Chapter 11 - Controls: Information Security Flashcards

(38 cards)

1
Q

for imformation to be useful, it must be

A

reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

in order to provide useful information, it must be reliable, what are the 3 criteria to be classified as reliable

A
  1. Information is an accurate, complete, and timely picture of the companies activities
  2. Information must be available when needed
  3. Information and the system that generates it must bc safeguarded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 principles system reliability is based on
(trust services framework)

A
  1. security
  2. Confidentiality
  3. Privacy
  4. Processing Integrity
  5. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(which of the 5 principles system reliability is based on is this)
access to the system and its data is controlled

A

Security
(most important part)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(which of the 5 principles system reliability is based on is this)
sensitive company information is protected from unauthorized disclosure

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(which of the 5 principles system reliability is based on is this)
confidential information about third parties collected, used, and stored in an appropriate manner and is protected from unauthorized disclosure

A

Privacy
(etc: customers, employees)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(which of the 5 principles system reliability is based on is this)
data is processed accurately, timely, and based on proper authorization

A

Processing Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

collected, used, and stored in an appropriate manner and is protected from unauthorized disclosure
system is available when needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

focuses on identifying a collection of preventive, detective, and corrective controls that allows assets to be protected long enough for the company to discover an attack is underway and respond to that attack

A

Time Based Model of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 variables the time based model of security

A
  1. P (time it takes an attacker to break through preventive controls
  2. D (time it takes the company to realize an attack is underway
  3. R = time it takes the company to respond to and stop the attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

if P > D + R then ?

A

security procedures are effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

employ multiple controls to prevent a single point of failure

A

defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

defense in depth is related to what

A

the 3 variables of the time based model of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(which one would you choose) (P > D =R)
- Control #1: increase P bt 9 minutes & decrease by 3 minutes
- Control #2: decrease D by 14 minutes
- Control #3: increase R by 8 minutes & increase P by 7 minutes

A

Control #2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

whats an advantage with the Time based model of security

A

allows to identify the most cost effective set of controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the 2 disadvantages with the Time based model of security

A
  1. very difficult to assign reasonably accurate values to P,D, and R
  2. I.T. changes would render the values of P, D, and R inadequate very quickly
17
Q

prevent security issues from happening

A

preventive controls

18
Q

process of identifying the identity of the person or device attemption to access system

A

authentication

19
Q

restricts the access to authenticated users to specific portions of the system and identifies actions the user can take

A

authorization

20
Q

how many examples of controls for authentication

21
Q

4 examples of controls of authentication

A
  1. passwords
  2. biometric identifiers (very costly & storage of data has privacy issues)
  3. ID badge/card
  4. multi-factor authentication
22
Q

control for authorization

A

access control matrix

23
Q

how many additional preventive controls for security

24
Q

3 additional preventive controls for security

A
  1. physical access controls
  2. training
  3. encryption
25
(which of the 3 additional preventive controls for security is this) man traps
physical access control
26
specifically designed rooms that serve as entry way to data center
man traps
27
(which of the 3 additional preventive controls for security is this) process of turning normal text, called plain text, into unreadable gibberish
encryption
28
unreadable gibberish
cypiertext
29
turns cypiertext back into plain text
decryption
30
in order to decrypt the data what 2 things do you need
1. a key 2. an algorithm
31
designed to discover security breaches quickly
detective controls
32
reveiwing the logs and looking for things that appear abnormal
log analysis
33
tracks users that attempted to access the system and the actions they attempted to perform
log
34
designed to respond a security issues
corrective controls
35
how many corrective control
2
36
2 types of corrective controls
1. establishing a computer incident response team to respond to major security issues 2. patch management
37
applying patches to known vulnerabilities in software
patch management
38
correction to coding
patch