Other stuff Flashcards

1
Q

Identification -> Assessment -> Treatment -> Tracking -> Review. What’s this?

A

Risk management phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the annual loss expectancy?

A

Single loss expectancy x annual rate of occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the 6 types of security controls.

A

Physical, technical, administrative. Preventive, detective, corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s MAC?

A

Mandatory access control - set by administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s DAC?

A

Discretionary access control - set by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s RBAC?

A

Role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s a standard?

A

Mandatory rules that must be followed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s a baseline?

A

Provides the minimum necessary security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s a guideline?

A

Flexible, but recommended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s a procedure?

A

Step-by-step guides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Promiscuous, Permissive, Prudent, Paranoid. Explain?

A

Promiscuous - wide open. Permissive - only block “known bad”. Prudent - block all “known bad”, but allow based on business needs. Paranoid - no bad at all!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name 6 of the 9 vulnerability types.

A

Misconfiguration, Buffer overflow, Default installation, Unpatched, Open services, Default passwords, Design flaws, OS flaws, App flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the CC?

A

Common Criteria for Information Technology Security Evaluation - an itnernational standard (SIO/IEC 15408)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the EAL and how can it be ranked?

A

Evaluation Assurance Level - from 1 to 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s the TOE?

A

Target of evaluation - what’s being tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the ST?

A

Security target - a document that identifies the security properties of the TOE

17
Q

What’s the PP?

A

Protection profile - a document that identifies the security requirements for the service or product

18
Q

Name 5 relevant laws or standards and what they’re relevant to.

A
HIPAA - medical
SOX - corporate disclosure
PCI-DSS - cards, ATMs, PoS
COBIT - IT governance framework
ISO/IEC 27001 - standards for secure IS
FISMA - US legislation to protect government information
19
Q

What’s HIPAA for?

20
Q

What’s SOX for?

A

Corporate disclosure

21
Q

What’s PCI-DSS for?

A

Cards, ATMs, PoS

22
Q

What’s COBIT?

A

IT governance framework created by ISACA and ITGI

23
Q

What’s ISO/IEC 27001?

A

International standards for secure IS

24
Q

What’s FISMA?

A

US legislation to protect government information

25
Name the standards that govern medical systems.
HIPAA
26
Name the standards that govern corporate disclosure.
SOX
27
Name the standards that govern cards, ATMs, point of sale.
PCI-DSS
28
Name the IT governance framework created by ISACA and ITGI.
COBIT
29
Name the international standards for secure IS.
ISO/IEC 27001
30
Name the US legislation to protect government information.
FISMA
31
Name the four attack types.
OS attacks, Application attacks, Shrink-wrap code, Misconfiguration.
32
What's an OS attack?
Default settings, default passwords, admin panels
33
What's an application attack?
Programming code, software logic
34
What's shrinkwrap code?
Build-in code and scripts (eg jQuery)
35
What's misconfiguration?
Easier for users = less secure
36
Name the 3 phases of the pen-test.
Preparation (scope, ROE), assessment, reporting
37
What's GBLA?
The Gramm-Leach-Bliley Act (GLBA) requires financial institutions to take steps to protect customer information. It also forces them to provide their privacy practices to the public.