Summary Q & A Flashcards
What are the properties of a secure information processing system?
[Security Concepts]
Confidentiality, Integrity, and Availability (and non-repudiation)
What term is used to describe the property of a secure network where a sender cannot deny having sent a message?
[Security Concepts]
Non-repudiation
A company provides a statement of deviations from framework best practices to a regulator.
What process has the company performed?
[Security Concepts]
Gap Analysis
What process within an access control framework logs actions performed by subjects?
[Security Concepts]
Accounting
What is the difference between authorization and authentication?
[Security Concepts]
Authorization means granting the account for the user access to the system/resource. It manages the privileges granted on the resource. (Are you authorized to do this)
Authentication is validating that the user is who they say they are. (Are you authentically you)
How does accounting provide non-repudiation?
[Security Concepts]
A user’s actions are logged on the system. Each user is associated with a unique computer account. As long as the logs were not tampered they cannot deny doing the action logged.
You have implemented a secure web gateway that blocks access to a social networking site.
How would you categorize this type of security control?
[Security Controls]
Technical control
It is implemented in software and acts as a preventive measure.
A company has installed motion-activated floodlighting on the grounds around its premises.
What class and function is this security control?
[Security Controls]
Physical control
Its function is both Detecting and Deterring
A firewall appliance intercepts a packet that violates policy. It automatically updates its access control list to block all further packets from the source IP. What TWO functions did the security control perform?
[Security Controls]
Preventive and Corrective
If a security control is described as operational and compensating, what can you determine about its nature and function?
[Security Controls]
The control is being done by a person, and replicates a primary function (is a second catch incase the first one fails), as required by a security standard
A multinational company manages a large amount of valuable intellectual property (IP) data, plus personal data for its customers and account holders. What type of business unit can be used to manage such important and complex security requirements?
[Security Controls]
A Security Operations Center (SOC)
A business is expanding rapidly, and the owner is worried about tensions between its established IT and programming divisions. What type of security business unit or function could help to resolve these issues?
[Security Controls]
DevOps or DevSecOps
Development and operations (DevOps) is a cultural shift within an organization to encourage more collaboration between developers and systems administrators.
DevSecOps embeds the security function within these teams as well.
Which of the following would be assessed by likelihood and impact: vulnerability, threat, or risk?
[Threat Actors]
Risk
True or false? Nation-state actors only pose a risk to other states.
[Threat Actors]
False.
Nation-state actors have targeted commercial interests for theft, espionage, and extortion.
You receive an email with a screenshot showing a command prompt at one of your application servers. The email suggests you engage the hacker for a day’s consultancy to patch the vulnerability. How should you categorize this threat?
[Threat Actors]
If the consultancy is refused and the hacker takes no further action, it can be classed as for financial gain only. If the offer is declined and the hacker then threatens to sell the exploit or to publicize the vulnerability, then the motivation is criminal.
Which type of threat actor is primarily motivated by the desire for political change?
[Threat Actors]
Hacktivist
Which three types of threat actor are most likely to have high levels of funding?
[Threat Actors]
State actors,
Organized Crime,
Competitors
A company uses stock photos from a site distributing copyright-free media to illustrate its websites and internal presentations. Subsequently, one of the company’s computers is found infected with malware that was downloaded by code embedded in the headers of a photo file obtained from the site. What threat vector(s) does this attack use?
[Threat Actors]
The transmission vector is image based.
Since the company is using an external site this a supply chain vulnerability.
A company’s systems are disrupted by a ransomware attack launched via a vulnerability in a network monitoring tool used by the company’s outsourced IT management. Aside from a software vulnerability, what part of the company’s attack surface has been used as a threat vector?
[Threat Actors]
This is a supply chain vulnerability, specifically arising from the company’s Managed Service Provider (MSP).
A company uses cell phones to provide IT support to its remote employees, but it does not maintain an authoritative directory of contact numbers for support staff. Risks from which specific threat vector are substantially increased by this oversight?
[Threat Actors]
Voice calls
The risk that threat actors could impersonate IT support personnel to trick employees into revealing confidential information or installing malware.
The help desk takes a call, and the caller states that she cannot connect to the e-commerce website to check her order status. She would also like a username and password. The user gives a valid customer company name but is not listed as a contact in the customer database. The user does not know the correct company code or customer ID. Is this likely to be a social engineering attempt, or is it a false alarm?
[Social Engineering]
This is likely to be a social engineering attempt.
The help desk should not give out any information or add an account without confirming the caller’s identity.
A purchasing manager is browsing a list of products on a vendor’s website when a window opens claiming that antimalware software has detected several thousand files on their computer that are infected with viruses. Instructions in the official-looking window indicate the user should click a link to install software that will remove these infections. What type of social engineering attempt is this, or is it a false alarm?
[Social Engineering]
This is a social engineering attempt utilizing a Watering Hole Attack and Brand Impersonation.
Your CEO calls to request market research data immediately be forwarded to their personal email address. You recognize their voice, but a proper request form has not been filled out and use of third-party email is prohibited. They state that normally they would fill out the form and should not be an exception, but they urgently need the data to prepare for a roundtable at a conference they are attending. What type of social engineering techniques could this use, or is it a false alarm?
[Social Engineering]
If social engineering, this is a CEO fraud phishing attack over a voice channel (vishing). It is possible that it uses deep fake technology for voice mimicry. The use of a sophisticated attack for a relatively low-value data asset seems unlikely, however. A fairly safe approach would be to contact the CEO back on a known mobile number.
A company policy states that any wire transfer above a certain value must be authorized by two employees, who must separately perform due diligence to verify invoice details. What specific type of social engineering is this policy designed to mitigate?
[Social Engineering]
Business Email Compromise