Week 11 Flashcards

(27 cards)

1
Q

What are the 4 categories of preventive controls?

A

People (training/culture), Process (authentication/change management), IT Solutions (antimalware/encryption), Physical Security (access restrictions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does change management improve security?

A

Formal process requiring documentation, approval, testing, and backout plans to prevent system reliability reduction during updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Differentiate authentication and authorization.

A

Authentication verifies identity (e.g., password/biometric). Authorization determines access rights post-verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 factors of authentication?

A

1) Knowledge (password), 2) Possession (ID card), 3) Biometrics (fingerprint). Multi-factor combines ≥2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compare symmetric and asymmetric encryption.

A

Symmetric: 1 shared key (fast, insecure exchange). Asymmetric: Public/private key pair (secure, enables digital signatures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why can’t encryption protect data during processing?

A

Data must be decrypted for processing → Requires supplementary controls (access restrictions/training).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does confidentiality differ from privacy?

A

Confidentiality: Organizational data (trade secrets). Privacy: Personal data (customers/employees).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is opt-in vs. opt-out in privacy?

A

Opt-in: Explicit consent required. Opt-out: Data collected unless user objects (less protective).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are key GAPP principles?

A

1) Notice (disclose policies pre-collection), 2) Choice/consent, 3) Data minimization, 4) Limited retention, 5) Security safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name 3 detective controls.

A

Log analysis, IDS (intrusion detection), Continuous monitoring (policy compliance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does CIRT do?

A

Computer Incident Response Team – coordinates attack response (containment/recovery).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key security risks in cloud computing?

A

Outsourced data control (third-party reliability), unsupervised physical access to virtual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to secure IoT devices?

A

Treat as network entry points → Apply encryption/access controls (default passwords = critical vulnerability).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a turnaround document? Example?

A

Self-validating form (e.g., payment slip with pre-printed account number). Prevents input errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incremental vs. differential backup?

A

Incremental: Changes since last any backup. Differential: Changes since last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does closed-loop verification work?

A

Input retrieves related data (e.g., entering account # displays customer name) to validate accuracy.

14
Q

Define check digit verification.

A

Mathematical formula appends digit to data (e.g., credit card #). Recalculation detects entry errors.

15
Q

Cold site vs. hot site for DRP?

A

Cold: Basic infrastructure (days to activate). Hot: Fully operational (immediate failover).

16
Q

How do digital signatures ensure non-repudiation?

A

Steps: 1) Hash document, 2) Encrypt hash with private key. Receiver verifies with sender’s public key → Legally binding.

17
Q

What does “defense in depth” mean?

A

Layered security (e.g., encryption + access controls + training) to compensate for single-control weaknesses.

18
Q

Detective vs. Corrective controls?

A

Detective: Identify breaches (log analysis). Corrective: Mitigate impact (backups/DRP).

19
Q

Purpose of parity bits in data transmission?

A

Error detection by verifying binary digit consistency.

20
Q

Why are raised floors in data centers?

A

Hide cables/cooling systems → Reduce trip hazards/fire risks.

21
Q

VPN

A

Virtual Private Network – encrypted tunnel for secure internet data transfer.

22
IDS
Intrusion Detection System – monitors firewall traffic for attack patterns.
23
GAPP
Generally Accepted Privacy Principles – framework for personal data protection.
24
Chief Information Security Officer – oversees security strategy/compliance.