Chapter 12 HW

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

List the four steps to developing a CM plan.

- Establish baselines - Identify configuration - Describe configuration control process - Identify schedule for configuration audits

List the five domains of the recommended maintenance model.

- External monitoring - Internal monitoring - Planning and risk assessment - Vulnerability assessment and remediation - Readiness and review

Why should agencies monitor the status of their programs?

- Ongoing information security activities are proving appropriate support - Policies and procedures are current - controls are accomplishing their intended purpose

List and describe the choices an organization has when setting policy about how to employ digital forensics.

- Use a dedicated forensic workstation to examine a write-protected hard drive or image of the suspect hard drive - Boot the system using a verified, write-protected CD or other media with kernel and tools - Build a new system that contains an image of the suspect system and examine it - Verify the software on the suspect system, and then use the verified local software to conduct the examination - Examine the suspect system using the software on it, without verifying the software

____________________ is the process of reviewing the use of a system, not to check performance but to determine if misuse or malfeasance has occurred.

Auditing

__________ is the coherent application of methodical investigatory techniques to present evidence of crimes in a court or similar setting.

Forensics

The ____________________ vulnerability assessment is designed to find and document vulnerabilities that may be present in the organization's public network.

Internet

____________________ interconnections are the network devices, communications channels, and applications that may not be owned by the organization but are essential to the organization's cooperation with another company.

Partner

A performance ____________________ is an expected level of performance against which all subsequent levels of performance are compared.

baseline

The process of collecting detailed information about devices in a network is often referred to as ____________________.

characterization

A(n) ____________________ analysis is a procedure that compares the current state of a network segment (the systems and services it offers) against a known previous state of that same network segment (the baseline of systems and services).

difference

An attacker's use of a laptop while driving around looking for open wireless connections is often called war ____________________.

driving

Almost all aspects of a company's environment are ____________________, meaning threats that were originally assessed in the early stages of the project's systems development life cycle have probably changed and new priorities have emerged.

dynamic

Proven cases of real vulnerabilities can be considered vulnerability ____________________.

instances

The primary goal of the ____________________ monitoring domain is an informed awareness of the state of all the organization's networks, information systems, and information security defenses.

internal

In an online or __________ data acquisition, forensic investigators use network-based tools to acquire a protected copy of the information.

live

Digital ___________ is a crime against or using digital media, computer technology, or related components; in other words, a computer is the source of the crime or the object of it.

malfeasance

The objective of the external ____________________ domain within the maintenance model is to provide early awareness of new and emerging threats, threat agents, vulnerabilities, and attacks that the organization needs in order to mount an effective and timely defense.

monitoring

As each project nears completion, a(n) ____________________ risk assessment group reviews the impact of the project on the organization's risk profile.

operational

The ____________________ tester's ultimate responsibility is to identify weaknesses in the security of the organization's systems and networks and then present findings to the system owners in a detailed report.

penetration

The primary goal of the vulnerability assessment and ____________________ domain is to identify specific, documented vulnerabilities and remediate them in a timely fashion.

remediation

The primary goal of the readiness and ____________________ domain is to keep the information security program functioning as designed and improve it continuously over time.

review

The primary objective of the planning and ____________________ domain is to keep a lookout over the entire information security program.

risk assessment

Rehearsals that use plans as realistically as possible are called ____________________ games.

war

The ____________________ vulnerability assessment is designed to find and document vulnerabilities that may be present in the organization's wireless local area networks.

wireless


संबंधित स्टडी सेट्स

Public speaking online final exam: Ch. 9 & 11

View Set

High Yield Surgery Emma Holiday Ramahi PP

View Set

Selected Florida Statues and Rules Quiz 1

View Set

LSAT Valid/Invalid Argument Forms

View Set

Chapter 15: The Value of Synergy

View Set

Chapter 28: Caring for Clients with Heart Failure

View Set