The number of security incidents is growing by about ________ per year.
30%
What are the three main reasons why there has been an increase in computer security over the past few years?
1) Hacking into a computer used to be considered a hobby, whereas it is now a profession.
2) hacktivism has become more common
3) increase in mobile devices
_____________ are hardware, rules, or procedures that reduce or eliminate the threats to network security. They prevent, detect, and/or correct whatever might happen to the organization because of threats facing its computer-based systems.
Controls
_______________ mitigate or stop a person from acting or an event from occurring. Some examples are a password, a guard, or a security lock on a door.
Preventitive controls
_______________ reveal or discover unwanted events.
Detective controls
___________________ remedy an unwanted event or intrusion.
Corrective controls
What are the three risk assessment frameworks that are most commonly used?
1) Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) from the Computer Emergence Readiness Team
2) Control Objectives for Information and Related Technology (COBIT) from the Information Systems Audit and Control Association
3) Risk Management Guide for Information Technology Systems (NIST guide) from the National Institute of Standards and Technology
What are the five common steps across the risk assessment frameworks?
1) Develop risk measurement criteria
2) Inventory IT assets
3) Identify threats
4) Document existing controls
5) Identify improvements
What are teh five most common impact areas in a risk assessment?
1) financial (revenues and expenses)
2) productivity (business operations)
3) reputation (customer perceptions)
4) safety (the health of customers and employees
5) legal (potential for fines and litigation)
A ____________________ is an information system that is critical to the survival of the organization. It is an application that cannot be permitted to fail, and if it does fail, the network staff drops everything else to fix it.
mission-critical application
What question should be asked to rank the importance of assets?
What would happen if this information asset’s confidentiality, integrity, or accessibility were compromised?
How does one calculate an impact score?
By multiplying the priority of each area by the impact the threat would have, using a 1 for a low value, a 2 for a medium value, and a 3 for a high value, and summing all the results.
How does one calcuate the relative risk score?
By multiplying the impact score by the likelihood (using 1 for low likelihood, 2 for medium likelihood, and 3 for high likelihood).
A ________________ is the way an organization intends to address a risk.
risk control strategy
__________________ involves implementation of some type of a control to counter the threat or to minimize the impact. An organization can implement several types of controls, such as using antivirus software, implementing state-of-the-art firewalls, or providing security training for employees.
Risk mitigation
_________________ is configuring the main router that connects your network to the Internet (or firewall) to verify that the source address of all incoming messages is in a valid address range for that connection
Traffic filtering
_________________ is configuring the main router (or firewall) to limit the number of incoming packets that could be DoS/DDoS attack packets that it allows to enter the network, regardless of their source
Traffic limiting
A _____________________ is a device that monitors normal traffic patterns and learns what normal traffic looks like.
traffic anomaly detector
The best way to prevent a failure from impacting business continuity is to build _____________ into the network.
redundancy
Most organizations build redundancy into their ______________ and their _______________ but are very careful in choosing which distribution backbones (i.e., building backbones) and access layer LANs will have redundancy
core backbone, Internet connections
________________________ is a storage technology that, as the name suggests, is made of many separate disk drives. When a file is written to this device, it is written across several separate, redundant disks.
Redundant array of independent discks (RAID)
A critical element in correcting problems from a disaster is the __________________, which should address various levels of response to a number of possible disasters and should provide for partial or complete recovery of all data, application software, network components, and physical facilities.
disaster recovery plan
With __________, copies of all data and transactions on selected servers are written to servers as the transaction occurs. This is more flexible than traditional backups that take snapshots of data at specific times or than disk mirroring, which duplicates the contents of a disk from second to second. This enables data to be stored miles from the originating server and time-stamps all transactions to enable organizations to restore data to any specific point in time.
Continuous data protection (CDP)
What are the four types of intruders?
1) Novice attackers hwo use hacking tools (script kiddies)
2) hackers/crackers: experts in security, but their motivation is the thrill of the hunt
3) professional hackers
4) organization employees who have legitimate access to the network but who gain access to information they are not authorized to use.