Lo3 Flashcards

1
Q

What are the steps to cyber-security risk management?

A

Identify the risks.

Measure the risk and how serious and how likely is that you might get attacked.

Monitor and report the risks.

Control the risks

Adjust the risk management process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 assets in the computer system and networks?

A

Hardware resources
Software resources
Communication equipment
Information and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give 3 examples of hardware assets

A

Hardware resources - computer ,servers ,printers ,scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give 3 examples examples of software assets

A

Software resources - Word processor ,databases ,spreadsheets bespoke software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give 3 examples of communication assets

A

Communication Resources - Hubs ,routers ,bridges ,gateways ,modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give 3 examples of information and data assets

A

Information and data resources - Customer data, employee data, financial reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is done after a vulnerability is identified?

A

Risks are placed on a scale from critical impact(High priority) to low impact(Low priority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define remediation

A

Remediation is the way vulnerabilities are dealt with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State the 3 steps in remediation

A

Patch Development
Manual
Automated Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Patch Development in remediation?

A

Where software code is written to solve a software issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Manual in remediation?

A

This is where physical steps are taken to reduce the vulnerabilities by IT technicians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Automated Tools in remediation?

A

Tools that can Identify and fix any problems without the need for human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Biometrics?

A

A tool that can identify individuals using their biological characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give 3 examples of Biometrics

A

Finger print, face recognition, voice id, retina scan etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are assets?

A

Anything with a value owned by an individual or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define vulnerability assessment tools

A

They find the vulnerabilities in the code which can be exploited to cause damage

17
Q

Define Penetration Testing

A

This is where an authorized attach on the system is conducted to see where the flaws and weaknesses are in the system

18
Q

Define Fuzz Testing

A

This is where a large amount of random data(fuzz) is entered in an attempt to discover loopholes in the code and to make it crash

19
Q

Define Sandboxing

A

Where an isolated piece of code is tested an ran without it affecting the rest of the program

20
Q

Explain the role of an Intrusion Detection System(IDS)

A

This is a software or device that monitors the network to see if there has been a violation of policies or malicious activities

21
Q

What is Physical Control in terms of security?

A

Physical control is the implementation of security measures in a de-fined structure used to deter or pre-vent unauthorized access to sensitive material

22
Q

Give 3 examples of Physical Control security methods

A

Closed-circuit surveillance cameras, Motion or thermal alarm systems, Security guards, Picture IDs, Locked and dead-bolted steel doors, access control cards, biometric access control systems and etc

23
Q

What is Software Control in terms of security?

A

Software controls is any computer program designed to enhance information security and defend computers against intrusion and unauthorized access.

24
Q

Give 3 examples of Software Control security methods

A

Firewalls, Anti-malware, Operating system updates, Patch management and etc

25
Q

What is Encryption?

A

Encryption is a tool that is used to convert plain test into something unreadable and the only way to decrypt is with a secret key/password and it is used so if data is stolen in an attack or a leak then it won’t be useful to the thieves

26
Q

What is Encryption?

A

Encryption is a tool that is used to convert plain test into something unreadable and the only way to decrypt is with a secret key/password and it is used so if data is stolen in an attack or a leak then it won’t be useful to the thieves

27
Q

What is Asymmetric encryption?

A

This is a process that uses a pair of related keys – one public key and one private key – to encrypt and decrypt a message and protect it from unauthorized access or use.

28
Q

What is Symmetric encryption?

A

This is where a key is used to encrypt some plain text and sent to someone, then the receiver uses the same secret key he knows to decrypt the message into the original format

29
Q

What is a risk?

A

A risk is a threat that something can happen that would be bad for the company in anyway

30
Q

State some risks that can happen to physical assets

A

Theft, malicious intent, defacing, redundancy

31
Q

State some risks that can happen to digital assets

A

Viruses , hacking , corruption and failure to protect from internal unauthorized access

32
Q

Describe the acceptable use policy

A

This policy outlines how to use the computers systems and the security measures to take to ensure there is no information or resource loss

33
Q

what is the digital signature acceptance policy

A

This is where a digital signature is sufficient evidence for the identity of documents

34
Q

Describe the Disaster recovery plan

A

Steps that have to be taken to recover any lost data or IT systems from any disaster

35
Q

What is cryptography?

A

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents