Exam 2 Flashcards

Study for exam 2 (66 cards)

1
Q

What is CP ?

A

CP is “contingency planning” it is the overall “what - if” plan that will be used to restore operations with minimal cost and disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Is IRP

A

IRP - “ Incident Response Plan” is the immediate response that is activated after an incident occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is DRP

A

DRP- “Disaster Recovery Plan” is used to restore operations at the primary site after a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is BCP

A

“Business Contingency Plan” Re-establishes critical functions at an alternate site. runs along Side the DRP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BIA

A

BIA - “ Business Impact Anaylsis” is an Assessment of the impact that various adverse events can have on the organization. The BIA assumes that these controls have failed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The 3 steps of IRP

A
  1. Detection
  2. Reaction
  3. Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How the IRP relates to NIST

A

The IRP aligns with the NIST Cybersecurity Framework
1. Detect Cyber Events.
2. Respond to cyber events.
3. Recover - tactical recovery phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cold sites

A

A cold site is a secondary location with low cost slow recovery.
it is measured in weeks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Warm Sites

A

This also a secondary location but is partially equipped with equipment and connection at location.
It is measured in days/hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hot site

A

This is a fully equipped secondary location, with equipment and connection at location. It is active before fallout and is measured in hours, minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pro’s and con’s for using cloud for DPR

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 ways to test CP( Contingency Plans)

A
  1. Desk check / table top exercise
  2. Structured walk-through ( tell workshop story)
  3. Simulation ( think VMs)
  4. Full interruption ( Pros and Cons)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Iteration/CPI

A

Iteration results in improvement.
“Continuous Process Improvement” - A formal implementation of iteration mythology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Laws Vs Ethics

A

Laws - Enforceable rules that mandate or prohibit Behavior.
Ethics - Principles that regulate socially acceptable behavior.
THE DIFFERENCE IS “ENFORCEABILITY”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Liability vs Restitution

A

Liability - This the legal obligation of an entity extending beyond criminal or contract law, may include restitution.
Restitution - The legal obligation to compensate an injured party for wrongs committed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Due Care vs Due Diligence

A

Due Care- the legal standard to have a prudent org act legally and ethically and know the consequences of actions.
Due Diligence- The legal standard to have a prudent org maintain the standard of due care .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jurisdiction vs long arm

A

Jurisdiction- courts right to hear a case if the wrong was committed in its territory.
Long Arm - application of the law to those residing outside a court’s normal jurisdiction.
The difference is whether it’s inside or outside of jurisdiction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Policy vs Law

A

Policies: specify acceptable and unacceptable employee behavior in the workplace.
Policy functions as organizational laws
THE DIFFERENCE BETWEEEN POLICY AND LAW IS IGNORANCE OF A POLICY IS AN ACCEPTABLE DEFENSE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

5 criteria for policy enforcement

A
  1. Dissemination( distribution)
  2. Review(reading)
    3.Comprehension(Understanding)
  3. Compliance(Agreement)
  4. Uniform Enforcement
    All these criteria must be met before an employee can be penalized (legally).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Computer Crime Laws

A
  1. CFAA- Computer Fraud and Abuse Act of 1986 - this is the pioneer of many computer - related federal and enforcement laws.
  2. NIIP - National Information Infrastructure Protection Act of 1996 - modified the CFAA law.
  3. USA Patriot Act of 2001- used in order to combat terrorism- related activities.
  4. USA Patriot improvement and Reauthorization Act of 2006 - made 14 of 16 expanded powers of the department of homeland security and the FBI in investigating terrorist.
  5. USA FREEDOM ACT - functions the same as the USA patriot Act as it expired in 2015.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Privacy

A

individuals rights to protect themselves and personal info from unauthorized access.
It is Important because it is the #1 ethical issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HIPAA

A

Health Insurance Portability and Accountability Act of 1996 - Protects your health insurance or general health information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is GLBA ?

A

Gramm-leach Bliley Act of 1999 also know as the financial services moderation act protects our financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the SOX

A

Sarbanes Oxley Act of 2002 protects financial reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
PCI DSS
Payment Card Industry Data Security Standards - standard that payment processing organizations must comply. ITS NOT A LAW.
26
Aggregated information VS Information Aggregation
Aggregated Information - protects Privacy Information Aggregation - threatens privacy
27
PII - Personally Identifiable Information
When the PII is stolen Identity theft is committed The Federal Trade Commission is who identity theft gets reported to.
28
PHI- Personal Health Info
29
How is cybercrime enforced
It is enforced through the Federal Bureau of Investigation (FBI)
30
CIRCIA ( Cybersecurity Incident Reporting for Infrastructure Act)
Cybersecurity Incident - reported within 72 hrs Ransomware Incident - reported within 24 hrs
31
Why is national Culture so important in security
It is so important because a nations culture shapes its ethics.
32
White vs Black vs Gray hats
White hats - The good guys, they are ethical hackers Black hats- The bad guys, malicious hackers , not ethical Gray hats- The fall in the middle.
33
Causes of unethical and illegal behavior
1. Ignorance ( people control) 2. accident (process control) 3. intent (technology control)
34
What is Deterrence
Deterrence is the best method for preventing an illegal or unethical activity.
35
Conditions for deterrence to be effective
1. Fear of Penalty 2. Probability of being apprehended 3. Propability of fear being applied
36
How do employees learn about ethical behavior and security policies
The employees must be trained
37
What is GDPR ? why is it important
GDPR is General Data Protection Regulation. it is important because it defines the PII
38
The 2025 EU directive covers
Improving risk management. Specific incident reporting requirements Mandated resilience testing
39
40
Access
This is how systems determine whether and how to admit a user into a trusted area of the organization.
41
Identification
This when individuals seeking access to a resource provide something the system knows them by. Like ID, department codes.
42
Authentication
This is the process of validating an individuals entity.
43
Multi factor authentication
This are questions asked to ensure that the right individual gains access to the resource. 1. Something you have like a ID or token 2. Something you are like characteristics of the individual.
44
Authorization
Matching an individual to a a list of information and corresponding access levels.
45
Accountability
This ensures that all actions on a system can be connected to an authorized personnel.
46
password vs passkeys
passwords are created by users, passkeys are created by automatically generated. passwords a vulnerable to phishing while passkeys resist them passwords are common, passkey use new technology that makes them less familiar.
47
What is Firewall
This a device that is use to separate trusted networks from untrusted ones.
48
Types of Firewall
1. Packet Filtering 2.Application Gateways 3.Mac Layer Firewalls 4. Hybrids
49
Packet Filtering Firewalls
This examines the header information of data packets.
50
Hybrid firewalls
This combine elements of other types of firewalls
51
NGFW
52
UTM
Unified Threat Management combines firewalls
53
Screened Subnet Firewall with DMZ
This is the dominant architecture used today. Its is used to protect DMZ systems and internal networks.
54
What is extranet
this extends limited internal access to trusted partners via DMZ
55
How to go about selecting a new firewall
1. security needs 2. performance, cost and management features.
56
What is H.A vs Load balancing
H.A (High Availability) = redundant fail over for reliability, load balancing = split traffic for performance.
57
Perimeter Security
1.Castle perimeter 2. Fluid perimeter 3. Zero trust
58
Fluid Perimeter
This is the total length of the surface pipe that is contact with the fluid inside e
59
Rule of Thumb
1. DENY ALL 2.Allow by EXCEPTION
60
Ingress and egress
Ingress-incoming data traffic egress- Outgoing data traffic
61
VPN
Virtual Private Networks
62
How to do VPNS
1. End - to - End transport on encrypted data. 2. Remote Access The most popular VPN encryption protocol is Open VPN
63
What a VPN does
1. Encapsulation of incoming and outgoing data. 2. Encryption of incoming and outgoing data. 3.Authentication of remote computer
64
Security Perimeter vs DMZ
Security Perimeter - a boundary between trusted and untrusted DMZ = Buffer Zone hosting public services .
65
some typical authentication protocols
RADIUS Keberos TACACS+ LDAP
66