Test 2

studied byStudied by 53 people
5.0(1)
Get a hint
Hint

Chapter 4

1 / 113

flashcard set

Earn XP

Description and Tags

Chapters 4, 8, 11

114 Terms

1

Chapter 4

Business Drivers of Information Security

New cards
2

threat analysis

involves identifying and documenting threats to critical resources, which means considering the types of disasters that are possible and what kind of damage they can cause

New cards
3

acceptable use policy (AUP)

employees must abide by all organizational policies and procedures, in particular the organizations AUP.

New cards
4

Risk Management’s importance to the organization

Identifying, assessing, prioritizing and addressing risks is a core business necessary to ensure any organization’s longevity

New cards
5

Risk =

Threat * Vulnerability

New cards
6

An exploited vulnerability results in an

Impact

New cards
7

Risk methodology

a description of how you will manage risk

New cards
8

Risk Register

A list of identified risks

New cards
9

Business impact analysis

an analysis of an organization’s functions and activities that classifies them as critical or noncritical

  • identifies the impact to the business if one or more IT function fails

    • Identifies the priority of different critical systems

New cards
10

Recovery point objective (RPO)

The target state of recovered data that allows an organization to continue normal processing; the maximum amount of data loss that is acceptable

New cards
11

Recovery time objective (RTO)

the maximum allowable time in which to recover the function

New cards
12

Business recovery requirements

identify any other business functions that must already be in place for the specified recovery function to occur and help in determining the recovery sequence

New cards
13

Technical recovery requirements

Define the technical prerequisites that are needed to support each critical business function

New cards
14

Business continuity plan (BCP)

a written plan for a structured response to any events that result in an interruption to critical business activities or functions

New cards
15

What are the Order of Priorities?

Safety and well-being of people

Continuity of critical business functions and operations

Continuity of components within the seven domains of an IT infrastructure

New cards
16

What are some elements of a BCP?

Statement defining the policy, standards, procedures, and guidelines for deployment

Project team members with defined roles, responsibilities, and accountabilities

New cards
17

Disaster Recovery Plan

Directs the actions necessary to recover resources after a disaster

Extends and supports the BCP by identifying events that could cause damage to resources that are necessary to support critical business functions

New cards
18

Hot site

has envrionmental utilities, hardware, software, and data like original data center

New cards
19

Warm Site

Has environmental utilities and basic computer hardware

New cards
20

Cold Site

Has basic environmental Utilities but no infrastructure components

New cards
21

Mobile Site

Trailer with necessary environmental utilities that can operate as warm or cold site

New cards
22

Security Gap

difference between the security controls in place and controls you need to address vulnerabilities

New cards
23

Gap Analysis

Comparison of the security controls in place and the controls you need to address all identified threats

New cards
24

FERPA

New cards
25

FFIEC

New cards
26

COPPA

New cards
27

GLBA

New cards
28

Security Reform Act

New cards
29

USA Patriot Act of 2001

New cards
30

FISMA

New cards
31

SOX

New cards
32

HIPPA

New cards
33

SB 1386

New cards
34

FISMA

New cards
35

GDPR

New cards
36

PCI DSS

New cards
37

CCPA

New cards
38

Examples of Authentication Controls

Passwords and PINS

Smart Cards and tokens

Biometric devices

Digital Certificates

Challenge-response handshakes

Kerberos authentication

One-time passwords

New cards
39

Examples of Authorization Controls

Authentication server rules and permissions

Access Control lists

Intrusion detection and prevention

Physical access control

connection and access policy filters

Network traffic filters

New cards
40

Mobility

Allows remote workers and employees to be connected to the IT infrastructure in almost real time

New cards
41

Bring Your Own Device (BYOD)

Employees using their personally owned devices for business and personal use

New cards
42

BYOD Concerns

Data ownership

Support Ownership

Patch Management

Antivirus Management Forensics

Privacy

Acceptable use policy

Onboard camera/video

New cards
43

Endpoint and Device Security

Full Device Encryption

Remote Wiping

Lockout

Screen Locks

Global Positioning systems

Application control

Storage Segmentation

New cards
44

Chapter 8

Malicious Software and Attack Vectors

New cards
45

active content

refers to the components, primarily on websites, that provide functionality to interact with users

New cards
46

Cookies

information that a website puts on a users computer.

New cards
47

Malicious software (malware)

any program that contains instructions that run on a computer system and perform operations that the user does not intend

New cards
48

Malicious code attacks all three information security properties

Confidentiality : malware can disclose your organizations private information

Integrity: Malware can modify database records, either immediately or over a period of time

Availability: Malware can erase or overwrite files or inflict considerable damage to storage media

New cards
49

System infectors

Target computer hardware and software startup functions

New cards
50

File infectors

attack and modify executable programs

New cards
51

Data infectors

attack document files containing embedded macro programming capabilities

New cards
52

Typical life cycle of a computer virus

The virus waits until the user transmits the infected object to another computer

The user transmits an infected object to another computer

The virus locates and infects suitable objects on the new computer

New cards
53

How does a macro virus work ?

infected document attachment arrives in email message

  • macro virus

Global Macro Pool infected in application (normal.dot)

Infection spreads to other documents in the internal document folder

New cards
54

Rootkits

Malware that modifies or replaces one or more existing programs to hide the fact that computer has been compromised

New cards
55

Ransonware

attempts to generate funds directly from a computer user

attacks a computer and limits the users ability to access the computers data

New cards
56

Spam

Consumes computing resources bandwidth and central processing unit time

Diverts IT Personnel from activities more critical to network security

New cards
57

Worms

self-contained programs designed to propagate from one host machine to another using the host’s own network communication protocols

New cards
58

Trojan horses

largest class of malware

Programs that masquerade as useful programs while hiding malicious intent

Rely on social engineering to spread and operate

New cards
59

Logic Bombs

Programs that execute a malicious function of some kind when they detect certain conditions

once in place, wait for a specified condition or time, which, when it occurs, causes logic bomb to activate and carry out its taks

New cards
60

Active Content Vulnerabilities

Refers to dynamic objects that do something when the user opens a webpage

Examples of technologies used to create active content: ActiveX, Cascading Style Sheet (CSS), React, Java, Javascript, VBScript

New cards
61

Malicious Add-On (Browser)

add-ons are companion programs that extend the web browser; can decrease security

  • contain some type of malware; once installed, perform malicious actions

New cards
62

Injection

Cross-site (XSS)

SQL injection

Lightweight Directory Access Protocol injection

Command Injection

Extensible Markup Language (XML) injection

New cards
63

Botnets

Robotically controlled networks

Attackers infect vulnerable machines with agents that perform various functions at the command of the bot-herder or controller

New cards
64

DoS Attacks

Overwhelm a server or network segment to the point that the server or network becomes unusable

Crash a server or network device or create so much network congestion that authorized users cannot access network resources

New cards
65

SYN flood attacks

attacker users Internet Protocol spoofing to send a larger number of packets requesting connections to the victim computer

New cards
66

Smurf attack

attackers forge internet control message protocol echo request packets to IP broadcast addresses from remote locations to generate DoS attacks

New cards
67

Spyware

Any unsolicited background process that installs itself on a user’s computer and collects information about he user’s browsing habits and website activities

New cards
68

Adware

Triggers nuisances as popup ads and banners when user visits certain websites

affects productivity and may combine with active background activities

New cards
69

Phishing

Tricks users into providing logon information on what appears to be a legitimate website but is actually a website set up by an attacker to obtain this information

New cards
70

Keystroke Loggers

Capture Keystrokes or user entries and forwards information to attacker

  • enable the attacker to capture logon information, banking information, and other sensitive data

New cards
71

Guidelines for Recognizing Hoaxes

Did a legitimate entity send the alert ?

Is there a request to forward the alert to others ?

Are there detailed explanations or technical terminology in the alert?

Does the alert follow the generic format of a chain letter ?

New cards
72

Webpage Defacements

Someone gaining unauthorized access to a web server and altering the index page of a site on the server

the attacker replaces the original pages on the site with altered versions

New cards
73

Threats to a business organizations

Attacks against confidentiality and privacy

attacks against data integrity

attacks against availability of services and resources

attacks against productivity and performance

attacks that create legal liability

attacks that damage reputation

New cards
74

What motivates attackers ?

Money

Fame

Political beliefs or systems

Anger or revenge

Cyberwarfare or espionage

New cards
75

The purpose of an attack

Denial of availability

Data Modification

Data export (exfiltration)

Launch point

New cards
76

What are the 4 types of attacks ?

unstructured attacks

structured attacks

direct attacks

Indirect attacks

New cards
77

What are the phases of an attack ?

Reconnaissance and Probing

Gaining access

Maintaining Access

Covering Your Tracks

New cards
78

Reconnaissance and Probing

Attacker collects all information to conduct the attack

Domain Name System and ICMP tools within the Transmission Control

New cards
79

Access and Privilege Escalation

Establish the initial connection to a target host (typically a server platform)

Gain administrative rights to the system

New cards
80

Covering Traces of the Attack

Remove any traces of the attack

  • Remove files created and restore as many files to their preattack condition as possible

New cards
81

Attack Prevention Tools and Techniques

Defense in Depth

  • practice of layering into zones to increase the overall protection level and provide more reaction time to respond to incidents

Goal of defense in depth

  • should be layers of security and detection, even on single systems.

  • attackers must break through or bypass each layer undetected

    • other layers can cover a flaw in one layer

Application Defenses

Operating system defenses

Network infrastructure defenses

New cards
82

Application Defenses

Implementing regular antivirus screening on all host systems

Ensuring that virus definition files are up to date

Requiring scanning all of removable media

Installing firewall and intrusion detection software on hosts

Deploying change-detection software and integrity-checking software and maintaining logs

New cards
83

Operating system defenses

Deploying change-detection and integrity-checking software and maintaining logs

Deploying or enabling change-detection and integrity-checking software on all servers

Ensuring that all operating systems are consistent and have been patched with the latest updates

New cards
84

Network Infrastructure Defenses

Creating chokepoints in the network

Using proxy services and bastion hosts to protect critical services

using content filtering at chokepoints to screen traffic

Ensuring that only trusted sources are used when installing and upgrading operating system code

Disabling any unnecessary network services and processes that may pose a security vulnerability

New cards
85

Incident Detection Tools and Techniques

Antivirus scanning software

Network monitors and analyzers

Content/context filtering and logging software

Honeypots and honeynets

New cards
86

Safe Recovery Techniques and Practices

Store OS and data file backup images on external media to ease recovering from potential malware infection

New cards
87

Chapter 11

Chapter 11 Contingency Planning

New cards
88

Business continuity Plan

Contains the actions needed to keep critical business processes running after a disruption

New cards
89

Disaster recovery plan (DRP)

Details the steps to recover from a disruption and restore the infrastructure

necessary for normal business operations

New cards
90

Disruption

a sudden unplanned event

Upsets an organizations ability to provide critical business functions and causes great damage or loss

Major Disruptions include extreme weather, criminal activity, civil unrest/terrorist acts, operational and applications failure disruptions, and pandemics

New cards
91

Emerging threats

new technology

changes in the culture of the organization or environment

Unauthorized use of technology

Changes in regulations and laws

Reliability of cloud or virtualization services

Cloyd service provider (CSP) lock-in

New cards
92

Static Environment

Supervisory Control and data acquisition

Embedded systems

Mobile devices

Mainframes

Gaming consoles

IoT devices

Vehicle systems

New cards
93

Critical Business function

A business function that, if it fails, causes normal operations to cease

New cards
94

Business impact analysis (BIA)

An analysis of CBFs to determine what kinds of event could interrupt normal operation

New cards
95

Maximum tolerable downtime (MTD)

the most time a business can survive without a specific CBF

New cards
96

Recovery time objective (RTO)

the timeframe for restoring a CBF; must be shorter than or equal to the MTD

New cards
97

Recovery point objective (RPO)

the point to which data must be recovered

defines the amount of tolerable data loss

can come from different regulators

New cards
98

Emergency operations center (EOC)

the place where the recovery team will meet and work during a disruption

New cards
99

maximum tolerable allowance

by business requirements, associated with RTO

New cards
100

Conduct BIA for what reasons ?

Set value of each business unit or resource as it relates to how the entire organization operates

Identify critical needs to develop a business recovery plan

set order or priority for restoring the organization’s functions after a disruption

New cards

Explore top notes

note Note
studied byStudied by 37 people
... ago
4.0(2)
note Note
studied byStudied by 87 people
... ago
4.5(2)
note Note
studied byStudied by 4 people
... ago
5.0(1)
note Note
studied byStudied by 34 people
... ago
5.0(2)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 178 people
... ago
5.0(4)
note Note
studied byStudied by 5 people
... ago
4.5(2)
note Note
studied byStudied by 13202 people
... ago
4.8(48)

Explore top flashcards

flashcards Flashcard (84)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 14 people
... ago
5.0(2)
flashcards Flashcard (69)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 2 people
... ago
4.0(1)
flashcards Flashcard (20)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (110)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (98)
studied byStudied by 13 people
... ago
5.0(2)
flashcards Flashcard (35)
studied byStudied by 7 people
... ago
5.0(1)
robot