S3 Flashcards

(59 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the highest security concerns for senior executives?

A

Breaches of data, theft, service interruptions, and regulatory non-compliance

These concerns are critical for IT governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What occurs during a data breach?

A

Information is compromised and utilized without the authorization of the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define service disruptions.

A

An unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can result from failing to comply with cybersecurity regulations?

A

Fines and financial penalties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a cyberattack?

A

Any kind of malicious activity that targets computer information systems, infrastructures, networks, or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a threat agent?

A

An internal or external attacker that could negatively impact data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List types of threat agents.

A
  • Attacker, Threat Actor, or Hacker
  • Adversary
  • Government-Sponsored/State-Sponsored Actors
  • Hacktivists
  • Insiders
  • External Threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are network-based attacks?

A

Attacks that target the infrastructure of a network to gain unauthorized access or disrupt operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name examples of network-based attacks.

A
  • Backdoors and trapdoors
  • Covert channels
  • Denial-of-service (DoS)
  • Distributed denial-of-service (DDoS)
  • Man-in-the-middle (MITM)
  • Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do application-based attacks target?

A

Specific software or applications to gain unauthorized access or disrupt functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provide examples of application-based attacks.

A
  • SQL injection
  • Cross-site scripting (XSS)
  • Race condition
  • Malicious mobile code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a social engineering attack?

A

Attacks that use psychological manipulation to get employees to divulge sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some examples of social engineering attacks.

A
  • Phishing
  • Spear phishing
  • Business email compromise (BEC)
  • Pretexting
  • Catfishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the stages in a cyberattack?

A
  • Reconnaissance
  • Gaining Access
  • Escalation of Privileges
  • Maintaining Access
  • Network Exploitation and Exfiltration
  • Covering Tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is cloud computing?

A

A way for organizations to store, use, process, and share data without needing to own or manage the resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List risks specific to cloud computing.

A
  • Additional industry exposure
  • Cloud malware injection attacks
  • Compliance violations
  • Loss of control
  • Theft of intellectual property
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the risks related to mobile devices?

A
  • Application malware
  • Lack of updates
  • Lack of encryption
  • Physical threats
  • Unsecured Wi-Fi networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define threat modeling.

A

The process of identifying, analyzing, and mitigating threats to a network, system, or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the CIA Triad?

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

List the phases of threat modeling.

A
  • Identify assets
  • Identify threats
  • Perform reduction analysis
  • Analyze the impact of an attack
  • Develop countermeasures and controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does COSO stand for?

A

Committee of Sponsoring Organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the five components of the COSO internal control framework?

A
  • Control Environment
  • Risk Assessment
  • Control Activities
  • Information and Communication
  • Monitoring Activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an acceptable use policy (AUP)?

A

A control document created to regulate and protect technology resources.

25
What does a BYOD policy allow?
Employees to use their personally owned devices for work-related activities.
26
What is network segmentation?
A method to isolate different parts of a network to enhance security.
27
Define vulnerability management.
A proactive security practice designed to prevent the exploitation of IT vulnerabilities.
28
What is the purpose of layered security?
To protect an organization using a diversified set of security tactics.
29
What are preventive controls?
Controls designed to thwart malicious activity from ever occurring.
30
What is the purpose of detective controls?
To detect a threat event while it is occurring.
31
What is corrective control intended for?
To fix known vulnerabilities as a result of recent security incidents.
32
What does the NIST framework for risk management include?
* Risk framework * Assess risk * Respond to risk * Monitor risk
33
What is the first step in a security assessment engagement?
Defining assessment procedures.
34
What are Security Assessment Reports (SARs)?
Reports issued as evidence of the security assessment findings.
35
What are the four components of risk management?
Risk framework, assess risk, respond to risk, monitor risk
36
What is the first step in a security assessment engagement?
Defining assessment procedures
37
What does an assessment object identify?
Items being assessed as part of a specific control
38
What are the methods used in security assessments?
* Examination * Interviewing * Testing
39
What is a Security Assessment Report (SAR)?
A report documenting the findings and recommendations for correcting identified issues
40
What key elements do SARs generally include?
* Summary of findings * Systems overview * Assessment methodology * Security assessment findings * Recommendations * Action plans
41
Who plays a role in protecting a company's digital and physical assets?
All employees
42
What is critical to minimize cyber risk and damages from cyberattacks?
Education and training programs
43
What are the three relevant categories of personnel in security awareness?
* Management * Specialized IT personnel * All other employees
44
What components may be included in a successful security awareness program?
* Phishing simulations * Security program champions * Employee engagement
45
What is the difference between confidentiality and privacy?
* Privacy: Protects individual rights and control over shared information * Confidentiality: Protects unauthorized access to company information
46
What should organizations develop to protect the confidentiality of personal identifiable information (PII)?
Policies and procedures
47
What is one method organizations can use to protect confidential data during data processing?
De-identifying personal information
48
How can organizations control access to personal information?
Through access control policies and enforcement mechanisms
49
What are two types of encryption methods?
* Symmetric Encryption * Asymmetric Encryption
50
What does Data Loss Prevention (DLP) enable organizations to do?
Detect and prevent unauthorized transfers of sensitive information
51
What are the two common types of DLP systems?
* Network-based DLP systems * Endpoint-based DLP systems
52
What is the purpose of conducting walk-throughs of security policies?
To enhance the execution of security, confidentiality, and privacy strategies
53
What are the steps involved in performing a walk-through?
* Plan and prep * Obtain an understanding * Perform the walk-through * Create documentation * Test * Evaluate and report
54
What is the purpose of an Incident Response Plan (IRP)?
To document procedures for detecting, responding to, and limiting cyberattack consequences
55
What are some key elements that an IRP should contain?
* Mission * Strategies and goals * Senior management approval * Purpose and objectives * Scope of the policy
56
What is a critical component of an IRP related to human resources?
The designated human capital for incident response
57
What are the seven steps in responding to incidents?
* Preparation * Detection * Containment * Eradication * Reporting * Recovery * Learning
58
What is the function of cyber insurance policies?
To provide financial relief in the event of a successful cyberattack
59
What types of losses are typically covered by cyber insurance?
* Business interruption losses * Cyber extortion losses * Incident response costs * Replacement costs for information systems * Litigation and attorney fees * Reputational damage * Information or identity theft