA)
143
The End-User Licensing Agreement (EULA) must contain:
- Privacy policy statement - Definition of data, metadata, or analytical data use and rights - Ability for a user to provide consent to a manufacturer’s or application service provider’s privacy policy statement - Determine the domain of privacy
144
_____ ensures interoperability and standards can be pursued for IoT solutions
Internet Engineering Task Force (IETF)
145
______ has significant financial impacts if not properly addressed
Interoperability
146
T/F: Goal is to bring down the cost of IoT devices and supporting applications so they are affordable
True
147
Privacy data is subject to the ____ of state you live in as well as state that the IoT hosting company resides in
privacy laws
148
T/F: IoT vendor or solutions provider are required to adhere to security control requirements and data protection laws
True
149
A void in _____ and ______ for IoT devices can create an environment of bad IoT devices
interoperability standards