UAB Information Security IS 413 DI Gangi

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/104

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

105 Terms

1
New cards

Early Computing Threats

The primary security threats were physical theft of equipment, espionage against system products, and sabotage.

2
New cards

Role of System Administrator

Individuals primarily responsible for administering the systems that house the organization's information.

3
New cards

ARPA 'Protection Analysis: Final Report' Focus

A study undertaken by ARPA to understand and detect vulnerabilities in operating systems security.

4
New cards

InfoSec Professional Role

Focuses on protecting the organization's information systems and stored information from attacks.

5
New cards

RAND Report R-609 Significance

The first widely recognized document to identify the role of management and policy issues in computer security.

6
New cards

Hardware System Definition (False Statement)

This statement is false; the concept described (entire set of people, procedures, and technology) is typically an information system, not merely a hardware system.

7
New cards

Organizational Asset

An organizational resource being protected, which can be logical (like a Web site or data) or physical (like hardware or a person).

8
New cards

ARPANET

A network project that preceded the Internet.

9
New cards

Information Security (InfoSec)

The protection of the confidentiality, integrity, and availability (CIA) of information assets using policy, education, awareness, and technology.

10
New cards

Possession vs. Confidentiality Breach

A breach of possession may not always result in a breach of confidentiality.

11
New cards

MULTICS

The first operating system to integrate security as one of its core functions.

12
New cards

InfoSec History Start

The history of information security begins with the concept of communications security.

13
New cards

Trojan Horse

Malware programs that hide their true nature, revealing their designed behavior only when activated.

14
New cards

Brownout

A short-term interruption in electrical power availability.

15
New cards

Distributed Denial-of-Service (DDoS)

An attack where a coordinated stream of requests is launched against a target from many locations simultaneously.

16
New cards

Preventing Human Error

Human error or failure can often be prevented using training, ongoing awareness activities, and controls.

17
New cards

Cyberterrorism

Premeditated, politically motivated attacks against information, computer systems, programs, and data that result in violence against noncombatant targets.

18
New cards

Mean Time Between Failure (MTBF)

The average amount of time until the next hardware failure.

19
New cards

Sniffer Program Function

A program that can reveal data transmitted on a network segment, including passwords, files, and sensitive data.

20
New cards

InfoSec Function Purpose

The information security function is responsible for safeguarding an organization's technology assets.

21
New cards

Pharming

The redirection of legitimate user Web traffic to illegitimate Web sites to collect personal information.

22
New cards

Primary Mission of InfoSec

This is false. InfoSec protects confidentiality, integrity, and availability (CIA); it is not focused on confidentiality at any cost.

23
New cards

Cyberterrorists

Individuals who hack systems to conduct terrorist activities using network or Internet pathways.

24
New cards

Separation of Duties

A cornerstone in protecting information assets and preventing financial loss.

25
New cards

Security Manager vs. CISO Scope

This is false. The CISO (Chief Information Security Officer) usually holds the higher-level, more general/strategic role.

26
New cards

Security Manager Role

Accomplish objectives identified by the CISO and resolve issues identified by technicians.

27
New cards

InfoSec Technical Professionals

Technical professionals often entering InfoSec include database administrators, programmers, and networking experts or systems administrators.

28
New cards

InfoSec Function Placement

This is false. The information security function can be structured as a peer of physical security or protective services within the organization.

29
New cards

SSCP Certification Focus

More applicable to the security technician than to the security manager.

30
New cards

Security Administrator Role

Provides day-to-day systems monitoring to support an organization's goals and objectives.

31
New cards

ISSEP Concentration Exclusions

ISSEP demonstrates expert knowledge in areas except technical management.

32
New cards

(ISC)2 Certification Concentrations

(ISC)2 has added concentrations to demonstrate advanced knowledge beyond the basic certification's common body of knowledge.

33
New cards

Contractors (Workforce Supplement)

Hired by the organization for a temporary position or to supplement the existing workforce.

34
New cards

Preferred InfoSec Candidate

Organizations typically seek a technically qualified information security specialist who understands organizational operations.

35
New cards

Standardized Job Descriptions Benefit

They can increase the degree of professionalism in the information security field.

36
New cards

Upper Management InfoSec Knowledge

Upper management should learn about the budgetary needs of the InfoSec function and its positions.

37
New cards

Incident Requiring Law Enforcement

This is false. An attack or breach does not always constitute a violation of law requiring law enforcement notification.

38
New cards

Hot Site

A fully configured computer facility that can establish operations at a moment's notice.

39
New cards

BIA vs. Risk Management (Assumption)

The Business Impact Analysis (BIA) assumes that controls have been bypassed, proven ineffective, or failed.

40
New cards

Damage Assessment

The rapid determination of the scope of the breach in confidentiality, integrity, and availability of assets during or just following an incident.

41
New cards

Alert Message

A description of an incident or disaster containing minimal information needed for personnel to implement their portion of the IR or DR plan quickly.

42
New cards

Disaster Classification

The process of examining an adverse event or incident and determining whether it constitutes an actual disaster.

43
New cards

Business Impact Analysis (BIA)

A preparatory activity common to both Contingency Planning (CP) and risk management.

44
New cards

Total Recovery Time vs. MTD

This is false. The total time needed to place the business function back in service should be less than the maximum tolerable downtime (MTD).

45
New cards

Recovery Point Objective (RPO)

The point in time prior to a disruption or outage to which business process data can be recovered after an outage.

46
New cards

Digital Malfeasance

A crime involving digital media, computer technology, or related components.

47
New cards

Risk Acceptance Strategy

The choice to do nothing to protect a vulnerability and accept the outcome of its exploitation.

48
New cards

Identifying Non-Tangible Assets

This is false. Identifying human resources, documentation, and data assets is typically more challenging than identifying hardware and software assets.

49
New cards

Risk Mitigation

The application of security mechanisms to reduce the risks to an organization's data and information systems.

50
New cards

Weighted Table Analysis

A method where assets or threats are prioritized by assigning scores to criteria of differing importance, summing, and ranking the results.

51
New cards

Exposure Factor (EF)

The expected percentage of loss that would occur from a particular attack.

52
New cards

Asset Importance Determination

Refer to the organization's mission statement or objectives to classify assets as essential, supportive, or adjunct.

53
New cards

Information Asset Categories (Exclusion)

Firmware is not typically listed as one of the recommended high-level categories for classifying information assets.

54
New cards

Firmware

Not typically listed as one of the recommended high-level categories for classifying information assets.

55
New cards

Likelihood (Risk)

The probability that a specific vulnerability within an organization will be the target of an attack.

56
New cards

First Phase of Risk Management

The initial phase of the process is risk identification.

57
New cards

Information Value Assessment

Some experts argue that determining the true value of information and information-bearing assets is virtually impossible.

58
New cards

Access Control

The method systems use to determine whether and how to admit a user into a trusted area (system or physical location).

59
New cards

Dynamic Filtering Firewall

A firewall that can react to an emergent event and update or create rules to handle the situation.

60
New cards

Lattice-based Access Control

A form of nondiscretionary access control where users are assigned a matrix of authorizations for particular areas of access.

61
New cards

VPN Tunnel Mode Benefit

The key benefit is that an intercepted packet reveals nothing about the true destination system.

62
New cards

ICMP (Ping Service)

A common method for hacker reconnaissance that should be turned off to prevent snooping.

63
New cards

DMZ Configuration

The DMZ can be configured as a dedicated port on the firewall device linking a single bastion host.

64
New cards

False Reject Rate (FRR)

The number of legitimate users who are denied access due to a failure in the biometric device.

65
New cards

Kerberos Resilience to DoS

Even when Kerberos servers face DoS attacks, a client can typically still request additional services.

66
New cards

Destructive Vulnerability Attacks

A class of attacks featured in some vulnerability scanners that are so dangerous they should only be used in a lab environment.

67
New cards

HIDPS (Host-based IDPS) Function

An HIDPS is focused on a single host and is not optimized to detect multihost scanning or non-host network devices.

68
New cards

IDPS Effectiveness Against New Attacks

IDPS generally cannot deal effectively with newly published attacks or variants of existing attacks.

69
New cards

Honeynet

A collection of honeypots connected together on a subnet.

70
New cards

Unused TCP/IP Port

Port 0 is not used in TCP/IP networking.

71
New cards

Intrusion Detection

Procedures and systems that identify system intrusions and take steps to limit the intrusion and return operations to a normal state.

72
New cards

Passive Scanner Advantage

They can find client-side vulnerabilities that are usually missed by active scanners.

73
New cards

HTTP Default Port

Port 80 is commonly used for the HTTP protocol.

74
New cards

IDPS (Burglar Alarm Analogy)

Works like a burglar alarm; it detects a violation (system activities) and activates an alarm.

75
New cards

Honeypots

Decoy systems designed to lure potential attackers away from critical systems.

76
New cards

HIDPS (Host-based IDPS) Monitoring

Benchmark and monitor the status of key system files to detect when an intruder creates, modifies, or deletes monitored files.

77
New cards

Nonrepudiation

The ability to hold customers or partners accountable for transactions which they cannot later deny.

78
New cards

Encryption

The process of converting an original message into a form that is unreadable to unauthorized individuals.

79
New cards

Hash Algorithms

Mathematical functions that create a message digest by converting variable-length messages into a single fixed-length value.

80
New cards

Symmetric Key Encryption

Methodologies requiring the same secret key to encipher and decipher are using symmetric (or private-key) encryption.

81
New cards

Encapsulating Security Payload (ESP)

Provides secrecy for network communication contents, plus system-to-system authentication and data integrity verification.

82
New cards

IPSec (Internet Protocol Security)

Designed to protect data integrity, user confidentiality, and authenticity at the IP packet level.

83
New cards

3DES (Triple DES)

The current federal information processing standard cryptographic algorithm used by the U.S. government (non-defense) to protect information.

84
New cards

Certificate Revocation List (CRL)

Periodically distributed by the CA in PKI to all users, identifying all revoked certificates.

85
New cards

S/MIME

Builds on the MIME protocol encoding format and uses digital signatures based on public-key cryptosystems to secure e-mail.

86
New cards

Work Breakdown Structure (WBS)

A simple project management tool used to break the project plan into smaller steps.

87
New cards

Logical Design Phase (SDLC)

The phase of SDLC that is implementation independent, meaning it has no reference to specific technologies, vendors, or products.

88
New cards

Longest/Most Expensive SDLC Phase

The maintenance and change phase is typically considered the longest and most expensive phase of the systems development life cycle.

89
New cards

Direct Changeover Drawback

The primary disadvantage is that if the new system fails, users may be without services during modification/fixing.

90
New cards

Project Planning Effort Estimation

Planners must estimate the effort required to complete every task, subtask, or action step.

91
New cards

Personnel Constraints

The necessity of having qualified, trained, and available personnel serves as a constraint on the project plan.

92
New cards

Pilot Implementation

Implementation where the entire security system is placed in a single, small organizational segment before enterprise-wide expansion.

93
New cards

Correcting Flawed Estimates

If the number of effort-hours is underestimated, the plan must be corrected, and downstream tasks must be updated.

94
New cards

Technology Governance

Guides technical system update frequency, update approval/funding, and communication about technical advances/issues across the organization.

95
New cards

Successors (Project Tasks)

Tasks or action steps that come after the task currently being addressed.

96
New cards

SecOps

An emerging methodology integrating development and operations teams to improve application functionality and security.

97
New cards

Implementation Planning Requirement

The creation of a detailed project plan is required when planning the implementation phase of a security project.

98
New cards

Policy Obsolescence

Policies and procedures can become inadequate due to changes in mission, operational requirements, threats, or the environment.

99
New cards

Vulnerability Assessment (VA)

The process of identifying and documenting specific and provable flaws in the organization's information asset environment.

100
New cards

Vulnerability Analyst Tasks (Screening)

The analyst classifies the test level, validates the vulnerability's existence, and documents the results when screening test results.