Final Flashcards

(40 cards)

1
Q

Boundary type

A

IT Security
hardware, software and communication networks can extend to VPN, web browsing, and database

Physical Security
secured vaults, strong building walls and containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Standards

A
IT Security 
information systems in the organization best in class IT security standard for interoperability

Physical Security
Infrastructure of the organization plays an important role in providing physical security for the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maturity

A

IT Security
The IT security products are developed rapidly

Physical Security
products are not developed rapidly rather they are used for longer periods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Frequency of attacks

A

IT Security
attack against is very high in nature and the attack will be repeated often to test the resolve of the organization

Physical Security
is very low in nature and the attack is not repeated often

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack responses

A

IT Security
managed by the incident response teams by updating the software patches and using some other security control mechanisms

Physical Security
managed by the incident response teams by fixing the vulnerability which led to the attack and updating the firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk to attackers

A

IT Security
cannot be traced and it is sophisticated operation

Physical Security
can be traced easily and they can be punished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Evidence of compromise

A

IT Security
Evidence against copy of data cannot be traced

Physical Security
Physically stolen items can be noticed easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Article 2 Illegal access

A

CT, CSD, CCT
the data depends upon the access of whole computer system

“data confidentiality” the system cannot be accessed without rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Article 3 Illegal interception

A

CT
it focuses on the transmission of computer data within the computer system

data confidentiality” the system cannot be accessed without rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Article 4 Data interference

A

CT
the article 4 is going to damage, deletes or suppress the computer data

data integrity” the unauthorized users can damage, delete or modify the data without having the rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Article 5 System interference

A

CT
without having the right of the computer system, it holds back the computer data by transmitting, damaging

“Data integrity”, “Data confidentiality”, “and data privacy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Article 6 Misuse of devices

A

CCT
and access code used in the computer system are used for the purpose of offences

“data availability”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Article 8 Computer-related fraud

A

CCT
the computer data is modified, deleted or suppressed that result in inauthentic data

data integrity or data privacy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Article 9 Offenses related to child pornography

A

CCT

There is no attack on the child pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Article 10 Infringements of copyright and related rights

A

CCT
it produces, offers or distributes the data through computer system from one person to another person

“data integrity or data privacy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Article 11 Attempt in aiding or abetting

A

CCT

there is no attack in aiding the commission of offenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virus, worms or other malicious code

A

CT, CSD, CCT

depends upon what use is made of the attack

18
Q

Unauthorized access to/use of information, systems or networks

A

CT, CSD, CCT

depends upon what use is made of the attack

19
Q

Illegal generation of spam e-mail

A

CCT

crime attacks on “data confidentiality”

20
Q

Spyware

21
Q

Denial of service attacks

A

CT

crime attacks on “data availability”

22
Q

Fraud

A

CCT

crime attacks on “data confidentiality”

23
Q

Phishing

A

CT

crime attacks on “data privacy”

24
Q

Theft of other (proprietary) info including customer records, financial records

A

CT

crime attacks on “data privacy”

25
Theft of intellectual property
CT crime attacks on “data confidentiality”
26
Intentional exposure of private or sensitive information
CT crime attacks on “data privacy”
27
Identity theft of customer
CCT crime attacks on “data confidentiality”
28
Sabotage
CT crime attacks on data availability
29
Zombie machines on organization’s network/bots/use of network by BotNets
CCT
30
Web site defacement
CT crime attacks on “data integrity”
31
Extortion
CCT
32
European Union (EU) data protection directive
1. Check whether the member state protects the fundamental rights while processing the information of an individual 2. Check whether the “Data protection prevents the member states from limiting the free flow of individual’s information within the EU directive
33
OECD
calls out the measure “collection limitation”. In that principle, it states about the limitation for collecting the personal data the guideline “security safeguards” states how the personal data is protected from risks and unauthorized access
34
EU
calls out the need for “notice” in which the organization must report to the individuals what information the organization is gathering about and individual the guideline “Security” states how the organization protects the data integrity and confidential information of individual through technical support
35
Compare Tables 2 Auditable items Suggested X.816 and 3 Monitoring Areas Suggested in ISO 27002
A. Yes, table 2 describes about the auditable events of “X.816” which includes the section “connection related security events” but this section is not found in the table 3 B. No, Because the tale of “ISO27002” mainly focuses on the computer security events related to privileged operations
36
Another list of auditable events, is shown in Table 6. Compare this with Tables 2 X.816 and 3 ISO
A. Yes, OSI Model is not present in Table 6 B. Yes, most of the items in the “table 6” are not in the 2/3. Example: Successful program access, Information about the files
37
Advantages of Agent-less SIEM
This method does not require that any special software to install, configure and maintain each logging host
38
Disadvantage of Agent-less SIEM
Lack of filtering and aggregation at the individual host It takes increased amount of time to filter and analyze the logs In this method, the SIEM server requires the credentials to authenticate each logging host
39
Advantages of Agent-based SIEM
The agent program installed on log is used to transmit the log data to SIEM server It takes less amount of time to filter and analyze the logs
40
Disadvantage of Agent-based SIEM
It requires special agent program to perform the event filtering It requires the installation of multiple agents when the host has multiple types of logs