Week 11 Flashcards
(27 cards)
What are the 4 categories of preventive controls?
People (training/culture), Process (authentication/change management), IT Solutions (antimalware/encryption), Physical Security (access restrictions).
How does change management improve security?
Formal process requiring documentation, approval, testing, and backout plans to prevent system reliability reduction during updates.
Differentiate authentication and authorization.
Authentication verifies identity (e.g., password/biometric). Authorization determines access rights post-verification.
What are the 3 factors of authentication?
1) Knowledge (password), 2) Possession (ID card), 3) Biometrics (fingerprint). Multi-factor combines ≥2.
Compare symmetric and asymmetric encryption.
Symmetric: 1 shared key (fast, insecure exchange). Asymmetric: Public/private key pair (secure, enables digital signatures).
Why can’t encryption protect data during processing?
Data must be decrypted for processing → Requires supplementary controls (access restrictions/training).
How does confidentiality differ from privacy?
Confidentiality: Organizational data (trade secrets). Privacy: Personal data (customers/employees).
What is opt-in vs. opt-out in privacy?
Opt-in: Explicit consent required. Opt-out: Data collected unless user objects (less protective).
What are key GAPP principles?
1) Notice (disclose policies pre-collection), 2) Choice/consent, 3) Data minimization, 4) Limited retention, 5) Security safeguards.
Name 3 detective controls.
Log analysis, IDS (intrusion detection), Continuous monitoring (policy compliance).
What does CIRT do?
Computer Incident Response Team – coordinates attack response (containment/recovery).
Key security risks in cloud computing?
Outsourced data control (third-party reliability), unsupervised physical access to virtual networks.
How to secure IoT devices?
Treat as network entry points → Apply encryption/access controls (default passwords = critical vulnerability).
What is a turnaround document? Example?
Self-validating form (e.g., payment slip with pre-printed account number). Prevents input errors.
Incremental vs. differential backup?
Incremental: Changes since last any backup. Differential: Changes since last full backup.
How does closed-loop verification work?
Input retrieves related data (e.g., entering account # displays customer name) to validate accuracy.
Define check digit verification.
Mathematical formula appends digit to data (e.g., credit card #). Recalculation detects entry errors.
Cold site vs. hot site for DRP?
Cold: Basic infrastructure (days to activate). Hot: Fully operational (immediate failover).
How do digital signatures ensure non-repudiation?
Steps: 1) Hash document, 2) Encrypt hash with private key. Receiver verifies with sender’s public key → Legally binding.
What does “defense in depth” mean?
Layered security (e.g., encryption + access controls + training) to compensate for single-control weaknesses.
Detective vs. Corrective controls?
Detective: Identify breaches (log analysis). Corrective: Mitigate impact (backups/DRP).
Purpose of parity bits in data transmission?
Error detection by verifying binary digit consistency.
Why are raised floors in data centers?
Hide cables/cooling systems → Reduce trip hazards/fire risks.
VPN
Virtual Private Network – encrypted tunnel for secure internet data transfer.