midterm Flashcards

(81 cards)

1
Q
  • Adverse events
  • respective organizational units to prepare for,
    detect, react to, and recover
  • restore normal modes of operation with minimal
    cost
A

CONTIGENCY PLANNING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • crucial foundation for the initial planning
    stages
  • serves as an investigation and assessment
    of the impact
  • systematic process to determine and
    evaluate the potential effects of an
    interruption to critical business operations
  • preparatory activity common to both CP and
    risk management.
  • helps the organization determine which
    business functions and information systems
    are the most critical to the success of the
    organization.
A

BUSINESS IMPACT ANALYSIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When undertaking the BIA, the organization should
consider the following:

A

Scope
Plan
Balance
Objective
Follow-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

maximum amount of time that a system
resource can remain unavailable

A

RECOVER TIME OBJECTIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

point in time before a disruption or system
outage to which business process data can
be recovered

A

RECOVERY POINT OBJECTIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • total amount of time the system owner or
    authorizing official is willing to accept for a
    business process outage or disruption.
A

MAXIMUM TOLERABLE DOWNTIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

amount of effort (expressed as elapsed time)
needed to make business functions work
again after the technology element is
recovered.

A

WORK RECOVERY TIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

must be carefully planned and coordinated
* describe the overall process, and reaction
* planning and preparation efforts for
detecting, reacting to, and recovering from
an incident.

A

INCIDENT RESPONSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

describe the entire set of activities or a
specific phase in the overall reaction.
* focuses on the immediate response to an
incident.
* actions taken

A

INCIDENT RESPONSE PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

detailed step-by-step methods of preparing,
detecting, reacting to, and recovering from
an incident.
* During the incident - planners develop and
document the procedures that must be
performed during the incident.
* After the incident - must be performed
immediately after the incident has ceased.
* Before the incident — draft a third set of
procedures

A

IR PROCEDURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recognition that an incident is
under way

A

Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Responding to the incident in a
predetermined fashion to contain and
mitigate its potential damage

A

Reaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

— Returning all systems and data
to their state before the incident

A

3Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A combination of
on-site and off-site tape-drive, hard-drive,
and cloud backup methods

A

Traditional Data Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

—transfers data in bulk
batches to an off-site facility

A

Electronic Vaulting—

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

transfers only
transaction data in near real time to an offsite facility.

A

Remote Journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

transfers duplicate
online transaction data and duplicate
databases to a remote site on a redundant
server

A

Database Shadowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

recommends the creation of at least three
copies of critical data (the original and two
copies)

A

3-2-1 BACKUP RULE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • events represent the potential for loss, they
    are referred to as adverse events.
A

INCIDENT CANDIDATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

adverse event that could result in a loss of
information assets

A

INCIDENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • composed of technical IT, managerial IT, and
    InfoSec professionals who are prepared to
    detect, react to, and recover from an incident;
    may include members of the IRPT.
A

COMPUTER SECURITY INCIDENT RESPONSE
TEAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

— Relates to risk management and
governance

A

Identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Relates to implementation of
effective security controls (policy, education,
training and awareness, and technology)

A

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Relates to the identification of
adverse events

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Relates to reacting to an incident
Respond
26
Relates to putting things “as they were before” the incident
Recover
27
NIST CYBERSECURITY FRAMEWORK
Identify Protect Detect Respond Recover
28
organization’s set of planning and preparation efforts for detecting, reacting to, and recovering from a disaster.
DISASTER RECOVERY
29
which focuses on restoring operations at the primary site
DISASTER RECOVERY PLAN
30
policy document that guides the development and implementation of DR plans and the formulation and performance of DR teams.
DISASTER RECOVERY POLICY
31
DISASTER CLASSIFICATION
* Fire * Flood * Earthquake * Lightning * Electrostatic Discharge (ESD)
32
when the damage is major or will affect the organization’s functioning over the long term * ensures that critical business functions can continue if a disaster occurs.
BUSINESS CONTINUITY PLAN
33
CONTINUITY STRATEGIES
Hot Site Cold Site Warm Site
34
Real-time data synchronization. Most Expensive
Hot Site
35
No data backup and No data synchronization. Least Expensive
Cold Site
36
Data is synchronized daily or weekly. Cost Effective
* Warm Site
37
6 KEY CONTIGENCY PLAN STEPS
IDENTIFY CHOOSE LEARN DETERMIINE DEVELOP EDUCATE
38
collects information about the organization and the threats it faces * consists of a coordinating executive, representatives from major business units, and the managers responsible for each of the other three teams. * It should include the following personnel: * Champion—high-level manager (COO/CEO/PRESIDENT) * Project manager—mid-level operations manager
CONTIGENCY PLANNING MANAGEMENT TEAM
39
The team responsible for IR plan - organization’s preparation, reaction, and recovery from incident
Incident Response Planning Team (IRPT)
40
The team responsible for DR plan - organization’s preparation, response, and recovery from disasters
Disaster Recovery Planning Team (DRPT)
41
The team responsible for BC plan - establishing primary operations at an alternate site until the disaster recovery planning team can recover the primary site
Business Continuity Planning Team (BCPT)
42
* functional areas of the organization assigned to develop and implement the CM plan.
Crisis Management Planning Team (CMPT)
43
* Focuses on the effects that a disaster has on people than its effects on other assets.
CRISIS MANAGEMENT
44
systems determine whether and how to admit a user into a trusted area of the organization
ACCESS CONTROL
45
provide the ability to share resources in a peer-to-peer configuration, which allows users to control and possibly provide access to information or resources at their disposal.
DISCRETIONARY ACCESS CONTROLS (DACS)
46
are managed by a central authority in the organization.
NONDISCRETIONARY ACCESS CONTROLS (NDACS)
47
users are assigned a matrix of authorizations for particular areas of access.
LATTICE-BASED ACCESS CONTROL (LBAC)
48
position or temporary assignment like project manager
ROLE-BASED ACCESS CONTROLS (RBACS
49
are tied to a particular chore or responsibility such as a department’s printer administrator
TASK-BASED ACCESS CONTROLS (TBACS)
50
use data classification schemes; they give users and data owners limited control over access to information resources.
MANDATORY ACCESS CONTROLS (MACS)
51
grants or denies access to resources based on attributes of the user, the resource, and the environment
ATTRIBUTE-BASED ACCESS CONTROLS (ABACS)
52
unverified or unauthenticated entities who seek access to a resource provide a unique label by which they are known to the system. * I am a user of the system.
IDENTIFICATION
53
* process of validating an unauthenticated entity’s purported identity. * I can prove I’m a user of the system. * Something you know, Something you have, Something you are
AUTHENTICATION
54
involves confirming that a person or automated entity is approved to use an information asset by matching them to a database
AUTHORIZATION
55
also known as auditability * every action performed on a computer system or using an information asset can be associated with an authorized user or system.
ACCOUNTABILITY
56
* information security program * software service running on an existing router or server
FIREWALL
57
* examines the header information of data packets that come into a network. * scan network data packets looking for compliance with the rules of the firewall’s database or violations of those rules.
PACKET-FILTERING MODEL
58
THREE (3) SUBSETS OF PACKET-FILTERING FIREWALLS ARE:
Static Packet Filtering Dynamic Packet Filtering Stateful Packet Inspection (SPI)
59
that requires the configuration rules to be manually created, sequenced, and modified within the firewall.
. Static Packet Filtering
60
can react to network traffic and create or modify its configuration rules to adapt.
Dynamic Packet Filtering
61
keeps track of each network connection between internal and external systems using a state table and that expedites the filtering of those communications.
Stateful Packet Inspection (SPI)
62
also known as an application firewall * is frequently installed on a dedicated computer separate from the filtering router, but it is commonly used in conjunction with a filtering router.
APPLICATION LAYER PROXY FIREWALLS
63
designed to operate at the media access control sublayer of the network’s data link layer (Layer 2).
MEDIA ACCESS CONTROL LAYER FIREWALLS
64
combine the elements of other types of firewalls—that is, the elements of packetfiltering, application layer proxy, and media access control layer firewalls.
HYBRID FIREWALLS
65
All firewall devices can be configured in several network connection architectures
FIREWALL ARCHITECTURES
66
* An architecture can be implemented as a packet-filtering router, or it could be a firewall behind a router that is not configured for packet filtering.
SINGLE BASTION HOSTS
67
* A networking scheme in which multiple real, routable external IP addresses are converted to special ranges of internal IP addresses, usually on a one-to-one basis; that is, one external valid address directly maps to one assigned internal address.
Network Address Translation (NAT)
68
combines the packet-filtering router with a separate, dedicated firewall
SCREENED HOST ARCHITECTURE
69
The dominant architecture today is the screened subnet used with a DMZ.
SCREENED SUBNET ARCHITECTURE (WITH DMZ)
70
Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules.
FIREWALL RULES
71
is another utility that can help protect an organization’s systems from misuse and unintentional denial-of-service problems.
CONTENT FILTER
72
The connections between company networks and the Internet use firewalls to safeguard that interface.
REMOTE ACCESS
73
* is a technology that enables the creation of a secure and encrypted connection between your device and the internet. * NORDVPN * PROTON * MULLVAD * EXPRESSVPN
VIRTUAL PRIVATE NETWORKS (VPNS)
74
also known as a legacy VPN, uses leased circuits from a service provider and conducts packet switching over these leased circuits.
TRUSTED VPN
75
use security protocols like IPSec to encrypt traffic transmitted across unsecured public networks like the Internet.
SECURE VPNS
76
* combines the trusted and secure technologies, providing encrypted transmissions (as in secure VPN) over some or all of a trusted VPN network.
HYBRID VPN
77
of incoming and outgoing data, in which the native protocol of the client is embedded within the frames of a protocol that can be routed over the public network and be usable by the server network environment.
ENCAPSULATION
78
* of incoming and outgoing data to keep the data contents private while in transit over the public network, but usable by the client and server computers and/or the local networks on both ends of the VPN connection.
ENCRYPTION
79
of the remote computer and perhaps the remote user as well. Authentication and subsequent user authorization to perform specific actions are predicated on accurate and reliable identification of the remote system and user
AUTHENTICATION
80
the data within an IP packet is encrypted, but the header information is not.
TRANSPORT MODE
81
* establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network.
TUNNEL MODE