Final Flashcards
(39 cards)
What are common types of cyberattacks?
Phishing, malware, DoS, man-in-the-middle, SQL injection, social engineering.
What strategy is suggested to distinguish similar-sounding cyberattacks?
List them on a reference sheet for quick review.
How are exam questions structured for cyberattacks?
Scenario-based questions requiring identification of specific attack types.
What are the three categories of internal controls?
Preventive, Detective, Corrective.
What does the Sarbanes-Oxley Act of 2002 require?
Internal control reporting, PCAOB creation, improved financial disclosures.
What are the COSO ERM Framework objectives?
Strategic, Operations, Reporting, Compliance.
What are the COSO ERM Framework components?
Internal environment, objective setting, event identification, risk assessment, risk response, control activities, info/communication, monitoring.
What are common risk responses in COSO ERM?
Avoid, Reduce, Share, Accept.
What is the COBIT Framework used for?
IT control and governance.
What are key internal control activities?
Segregation of duties, proper authorization, system access control.
What are the Trust Services Principles?
Security, Availability, Processing Integrity, Confidentiality, Privacy.
What is the Time-Based Security Model formula?
P > D + C.
What is multi-factor authentication?
Uses different types of credentials.
What is multi-modal authentication?
Uses multiple methods of the same type.
What is defense in depth?
Using layers of security to reduce breach likelihood.
What is the difference between authentication and authorization?
Authentication verifies identity; authorization defines user permissions.
What are ACL and RBAC?
Access Control List and Role-Based Access Control.
What does Information Rights Management (IRM) do?
Restricts access and controls document/email usage.
What does Data Loss Prevention (DLP) software do?
Detects and prevents unauthorized transmission of sensitive data.
What is symmetric encryption?
Uses one key; fast but less secure.
What is asymmetric encryption?
Uses a public/private key pair; slower but more secure.
What is hashing used for?
Ensures data integrity; one-way transformation.
What is a digital signature?
Confirms authenticity and integrity.
What is a Certificate Authority (CA)?
Issues and verifies digital certificates.