Security, Confidentiality, and Privacy Flashcards

1
Q

General Data Protection Regulation (GDPR) 7 principles - global law

A
  1. Lawfulness, fairness & transparency
  2. Purpose limitation
  3. Data minimization
  4. Accuracy
  5. Storage limitation
  6. Integrity & confidentiality
  7. Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

COBIT governance system objective =

A

ensure alignment of IT with business goals & objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIPAA (security standard) 2 Safeguards

A
  1. Administrative Safeguards
    a. conducting regular risk assessments and audits
  2. Technical/Physical Safeguards
    a. encrypting PHI in transit & at rest
    b. installing firewalls & antivirus software
    c. locking cabinets & doors that contain PHI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control Mechanism:

A

Hardware/software features, operating/management procedures, and various combinations of these designed to prevent and detect unauthorized access and to permit authorized access in an automated system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

National Institute of Standards and Technology (NIST) Privacy Framework:

A

designed to help organizations achieve their specific cybersecurity goals and objectives to achieve key business outcomes

  1. Core: set of privacy activates and outcomes
  2. Profiles: selection of specific functions, categories & subcategories from the Core that reflect an organizations privacy goals & needs
  3. Implementation Tiers: tool for evaluating an organizations privacy risk management practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Payment Card Industry Data Security Standard (PCI DSS):

A

optimize the security of credit, debit and cash card transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIST Privacy Framework single privacy objective =

A

Personally identifiable information must be collected, used, retained, and disclosed in compliance with the commitments in the entity’s privacy notice and with criteria set out in the NIST Privacy Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIA triad

A
  1. Availability
  2. Confidentiality
  3. Reliability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Privacy by default:

A

building privacy safeguards at the outset (limit data collection or refer to privacy as the default setting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PCI DSS v4.0 Goals (6) and Core Requirements (12)

A

a. Build and Maintain a Secure Network and Systems
Requirement 1: Install and maintain network security controls.
Requirement 2: Apply secure configurations to all system components.

b. Protect Account Data
Requirement 3: Protect stored account data.
Requirement 4: Protect cardholder data with strong cryptography during transmission over open, public networks

c. Maintain a Vulnerability Management Program
Requirement 5: Protect all systems and networks from malicious software.
Requirement 6: Develop and maintain secure systems and software

d. Implement Strong Access Control Measures
Requirement 7: Restrict access to system components and cardholder data by business need to know.
Requirement 8: Identify users and authenticate access to system components.

e. Regularly Monitor and Test Networks
Requirement 10: Log and monitor all access to system components and cardholder data.
Requirement 11: Test the security of systems and networks regularly.

f. Maintain an Information Security Policy
Requirement 12: Support information security with organizational policies and programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Email spoofing:

A

perpetrator pretends to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Password spoofing:

A

perpetrator tricks user into logging into malicious system to capture username & password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keyloggers:

A

malicious software designed to track every keystroke to obtain user credentials to give to attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social engineering:

A

uses persuasion/deception to gain access to IT systems (impersonation through phone or email, dumpster diving & shoulder surfing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Electronic trashing:

A

accessing residual data after a file has been deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Electronic piggybacking:

A

gaining unauthorized access to a resource via another user’s legitimate credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network analysis attack:

A

perpetrator performs research to build a complete profile of an organizations network infrastructure & architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Masquerading attack:

A

attempt to gain access to computer system or facility by posing as an authorized user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Email bombing:

A

sending identical email message to particular email ID several times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Malware attack:

A

deploying malicious software to compromise systems, steal data or disrupt operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Sniffing attack:

A

eavesdropping on network traffic to intercept and capture data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Phishing attack:

A

tricking users into revealing sensitive info through emails or websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Nonrepudiation:

A

ensure senders of a message cannot deny sending info & that receivers cannot deny receiving it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Web application attack:

A

exploiting vulnerabilities in web applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Distributed denial of service (DDoS) attack:

A

overwhelming a target system with a flood of traffic or requests causing it to become unavailable to legitimate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cybersecurity attacker:

A

specific threat agent actively launching attacks against an organizations systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SQL injection attack:

A

manipulates input fields to inject SQL code into a database query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cross-site scripting (XSS) attack:

A

injects malicious scripts into a web application (comments or input fields)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Logic bomb:

A

uses a computer program to trigger an unauthorized malicious activity at a prespecified event (financial calculation exceeds a specific dollar amount)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Worm:

A

independent computer program that reproduces by copying itself from 1 system to another, do not require human involvement (uses open file shares to infect several workstations quickly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Race condition attack:

A

2 or more processes/threads attempt to access shared resources simultaneously

31
Q

Data diddling attack:

A

perpetrator gains access to a system & makes insignificant, random, or incremental data modification during or before data entry into a system (executed by insiders)

32
Q

Salami attack:

A

theft of small amounts of assets from several sources

33
Q

Attack Lifecyle

A

Reconnaissance: marks the beginning of a cyberattack (collects info about targe system)
Enumeration: process of extracting usernames/machine names/network resources/shares/services from a system
Maintaining access: installing backdoors to maintain control
Covering tracks: attempt to erase or alter log files to remove evidence of their presence

34
Q

Honeypots:

A

computers that security admin place as a trap for intruders

35
Q

Denial-of-service attack:

A

attempt to make network resource unavailable by overloading the server with false requests

36
Q

Lockwords:

A

system generated terminal passwords shared among users

37
Q

Passcodes:

A

combination of password & ID card

38
Q

Local Area Network (LAN): series of microcomputers linked together by cable & sometimes a common storage device

A
  1. Star LAN: remote computers with direct access to a central computer (spokes connected to the hub)
  2. Ring LAN: does not have a common hub, but can have a server (ring with each computer/node connected to only 2 other computers)
39
Q

Wide Area Network (WAN):

A

communications network that connects geographically separated areas (cities or continents)

40
Q

Virtual Private Network (VPN):

A

a combination of public and private resources, uses the internet to provide secure remote access to an organizations network

41
Q

Access Controls (4)

A
  1. Role-based: restricts access according to job roles & responsibilities
  2. Rule-based: restricts access based on specific rules relating to nature of the subject & object
  3. Discretionary: resource owner decides who should access the resource
  4. Single sign-on: technology used to manage access to networks, applications and multiple systems
42
Q

Utility program:

A

used to perform routine tasks that are needed often by many different processing applications

43
Q

Public (Asymmetric) Key Encryption:

A

uses key pairs (public key & mathematically related private key)

Use Public Keys
1. RSA (Rivest–Shamir–Adleman)
2. Elliptic-curve cryptography (ECC): for mobile devices

44
Q

Privacy by default:

A

building privacy safeguards at the outset (data retention & destruction)

45
Q

SSH (Secure Shell):

A

securing remote connections

46
Q

Incident Response Stages

A

a. Preparation: prevent incidents from occurring (creating risk management plan, implementing security controls, educating employees about cybersecurity)
b. Detection & Analysis: collect as much info as possible about the incident
c. Containment, Eradication & Recovery: stopping the attack, removing all traces of malware & restoring normal operations
d. Post-incident Activity: review to learn from incident & improve company’s incident response process

47
Q

Fourth-Generation Languages (routine basis)

A
  1. Report generator
  2. Program generator
  3. Application generator
48
Q

Distributed data processing:

A

network of interdependent computers where functions are centralized, other are decentralized & processing is shared among 2 or more computers

49
Q

Built-on security feature

A

= any feature installed during the postimplementation of a system

50
Q

Data Quality Subdimension (3)

A
  1. Intrinsic: ensures that the range & proportion of data values conform with actual values for accuracy, objectivity & reputation
  2. Contextual: the range and proportion of information that is applicable and relevant to the user’s task and presented in a manner that satisfies users’ data requirements
  3. Security/Accessibility: the range and proportion of information that is available or accessible
51
Q

Metadata:

A

provide a table of contents for the data warehouse info (mapping between the data sources & warehouse)

52
Q

Return-oriented programming (ROP):

A

attacker utilizes existing code sequences (gadgets) in a programs memory to perform malicious actions without injecting new code

53
Q

COSO Framework = risk identification & TSC criteria = risk management

A
54
Q

How does materiality determination differ between SOC 1 & SOC 2?

A

SOC1 use financial criteria & SOC 2 use operational criteria

55
Q

Cryptanalytic attack:

A

intruder tries to break into the algorithm to find out the private key

56
Q

Key management attack:

A

intruder tries to get a copy of the private key & associated passphrase

57
Q

XML (Extensible Markup Language):

A

A settings file format which formats information for use on the Web by identifying the nature of the information (e.g., information coded as a telephone number could be located on a page by a browser and dialed automatically).

58
Q

Machine Language:

A

1st gen language the elemental language of computers, a set of symbolic instruction code consisting of a long sequence of binary digital zeros and ones (bits). Every CPU has its own unique version.

59
Q

Assembly Language:

A

2nd gen language for microprocessors and other programmable devices, with a strong one-to-one correspondence between the language and the architecture’s machine code instructions. Writing programs in this language is time-consuming and prone to error

60
Q

XBRL(eXtensible Business Reporting Language):

A

Required by the SEC for reporting; an electronically readable format. This open-information format standard enables automated sharing of numeric and textual information contained in financial statements (including footnotes) and other business reports.

61
Q

Fourth-generation Language:

A

These languages have many routine procedures preprogrammed; the programmer states what is to be done, but not necessarily how to do it . They are often related to a Database Management System (DBMS) that allow programmers to create database structures and manipulate data quickly and relatively easily.

62
Q

HTML:

A

A language which inserts symbols, or tags, into text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.

63
Q

Object-oriented Language:

A

These third-generation languages use a modular approach, increasing development efficiency and maintenance ease. Routine operations are kept with the data to be processed. The focus is on the object involved in accomplishing that task.

64
Q

Management information system:

A

A computerized database of financial information that is organized, programmed, and constantly updated to produce periodic reports used for operational, tactical, and strategic decision-making within a given organization.

65
Q

Circuit switching:

A

involves a dedicated channel for the duration of the transmission. The sender signals that it will send a message; the receiver acknowledges the signal. The sender then sends the entire message. Voice and data may use the same line with no special data protocols. The two communicating devices must be compatible.

66
Q

Packet switching:

A

divides a message into pieces which may be transmitted separately through different paths, reassembling the pieces of the original message at the destination. Lines are used on demand as opposed to being committed to a single transmission.

67
Q

Dynamic Scaling:

A

allows cloud infrastructure to adapt & allocate resources based on demand

68
Q

Virtualization:

A

act of creating a virtual version of computing environment (hardware/operating system/storage devices)

69
Q

Accounting Information System (AIS) Key Components

A
  1. Financial transactions
  2. Compliance
  3. Data storage
  4. Reporting
70
Q

Consensus mechanism in blockchain:

A

ensures all transactions are validated and agreed upon before added to blockchain

71
Q

AIS Services

A
  1. Transaction processing
  2. Implementing internal controls
  3. Maintaining audit trails
  4. Compiling financial data for F/S
72
Q

Check digit:

A

numeric value to ensure the integrity of the original data during construction or transmission (input control)

73
Q

Hash total:

A

fixed-size string of characters using hash function to ensure data integrity

74
Q

Configuration Management Database (CMDB):

A

database for entity’s hardware and software components & relationships between those components