CYBR 3300 Final Review new
Constrained data item (CDI
- Data item with protected integrity
Key distribution center {KDC
-Generates and issues session keys
Steps In ISO 2700
1) Risk Assessment 2) Risk Treatment 3) Risk Acceptance 4) Risk Communication 5) Risk Monitoring and Review
Steps in Microsoft Risk Management Approach
1. Assessing risk 2. Conducting decision support 3. Implementing controls 4. Measuring program effectiveness
5 Components of COSO Framework
1. Control Environment 2. Risk Assessment 3. Control Activities 4. Information and Communication 5. Monitoring
Authentication server (AS)
A Kerberos server that authenticates clients and servers
timing channels
A TCSEC-defined covert channel that communicates by managing the relative timing of events
storage channels
A TCSEC-defined covert channel that communicates by modifying a stored object, such as in steganography
electronic vaulting
A backup method that uses bulk batch transfer of data to an off-site facility; this transfer is usually conducted via leased lines or secure Internet connections
database shadowing
A backup strategy to store duplicate online transaction data along with duplicate databases at the remote site on a redundant server. This server combines electronic vaulting with remote journaling by writing multiple copies of the database simultaneously to two locations
configuration
A collection of components that make up a configuration item
software library
A collection of configuration items that is usually controlled and that developers use to construct revisions and issue new configuration items
False
A company striving for "best security practices" makes every effort to establish security program elements that meet every minimum standard in their industry.
Bell-LaPadula (BLP) confidentiality model
A confidentiality model or "state machine reference model" that ensures the confidentiality of the modeled system by using MACs, data classification, and security clearances
collusion
A conspiracy or cooperation between two or more individuals or groups to commit illegal or unethical actions
False
A conspiracy or cooperation between two or more individuals or groups to commit illegal or unethical actions is known as racketeering. __________
collusion
A conspiracy or cooperation between two or more individuals or groups to commit illegal or unethical actions.
timeshare
A continuity strategy in which an organization co-leases facilities with a business partner or sister organization
service bureau
A continuity strategy in which an organization contracts with a service agency to provide a BC facility for a fee
mutual agreement
A continuity strategy in which two organizations sign a contract to assist the other in a disaster by providing BC facilities, resources, and services until the organization in need can recover from the disaster
rolling mobile site
A continuity strategy that involves contracting with an organization to provide specialized facilities configured in the payload area of a tractor-trailer
symmetric encryption
A cryptographic method in which the same algorithm and secret key are used both to encipher and decipher the message
asymmetric encryption
A cryptographic method that incorporates mathematical operations involving both a public key and a private key to encipher or decipher a message
XOR cipher conversion
A cryptographic operation in which a bit stream is subjected to a Boolean XOR function against some other data stream, typically a key stream
transposition cipher
A cryptographic operation that involves simply rearranging the values within a block based on an established pattern
Bluetooth
A de facto industry standard for short-range wireless communications between wireless telephones and headsets, between PDAs and desktop computers, and between laptops.
Trusted Computer System Evaluation Criteria (TCSEC)
A deprecated (no longer used) DoD system certification and accreditation standard that defined the criteria for assessing the access controls in a computer system
alert message
A description of the incident or disaster that usually contains just enough information so that each person knows what portion of the IR or DR plan to implement without slowing down the notification process
after-action review (AAR}
A detailed examination and discussion of the events that occurred during an incident or disaster, from first detection to final recovery
application layer proxy firewall
A device capable of functioning both as a firewall and an application layer proxy server
bastion host
A device placed between an external, untrusted network and an internal, trusted network
proxy firewall
A device that provides both firewall and proxy services
wireless access point (WAP)
A device used to connect wireless networking users and their devices to the rest of the organization's network(s)
alert roster
A document that contains contact information for personnel to be notified in the event of an incident or disaster
warm site
A facility that provides many of the same services and options as a hot site, but typically without installed and configured software applications
cold site
A facility that provides only rudimentary services, with no computer hardware or peripherals
screened-host architecture
A firewall architectural model that combines the packet filtering router with a second, dedicated device such as a proxy server or proxy firewall
screened-subnet architecture
A firewall architectural model that consists of one or more internal bastion hosts located behind a packet filtering router on a dedicated network segment, with each host performing a role in protecting the trusted network
single bastion host architecture
A firewall architecture in which a single device performing firewall duties, such as packet filtering, serves as the only perimeter device providing protection between an organization's networks and the external network
deep packet inspection (DPI)
A firewall function that involves examining multiple protocol headers and even content of network traffic, all the way through the TCP/IP layers and including encrypted, compressed, or encoded data
dynamic packet filtering firewall
A firewall type that can react to network traffic and create or modify configuration rules to adapt
stateful packet inspection (SPI) firewall
A firewall type that keeps track of each network connection between internal and external systems using a state table, and that expedites the fi ltering of those communications
talk-through
A form of structured walk-through in which individuals meet in a conference room and discuss a CP plan rather than walking around the organization
hot site
A fully configured computing facility that includes all services, communications links, and physical plant operations
configuration item
A hardware or software item that will be modified and revised throughout its life cycle
standard of due care
A legal standard that requires an organization and its employees to act as a reasonable and prudent individual or organization would under similar circumstances.
build list
A list of the versions of components that make up a build
total cost of ownership (TCO)
A measurement of the true cost of a device or application, which includes not only the purchase price, but annual maintenance or service agreements, the cost to train personnel to manage the device or application, the cost of systems administrators, and the cost to protect it
minor release
A minor revision of a version from its previous state.
honey net
A monitored network or network segment that contains multiple honeypot systems
port
A network channel or connection point in a data communications system
dual-homed host
A network configuration in which a device contains two network interfaces: one that is connected to the external network and one that is connected to the internal network
packet filtering firewall
A networking device that examines the header information of data packets that come into a network and determines whether to drop them (deny) or forward them to the next network connection (allow), based on its configuration rules
security clearance
A personnel security structure in which each user of an information asset is assigned an authorization level that identifies the level of classified information he or she is "cleared" to access
passphrase
A plain-language phrase, typically longer than a password, from which a virtual password is derived
clipping level
A predefined assessment level that triggers a predetermined response when surpassed.
virtual private network (VPN)
A private, secure network operated over a public and insecure network
difference analysis
A procedure that compares the current state of a network segment against a known previous state of the same network segment (the baseline of systems and services)
lnfoSec performance management
A process of designing, implementing. and managing the use of specific measurements to determine the effectiveness of the overall security program
cache server
A proxy server or application-level firewall that stores the most recently accessed information in its internal caches, minimizing the demand on internal servers
mandatory access control (MAC
A required, structured data classification scheme that rates each collection of information as well as each user
mandatory vacation policy
A requirement that all employees take time off from work, which allows the organization to audit the individual's areas of responsibility
True
A requirement that all employees take time off from work, which allows the organization to audit the individual's areas of responsibility, is known as a mandatory vacation policy. __________
password
A secret word or combination of characters that only the user should know; used to authenticate the user
False
A security metric is an assessment of the performance of some action or process against which future performance is assessed. __________
proxy server
A server that exists to intercept requests for information from external users and provide the requested information by retrieving it from an internal server, thus protecting and minimizing the demand on internal servers
Wired Equivalent Privacy (WEP)
A set of protocols designed to provide a basic level of security protection to wireless networks and to prevent unauthorized access or eavesdropping. WEP is part of the IEEE 802.11 wireless networking standard
Wi·Fi Protected Access {WPA)
A set of protocols used to secure wireless networks; created by the Wi-Fi Alliance. Includes WPA and WPA2
penetration testing
A set of security tests and evaluations that simulate attacks by a hacker or other malicious external source
major release
A significant revision of a version from its previous state
build
A snapshot of a particular version of software assembled or linked from its component modules
content filter
A software program or hardware/software appliance that allows administrators to restrict content that comes into or leaves a network
monoalphabetic substitution
A substitution cipher that incorporates only a single alphabet in the encryption process
polyalphabetic substitution
A substitution cipher that incorporates two or more alphabets in the encryption process
state table
A tabular record of the state and context of each packet in a conversation between an internal and external user or system
business process
A task performed by an organization or one of its units in support of the organization's overall mission
port-address translation (PAT)
A technology in which multiple real, routable external IP addresses are converted to special ranges of internal IP addresses, usually on a one-to many basis; that is, one external valid address is mapped dynamically to a range of internal addresses by adding a unique port number to the address when traffic leaves the private network and is placed on the public network
network-address translation (NAT)
A technology in which multiple real, routable external IP addresses are converted to special ranges of internal IP addresses, usually on a one-to-one basis; that is, one external valid address directly maps to one assigned internal address
metric
A term traditionally used to describe any detailed statistical analysis technique on performance, but now commonly synonymous with performance measurement
certificate authority (CA)
A third party that manages users digital certificates and certifies their authenticity
war game
A type of rehearsal that seeks to realistically simulate the circumstances needed to thoroughly test a plan
lattice-based access control
A variation on the MAC form of access control, which assigns users a matrix of authorizations for particular areas of access, incorporating the information assets of subjects such as users and objects
False
A(n) credit check can uncover past criminal behavior or other information that suggests a potential for future misconduct or a vulnerability that might render a job candidate susceptible to coercion or blackmail. __________
Formula for Annualized loss expectancy
ALE = SLE X ARO
discretionary access controls (DACs)
Access controls that are implemented at the discretion or option of the data user
nondiscretionary controls
Access controls that are implemented by a central authority.
crossover error rate (CER
Also called the equal error rate, the point at which the rate of false rejections equals the rate of false acceptances
application layer firewall
Also known as a layer seven firewall, a device capable of examining the application layer of network traffic (for example, HTIP, SMTP, FTP) and filtering based upon its header content rather than the traffic IP headers
cost-benefit analysis (CBA)
Also known as an economic feasibility study, the formal assessment and presentation of the economic expenditures needed for a particular security control, contrasted with its projected value to the organization
anomaly-based IDPS
An IDPS that compares current data and traffic patterns to an established baseline of normalcy, looking for variance out of parameters. Also known as a behavior-based !OPS
signature-based IDPS
An IDPS that examines systems or network data in search of patterns that match known attack signatures. Also known as a knowledge-based !OPS
network-based IDPS (NIDPS}
An IDPS that resides on a computer or appliance connected to a segment of an organization's network and monitors traffic on that segment, looking for indications of ongoing or successful attacks
host-based IDPS (HIDPS}
An IDPS that resides on a particular computer or server, known as the host, and monitors activity only on that system
computer security incident response team (CSIRT)
An IR team composed of technical IT, managerial IT, and lnfoSec professionals who are prepared to detect, react to, and recover from an incident
Biba integrity model
An access control model that is similar to BLP and is based on the premise that higher levels of integrity are more worthy of trust than lower levels
incident
An adverse event that could result in a loss of information assets, but does not threaten the viability of the entire organization
honey pot
An application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion
vulnerability scanner
An application that examines systems connected to networks and their network traffic to identify exposed usernames and groups, open network shares, configuration problems, and other vulnerabilities in servers
configuration and change management (CCM)
An approach to implementing system change that uses policies, procedures, techniques, and tools to manage and evaluate proposed changes, track changes through completion, and maintain systems inventory and supporting documentation
intra net vulnerability assessment
An assessment approach designed to find and document selected vulnerabilities that are likely to be present on the organization's internal network
platform security validation (PSV)
An assessment approach designed to find and document vulnerabilities that may be present because misconfigured systems are used within the organization
Internet vulnerability assessment
An assessment approach designed to find and document vulnerabilities that may be present in the organization's public network
wireless vulnerability assessment
An assessment approach designed to find and document vulnerabilities that may be present in the organization's wireless local area networks
baseline
An assessment of the performance of some action or process against which future performance is assessed.
baseline
An assessment of the performance of some action or process against which future performance is assessed; the first measurement (benchmark) in benchmarking
war driving
An attacker technique of moving through a geographic area or building, actively scanning for open or unsecured WAPs
benchmarking
An attempt to improve information security practices by comparing an organization's efforts against practices of a similar organization or an industry-developed standard to produce results it would like to duplicate
benchmarking
An attempt to improve information security practices by comparing an organization's efforts against practices of a similar organization or an industry-developed standard to produce results it would like to duplicate.
dumb card
An authentication card that contains digital user data, such as a personal identification number (PIN), against which user input is compared
synchronous token
An authentication component in the form of a token a card or key fob that contains a computer chip and a liquid crystal display and shows a computer-generated number used to support remote login authentication
asynchronous token
An authentication component in the form of a token- a card or key fob that contains a computer chip and a liquid crystal display and shows a computergenerated number used to support remote login authentication
smart card
An authentication component similar to a dumb card that contains a computer chip to verify and validate several pieces of information instead of just a PIN
Kerberos
An authentication system that uses symmetric key encryption to validate an individual user's access to various network resources by keeping a database containing the private keys of clients and servers that are in the authentication domain it supervises.
internal benchmarking
An effort to improve information security practices by comparing an organization's current efforts against its past efforts, or a desired target value, to identify trends in performance, areas of excellence, and areas in need of improvement
substitution cipher
An encryption method in which one value is substituted for another
adverse event
An event with negative consequences that could threaten the organization's information assets or operations. Sometimes referred to as an incident candidate.
operational feasibility
An examination of how well a particular solution fits within the organization's culture and the extent to which users are expected to accept the solution
political feasibility
An examination of how well a particular solution fits within the organization's political environmen
organizational feasibility
An examination of how well a particular solution fits within the organization's strategic planning objectives and goals
technical feasibility
An examination of how well a particular solution is supportable given the organization's current technological infrastructure and resources, which include hardware, software, networking. and personnel
dumpster diving
An information attack that involves searching through a target organization's trash and recycling bins for sensitive information
public key infrastructure (PKI)
An integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely through the use of digital certificates
demilitarized zone (DMZ)
An intermediate area between a trusted network and an untrusted network that restricts access to internal systems
Information Technology System Evaluation Criteria (ITSEC
An international set of criteria for evaluating computer systems, very similar to TCSEC
Common Criteria for Information Technology Security Evaluation
An international standard (150/IEC 15408) for computer security certification that is considered the successor to TCSEC and ITSEC
business impact analysis (BIA)
An investigation and assessment of adverse events that can affect the organization, conducted as a preliminary phase of the contingency planning process, which includes a determination of how critical a system or set of information is to the organization's core processes and its recovery priorities
business continuity (BC)
An organization's set of efforts to ensure its long-term viability when a disaster precludes normal operations at the primary site
crisis management (CM
An organization's set of planning and preparation efforts for dealing with potential human injury, emotional trauma, or loss of life as a result of a disaster
disaster recovery (DR
An organization's set of planning and preparation efforts for detecting, reacting to, and recovering from a disaster
incident response (IR)
An organization's set of planning and preparation efforts for detecting, reacting to, and recovering from an incident
trap and trace applications
Applications that combine the function of honey pots or honey nets with the capability to track the attacker back through the network
Defense Risk Treatment
Applying controls and safeguards that eliminate or reduce the remaining uncontrolled risk
Formula for Cost Benefit Analysis
CBA = ALE(precontrol) - ALE(postcontrol) - ACS
log files/logs
Collections of data stored by a system and used by administrators to audit systems performance and use both by authorized and unauthorized users
False
Collusion is the requirement that every employee be able to perform the work of at least one other employee. __________
Wander freely in and out of facilities.
Contract employees—or simply contractors—should not be allowed to do what?
Managerial Controls
Controls that cover security processes designed by strategic planners, integrated into the organization's management practices, and routinely used by security administrators to design, implement, and monitor other control systems
Operational Controls
Controls that deal with the operational functions of security that have been integrated into the repeatable processes of the organization
Technical Controls
Controls that support tactical portion of security program and that have been implemented as reactive mechanisms to deal with the immediate needs of the organization as it responds to the realities of the technical environment
Costs associated with treating a risk
Cost of development or acquisition (hardware, software, and services) • Training fees (cost to train personnel) • Cost of implementation (installing, configuring, and testing hardware, software, and services) CHAPTER 7 Risk Management: Treating Risk • Service costs (vendor fees for maintenance and upgrades or from outsourcing the information asset's protection and/or insurance) • Cost of maintenance {labor expense to verify and continually test, maintain, train, and update) • Potential cost from the loss of the asset, either from removal of service (termination) or compromise by attack
benchmarking
Creating a blueprint by looking at the paths taken by organizations similar to the one whose plan you are developing is known as which of the following?
Unconstrained data item
Data not controlled by Clark-Wilson; non validated input or any output
performance measurements
Data or the trends in data that may indicate the effectiveness of security countermeasures or controls-technical and managerialimplemented in the organization
False
Data or the trends in data that may indicate the effectiveness of security countermeasures or controls—technical and managerial—implemented in the organization are known as progress measurements. __________
Which technique does a group rate or rank a set of information, compile the result and repeat until everyone is satisfied with the result
Delphi
incident response procedures (IR procedures)
Detailed, step-by-step methods of preparing. detecting. reacting to, and recovering from an incident
Detective Controls
Detects or identifies an incident or threat when it occurs; for example, anti-malware software
slow-onset disasters
Disasters that occur over time and gradually degrade the capacity of an organization to withstand their effects
rapid-onset disasters
Disasters that occur suddenly, with little warning, taking people's lives and destroying the means of production. Examples include earthquakes, floods, storm winds, tornadoes, and mud flows
Deterrent Controls
Discourages or deters an incipient incident; an example would be signs that indicate video monitoring
signing the employment contract
Employees new to an organization should receive an extensive InfoSec briefing that includes all of the following EXCEPT:
performance evaluations
Employees pay close attention to job __________, and including InfoSec tasks in them will motivate employees to take more care when performing these tasks.
Directive Controls
Employs administrative controls such as policy and training designed to proscribe certain user behavior in the organization
digital signatures
Encrypted message components that can be mathematically proven to be authentic
Preventive Controls
Helps an organization avoid an incident; an example would be the requirement for strong authentication in access controls
consultants
Hired for specific tasks or projects
False
ISO 27001 certification is only available to companies that do business internationally.
Which international standard provides a structured methodology for evaluating threats to economic performance in an organization and was developed using the Australian/New Zealand standard AS/NZS 4260:2004 as a foundation
ISO 3100
The InfoSec measurement development process recommended by NIST is divided into tow major activities. Which of the following is one of them
Identification and definition of the current InfoSec program
Terminate the relationship with the individual and request that he or she be censured.
If a temporary worker (temp) violates a policy or causes a problem, what is the strongest action that the host organization can usually take, depending on the SLA?
transport mode
In IPSec, an encryption method in which only a packet's IP data is encrypted, not the IP headers themselves; this method allows intermediate nodes to read the source and destination addresses
tunnel mode
In IPSec, an encryption method in which the entire IP packet is encrypted and inserted as the payload in another IP packet
single loss expectancy (SLE)
In a cost-benefit analysis, the calculated value associated with the most likely loss from an attack (impact). The SLE is the product of the asset's value and the exposure factor
annualized rate of occurrence (ARO
In a cost-benefit analysis, the expected frequency of an attack, expressed on a per-year basis.
annualized loss expectancy (ALE
In a cost-benefit analysis, the product of the annualized rate of occurrence and single loss expectancy
capabilities table
In a lattice-based access control, the row of attributes associated with a particular subject
agent
In an IDPS, a piece of software that resides on a system and reports back to a management server. Also referred to as a senso
firewall
In information security, a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network
blueprint
In information security, a framework or security model customized to an organization, including implementation details
framework
In information security, a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including lnfoSec policies, security education and training programs, and technological controls. Also known as a security model.
footprint
In wireless networking, the geographic area in which there is sufficient signal strength to make a network connection
heighten InfoSec awareness
Incorporating InfoSec components into periodic employee performance evaluations can __________.
number of systems and users of those systems
InfoSec measurements collected from production statistics depend greatly on which of the following factors?
COSO
Its major objective is to identify the factors that cause fraudulent financial reporting and to make recommendations to reduce its incidence
security event information management (SEIM) systems
Log management systems specifically tasked to collect log data from a number of servers or other network devices for the purpose of interpreting. filtering, correlating. analyzing. storing, and reporting the data
the repeatability of measurement development, customization, collection, and reporting activities
NIST recommends the documentation of performance measurements in a standardized format to ensure ____________.
Unified Threat Management (UTM)
Networking devices categorized by their ability to perform the work of multiple devices, such as a stateful packet inspection firewall, network intrusion detection and prevention system, content fi lter, spam fi lter, and malware scanner and filter
SP 800- 12, Rev. 1: An Introduction to Information Security (2017)
Newly revised after over 2.0 years, this document serves as a starting point for those with little to no background in InfoSec
Which alternative risk management methodology s the process promoted by the Computer Emergency Response Team (CERT) Coordination Center and has three variations for different organizational needs including one known as ALLEGRO
OCTAVE
True
One of the critical tasks in the measurement process is to assess and quantify what will be measured and how it is measured. __________
effective security
One of the fundamental challenges in InfoSec performance measurement is defining what?
True
One question you should ask when choosing among recommended practices is "Can your organization afford to implement the recommended practice?"
personally identifiable information (PII)
Organizations are required by privacy laws to protect sensitive or personal employee information, including __________.
Measurements must be useful for tracking non-compliance by internal personnel.
Organizations must consider all but which of the following during development and implementation of an InfoSec measurement program?
False
Performance measurements are seldom required in today's regulated InfoSec environment.
Benchmarking doesn't help in determining the desired outcome of the security process.
Problems with benchmarking include all but which of the following?
Transformation procedure (TP)
Procedure that only allows changes to a constrained data item
Integrity verification procedure (IVP}
Procedure that scans data and confirms its integrity
Kerberos ticket granting service (TGS
Provides tickets to clients who request services
digital certificates
Public key container files that allow PKI system components and end users to validate a public key and identify its owner
True
Recommended or best practices are those security efforts that seek to provide a superior level of performance in the protection of information. __________
Mitigation Risk Treatment
Reducing the impact to information assets should an attacker successfully exploit a vulnerability
Corrective
Remedies a circumstance or mitigates damage done during an incident
Termination Risk Treatment
Removing or discontinuing the information asset from the organization's operating environment
Compensating Controls
Resolves shortcomings, such as requiring the use of encryption for transmission of classified data over unsecured networks
Recovery Controls
Restores operating conditions back to normal; for example, data backup and recovery software
Which of the following is NOT a consideration when selecting recommended best practices? Threat environment is similar Resource expenditures are practical Organization structure is similar Same certification and accreditation agency or standard
Same certification and accreditation agency or standard
best security practices (BSPs)
Security efforts that are considered among the best in the industry
recommended practices
Security efforts that seek to provide a superior level of performance in the protection of information
Transference Risk Treatment
Shifting risks to other areas or to outside entities
False
Standardization is an attempt to improve information security practices by comparing an organization's efforts against those of a similar organization or an industry-developed standard to produce results it would like to duplicate. __________
What determines whether the organization already has or can acquire the technology necessary to implement and support the proposed treatment
Technical Feasibility
True
Temporary workers—often called temps—may not be subject to the contractual obligations or general policies that govern other employees.
structured walk-through
The CP testing strategy in which all involved individuals walk through a site and discuss the steps they would take during an actual CP event
full-interruption testing
The CP testing strategy in which all team members follow each IR/DR/BC procedure, including those for interruption of service, restoration of data from backups, and notification of appropriate individuals
desk check
The CP testing strategy in which copies of the appropriate plans are distributed to all individuals who will be assigned roles during an actual incident or disaster; each individual reviews the plan and validates its components
simulation
The CP testing strategy in which the organization conducts a role-playing exercise as if an actual incident or disaster had occurred
rejection of the certification application based on lack of compliance or failure to remediate shortfalls
The ISO certification process takes approximately six to eight weeks and involves all of the following steps EXCEPT:
identification and definition of the current InfoSec program
The InfoSec measurement development process recommended by NIST is divided into two major activities. Which of the following is one of them?
business resumption planning (BRP)
The actions taken by senior management to develop and implement a combined DR and BC policy, plan, and set of recovery teams
business continuity planning (BCP)
The actions taken by senior management to develop and implement the BC policy, plan, and continuity teams
crisis management planning (CMP)
The actions taken by senior management to develop and implement the CM policy, plan, and response teams.
disaster recovery planning (DRP)
The actions taken by senior management to develop and implement the DR policy, plan, and recovery teams
incident response planning (IRP)
The actions taken by senior management to develop and implement the IR policy, plan, and computer security incident response team
contingency planning (CP}
The actions taken by senior management to specify the organization's efforts and actions if an adverse event becomes an incident or disaster
due diligence
The actions that demonstrate that an organization has made a valid effort to protect others and that the implemented standards continue to provide the required level of protection.
work recovery time (WRT)
The amount of effort (expressed as elapsed time) needed to make business functions work again after the technology element is recovered
remote journaling
The backup of data to an off-site facility in close to real time based on transactions as they occur
reduced employee turnover due to misinterpreted security policies and practices
The benefits of ISO certification to an organization's employees include all of the following EXCEPT:
increased opportunities for government contracts
The benefits of ISO certification to organizations include all of the following EXCEPT:
False
The biggest barrier to baselining in InfoSec is the fact that many organizations do not share information about their attacks with other organizations. __________
• SP 800-53A, Rev. 4 (Rev. 5 currently in draft): Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans (2014)
The companion guide to SP 800-53, Rev. 4 and the functional successor to SP 800-26: Security Self-Assessment Guide for Information Technology Systems, this SP provides a systems development life cycle (SDLC) approach to security assessment of information systems.
vulnerability assessment and remediation domain
The component of the maintenance model focused on identifying specific, documented vulnerabilities and remediating them in a timely fashion
external monitoring domain
The component of the maintenance model that focuses on evaluating external threats to the organization's information assets
planning and risk assessment domain
The component of the maintenance model that focuses on identifying and planning ongoing information security activities and identifying and managing risks introduced through IT information security projects
internal monitoring domain
The component of the maintenance model that focuses on identifying. assessing. and managing the configuration and status of information assets in an organization.
least privilege
The data access principle that ensures no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary
performance measurements
The data or the trends in data that may indicate the effectiveness of security countermeasures or controls—technical and managerial—implemented in the organization.
revision date
The date associated with a particular version or build
virtual password
The derivative of a passphrase
business continuity plan (BC plan)
The documented product of business continuity planning; a plan that shows the organization's intended efforts to continue critical functions when operations at the primary site are not feasible
crisis management plan (CM plan)
The documented product of crisis management planning; a plan that shows the organization's intended efforts to protect its personnel and respond to safety threats
disaster recovery plan (DR plan)
The documented product of disaster recovery planning; a plan that shows the organization's intended efforts in the event of a disaster
incident response plan (IR plan)
The documented product of incident response planning; a plan that shows the organization's intended efforts in the event of an incident
cryptology
The field of science that encompasses cryptography and cryptanalysis.
cost avoidance
The financial savings from using the defense risk treatment strategy to implement a control and eliminate the financial ramifications of an incident
intrusion detection and prevention system (IDPS}
The general term for a system with the capability both to detect and modify its configuration and environment to prevent intrusions
contingency planning management team (CPMT}
The group of senior managers and project members organized to conduct and lead all CP efforts
Diffie-Hellman key exchange method
The hybrid cryptosystem that pioneered the technology
incident detection
The identification and classification of an adverse event as an incident, accompanied by the CSIRT's notification and the implementation of the IR reaction phase.
crisis management planning team (CMPT}
The individuals from various functional areas of the organization assigned to develop and implement the CM plan
separation of duties
The information security principle that requires significant tasks to be split up so that more than one individual is required to complete them
standard of due care
The legal standard that requires an organization and its employees to act as a "reasonable and prudent" individual or organization would under similar circumstances
recovery time objective (RTO)
The maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources, supported business processes, and the MTD
two-person control
The organization of a task or process such that it requires at least two individuals to work together to complete. Also known as dual contro
apprehend and prosecute
The organizational CP philosophy that focuses on an attacker's identification and prosecution, the defense of information assets, and preventing recurrence
protect and forget
The organizational CP philosophy that focuses on the defense of information assets and preventing recurrence rather than the attacker's identification and prosecution.
footprinting
The organized research and investigation of Internet addresses owned or controlled by a target organization
recovery point objective (RPO)
The point in time before a disruption or system outage to which business process data can be recovered after an outage, given the most recent backup copy of the data
business continuity policy (BC policy)
The policy document that guides the development and implementation of BC plans and the formulation and performance of BC teams
crisis management policy (CM policy)
The policy document that guides the development and implementation of CM plans and the formulation and performance of CM teams
disaster recovery policy (DR policy)
The policy document that guides the development and implementation of DR plans and the formulation and performance of DR teams
incident response policy (IR policy)
The policy document that guides the development and implementation of IR plans and the formulation and performance of IR teams
IP Security (IPSec)
The primary and now dominant cryptographic authentication and encryption product of the IETF's IP Protocol Security Working Group. A framewo rk for security development within the TCP/IP family of protocol standards, IPSec provides application support for all uses within TCP/IP, including VPNs
need-to-know
The principle of limiting users' access privileges to only the specific information required to perform their assigned tasks
asset valuation
The process of assigning financial value or worth to each information asset
baselining
The process of conducting a baseline
disaster classification
The process of examining an adverse event or incident and determining whether it constitutes an actual disaster
incident classification
The process of examining an adverse event or incident candidate and determining whether it constitutes an actual incident
vulnerability assessment (VA
The process of identifying and documenting specific and provable flaws in the organization's information asset environment
cryptography
The process of making and using codes to secure information
cryptanalysis
The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption
non repudiation
The process of reversing public key encryption to verify that a message was sent by a specific sender and thus cannot be refuted
remediation
The processes of removing or repairing flaws in information assets that cause a vulnerability or removing the risk associated with the vulnerability
false reject rate
The rate at which authentic users are denied or prevented access to authorized areas as a result of a failure in the biometric device
false accept rate
The rate at which fraudulent users or non users are allowed access to systems or areas as a result of a failure in the biometric device. This failure is also known as a Type II error or a false positive
version
The recorded state of a particular revision of a software or hardware configuration item
task rotation
The requirement that all critical tasks can be performed by multiple individuals.
job rotation
The requirement that every employee be able to perform the work of at least one other employee
job rotation
The requirement that every employee be able to perform the work of at least one other employee.
auditing
The review of a system's use to determine if misuse or malfeasance has occurred
access control
The selective method by which systems specify who may use a particular resource and how they may use it
trusted network
The system of networks inside the organization that contains its information assets and is under the organization's control
untrusted network
The system of networks outside the organization over which it has no control
fingerprinting
The systematic survey of a targeted organization's Internet addresses collected during the footprinting phase to identify the network services offered by the hosts in that range
business continuity planning team (BCPT}
The team responsible for designing and managing the BC plan of relocating the organization and establishing primary operations at an alternate site until the disaster recovery planning team can recover the primary site or establish a new location
disaster recovery planning team (DRPT}
The team responsible for designing and managing the DR plan by specifying the organization's preparation, response, and recovery from disasters, including reestablishment of business operations at the primary site after the disaster
incident response planning team (IRPT}
The team responsible for designing and managing the IR plan by specifying the organization's preparation, reaction, and recovery from incidents
maximum tolerable downtime (MTD
The total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption
hybrid encryption system
The use of asymmetric encryption to exchange symmetric keys so that two (or more) organizations can conduct quick, efficient, secure communications based on symmetric encryption
war driving
The use of mobile scanning techniques to identify open wireless access points
biometrics
The use of physiological characteristics to provide authentication for a provided identification.
SP 800-184: Guide for Cybersecurity Event Recovery (2016)
This SP extends the roles and responsibilities of those involved in incident response to include a tactical-to-strategic approach on the latter stages of IR- recovery and program improvement, involving management in the performance measures and continuous improvement administration of the IR program
SP 800-61, Rev. 2: Computer Security Incident Handling Guide (2012)
This SP provides a methodology and specific measures for responding to computer incidents. This SP also provides guidance on the development of policy and plans for designing and implementing an incident response (IR) program
SP 800-39: Managing Information Security Risk: Organization, Mission, and Information System View (2011)
This SP provides additional discussion on the higher-level functions associated with risk management,
SP 800-53, Rev. 4: Security and Privacy Controls in Federal Information Systems and Organizations (2013)
This SP provides detailed information on the NIST family of security controls andThis SP also discusses the use of controls as part of planned baselines of varying rigor (low, moderate, and high security
SP 800-55, Rev. 1: Performance Measurement Guide for Information Security (2008)
This SP provides guidance on the development and implementation of a performance measurement program, including the selection of key performance measures related to information security, to support an organization's continuous improvement program
• SP 800-100: Information Security Handbook: A Guide for Managers (2007)
This SP serves as the managerial tutorial equivalent of SP 800-12, providing overviews of the roles and responsibilities of a security manager in the development, administration, and improvement of a security program
SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Syst ems (1996)
This document describes recommended practices and provides information on commonly accepted InfoSec principles that can direct the security team in the development of a security blueprint. It also describes the philosophical principles that the security team should integrate into the entire InfoSec process
SP 800-34, Rev. 1: Contingency Planning Guide for Federal Information Systems (2010)
This guide defines the seven-stage methodology for responding to an event requiring disaster recovery operations. The guide also provides an overview of business continuity strategies and methods.
SP 800-30, Rev. 1: Guide for Conducting Risk Assessments
This guide provides a foundation for the development of an effective risk management program, and it contains both the definitions and the practical guidance necessary for assessing and mitigating risks identified within IT systems
• SP 800-18, Rev. 1: Guide for Developing Security Plans for Fede ral Information Systems (2006)
This guide provides detailed methods for assessing, designing, and implementing controls and plans for applications of various sizes. It serves as a guide for the security planning activities described later and for the overall InfoSec planning process
port scanners
Tools used both by attackers and defenders to identify or fingerprint active computers on a network, the active ports and services on those computers, the functions and roles of the machines, and other useful information
False
Two-person control is the requirement that all critical tasks can be performed by multiple individuals. _________
covert channels
Unauthorized or unintended methods of communica tions hidden inside a computer system
Acceptance Risk Treatment
Understanding the consequences of choosing to leave an information asset's vulnerability facing the current level of risk, but only after a formal evaluation and intentional acknowledgment of this decision
False
Using a practice called baselining, you are able to compare your organization's efforts to those of other organizations you feel are similar in size, structure, or industry.
due care and due diligence
What do you call the legal requirements that an organization must adopt a standard based on what a prudent organization should do, and then maintain that standard?
background check
When hiring security personnel, which of the following should be conducted before the organization extends an offer to any candidate, regardless of job level?
Which of the following is NOT a valid rule of thumb on risk treatment strategy selection?
When the attacker's potential gain is less that the cost of attack: Apply protections to decrease the atteacjers cost or reduce the attacker's gain, by using technical or operation controls
What is not a rul of thumb for selecting a risk treatment strategy
When the likelihood of an attack is high and the impact is great - outsource security efforts so that any resulting loss is fiscally someone else's responsibility
political activism
Which of the following is NOT a common type of background check that may be performed on a potential employee?
same certification and accreditation agency or standard
Which of the following is NOT a consideration when selecting recommended best practices?
high level of employee buy-in
Which of the following is NOT a factor critical to the success of an information security performance program?
Identify relevant stakeholders and their interests in InfoSec measurement.
Which of the following is NOT a phase in the NIST InfoSec performance measures development process?
What affect will measurement collection have on efficiency?
Which of the following is NOT a question a CISO should be prepared to answer before beginning the process of designing, collecting, and using performance measurements, according to Kovacich?
Are the user accounts of former employees immediately removed on termination?
Which of the following is NOT a question to be used as a self-assessment for recommended security practices in the category of people?
former employee's home computer must be audited
Which of the following is NOT a task that must be performed if an employee is terminated?
those that evaluate the frequency with which employees access internal security documents
Which of the following is NOT one of the types of InfoSec performance measures used by organizations?
legal liability
Which of the following is a possible result of failure to establish and maintain standards of due care and due diligence?
separation of duties
Which of the following policies makes it difficult for an individual to violate InfoSec and is quite useful in monitoring financial affairs?
job rotation
Which of the following policies requires that every employee be able to perform the work of at least one other staff member?
two-person control
Which of the following policies requires that two individuals review and approve each other's work before the task is considered complete?
performance management
Which of the following terms is described as the process of designing, implementing, and managing the use of the collected data elements to determine the effectiveness of the overall security program?
reference monitor
Within TCB, a conceptual piece of the system that manages access controls- in other words, it mediates all access to objects by subjects
temporary workers
Workers brought in by organizations to fill positions for a short time or to supplement the existing workforce.
contract employees
Workers hired to perform specific services for the organization.
contract employees
Workers typically hired to perform specific services for the organization and hired via a third-party organization are known as __________.
The Information Security Governance Framework
a managerial model provided by an industry working group, National Cyber Security Partnership
Content-dependent access controls-
access to a specific set of information may be dependent on its content
Temporal (time-based) isolation
access to information is limited by a time-of-day constraint
Treating risk begins with which of the following
an understanding of risk treatment strategies
Temporary worker
are brought in by organizations to fill positions temporarily or to supplement the existing workforce
Contract employee
are typically hired to perform specific services for the organization
Which of the following is not a step in the FAIR risk management framework? identify scenario components, evaluate loss event frequency, assess control impact, derive and articulate risk?
asses control impact
The process of assigning financial value or worth to each information asset is known as ________
asset valuation
Formula for SLE
asset value (AV) x exposure factor {EF)
Creating a blueprint by looking at the paths taken by organizations similar to the one whose plan too are developing is known as which of the following
benchmarking
Benchmarking
comparison of organizational effectiveness, efficiency, and productivity against an established measure
Since even the implementation of new technologies does not necessarily guarantee an organization can gain or maintain a competitive lead, the concept of _________ has emerged as organizations strive not to all behind technologically
competitive disadvantage
Best Business Practices
considered those thought to be among the best in the industry, balancing the need to access information w ith adequate protection
Also known as an economic feasibility study, the formal assessment and presentation of the economic expenditures needed for a particular security control, contrasted with its projected value to the organization is known as _________
cos-benefit analysis (CBA)
The financial savings from using the defense risk treatment strategy to implement a control and eliminate the finicaial ramifications of an incident is known as __________
cost avoidance
Each of the following is an item that affects the cost of a particular risk treatment strategy EXCEPT: cost of maintenance, cost of development, cost of implementation, cost of IT operations
cost of IT operations
What is the result of subtracting the post-control annualized loss expectancy and the annualized cost of the safeguard from the pre-control annualized loss expectancy
cost-benefit analysis
COBIT
created by the Information Systems Audit and Control Association {ISACA) and the IT Governance Institute (!TGI) in 1992
Application of training and education among the other approach elements is a common method of which risk treatment strategy
defense
Constrained user interfaces
designed specifically to restrict what information an individual user can access
The only use of teh acceptance strategy that is recognized as valid industry practices occurs when teh organization has done all but which of the following
determined that the cost to control the risk to an information asset are much lower than the benefit gained from the information asset
Strategies to reestablish operations at the primary site after an adverse event threatens continuity of business operations are covered by which of the following plans in the mitigation control approach
disaster recovery plan
The Microsoft Risk Management Approach includes four phases which of the following is NOT one of them? conducting decision support, implementing controls, evaluating alternative strategies, measuring program effectiveness
evaluating alternative strategies
The gold standard
for those ambitious organizations in which the best business practices are not sufficien
Each of the following is a recommendations from the FDIC when creating a successful SLA EXCEPT: determine objectives, forecasting costs, defining requirements, setting measurements
forecasting costs
NIST's Risk Management Framework follows a three-tiered approach with most organizations working from the top down, focusing first on aspects that affect the entire organizations, such as _________
governance
ISO 27000
includes a standard for the performance of risk management
The NIST risk management approach includes all but which of the following elements? inform, assess, frame, respond
inform
Internal Benchmarking
involves comparing measured past performance (the baseline) against actual performance for the assessed category
The Information Technology Infrastructure Library (ITIL)
is a collection of methods and practices for managing the development and operation of IT infrastructures
The Delphi Technique
is a process whereby a group rates or ranks a set of information. The individual responses are compiled and then returned to the group for another iteration. This process continues until the entire group is satisfied with the result.
The OCTAVE Method
is an InfoSec risk evaluation methodology that allows organizations to balance the protection of critical information assets against the costs of providing protective and detection controls
What affects the cost of a control? liability insurance, CBA report, asset resale, or maintenance?
maintenance
Which of the following risk treatment strategies describes an organizations efforts to reduce damage caused by a realization incident or disaster
mitigation
Once a control strategy has been selected and implemented, controls should be ____ on an ongoing basis to determine their effectiveness and to estimate the remaining risk.
monitored and measured
What determines how well a proposed treatment will address user acceptance and support, management acceptance and support and the systems compatibility with the requirements of the organizations stakeholders
operational feasibility
What determine how well the proposed InfoSec treatment alternative will contribute to the efficiency, effectiveness, and overall operation of an organization
organizational feasibility
External Benchmarking
process of seeking out and studying the practices used in other organizations that produce the results you desire in your organization
what does FAIR rely on to build the risk management framework that is unlike many other risk management frameworks
qualitative assessments of many risk components
When the vulnerabilities have been controlled to the degree possible, there is often remaining risk that has not been completely removed, what is this called?
residual risk
Which of the following can be described as the quantity and nature that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility
risk appetite
The ISO 27005 Standards for Inforamtion Security Risk Management includes all but which of the following stages: risk assessment risk treatment, risk communication, risk determination
risk determination
Which of the following is NOT an alternative to using CBA to justify risk controls
selective risk avoidance
By multiplying the asset value by the exposure factor, you calculate which of the following
single loss expectancy
External consistency
the data in the system is consistent with similar data in the outside world
Exposure Factor
the percentage loss that would occur from a given vulnerability being exploited
Internal consistency
the system does what it is expected to do every time, without exception
Benefit
the value to the organization of using controls to prevent losses associated with a specific vulnerability
SP 800-37, Rev. 1: Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach (2010)
this document continues the NIST RMF program and provides additional guidance on the use of the NIST Risk Management Framework
Which risk treatment strategies describes an organization's attempt to shift risk to other assets, other processes, or other organizations
transference
Which of the following is NOT one of the methods noted for selecting the best risk management model?
use the methodology most similar to what is currently in use
Government recommendations and best practices
useful for organizations that operate in industries regulated by governmental agencies
Each of the following is a commonly used quantitative approach used for asset valuation EXCEPT: value to owners, value to competitors, value retained from past maintenance, value to adversaries
value to competitors
Clark-Wilson Integrity Model
which is built upon principles of change control rather than integrity levels, was designed for the commercial environment
The goal of InfoSec is not to bring residual risk __________; rather is is to bring residual risk in line with an organizations risk appetite
zero
False
A standard of due process is a legal standard that requires an organization and its employees to act as a "reasonable and prudent" individual or organization would under similar circumstances. __________