Module 2.2 Flashcards

(15 cards)

1
Q

What are the three things you need to balance in info sec governance?

A

Functionality
Usability
Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the implementation of least privilege?

A

Design access control points (passwords)
Segmentation (certain roles)
Logging (history)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the separation of duties?

A

Enforcement of dual control = any two people have access to something. Maker and checker, two people authorize the transaction
Enforcement of review and approval = there are people who verify the action
Enforcement of mutual exclusive = their actions are different, they are mutually exclusive so that they remove the risk of collusion

  • there is the separation of duties because it reduces room for error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the shared responsibilities?

A

System ownership = one department owns the system
Ownership of controls = owns the certain controls
Information ownership = owns the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are simple systems easier to defend than complex systems?

A

smaller attack surface (environment an attack can enter), less opportunities to bypass controls, ease of use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What assets should you put defenses up for

A

network, each level of a system, each component of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is zero trust?

A

Each part of system must be secure in iteself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you implement zero trust?

A

endpoint device validation, multi-factor authentication, network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the critical systems architecture

A

This architecture ensures the ability to continue operations despite the failure

  • component
  • network
  • utility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you design system availability

A

Levels of availability
- Fault tolerance = backup is running, more expensive
- High availability = backup isn’t running, like fault tolerance
- Best effort = availability, SLAs
Fail secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you prepare for failure?

A

Redundancy
Backups
RAID (redundant array of independent disks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you choose system controls?

A

1) information protection requirements can be met by externally connected systems (shouldn’t all come from you)
2) Control must meet requirements but should not be gold plating (not one-time use)
3) controls selected must customers’ successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do segregated areas need different levels of security

A

some areas need baseline protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are TCB and its four basic functions

A

Trusted Computing Base (all components in a computing platform are critical in maintaining security)

  • Process activation
  • Execution domain switching
  • Memory protection (manage references of the system)
  • Input/output operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is TPM

A

Trusted Platform Module = The TPM is a cryptographic module that enhances computer security and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly