問題一覧
1
involves providing members of organization with detailed information enhance on instruction designed to prepare them to perform their duties securely
security training
2
One of least frequently implemented but most beneficial programs
security awareness program
3
high level manager to support promote and endorse findings of project
champion
4
Leeds project and make sure sound project planning process is used
project manager
5
should be managers or their representatives from various communities of interest
team members
6
components of contingency plan
incident response planning, disaster recovery planning, business continuity planning
7
detailed description of activities that occur during an attack
attack profile
8
covers identification of, classification of, and response to an incident
incident response planning
9
more reactive than proactive with the exception of planning that must occur to prepare IR teams to be ready to react to an incident
incident response
10
set of activities taken to plan for, detect, and correct the impact
incident response
11
intrusion detection systems, virus detection, system admin, end users
mechanisms
12
incident recovery
identify and resolve vulnerabilities, address safeguards, evaluate monitoring capabilities, restore data from backups, restore process and services, continuously monitor system, restore confidence
13
provide guidance in the event of a disaster
disaster recovery plan
14
clear establishment of priorities, clear delegation of roles and responsibilities, alert key personnel, document disaster, mitigate impact, evacuation of physical assets
disaster recovery plan
15
outlines re-establishment of critical business operations
business continuity planning
16
three exclusive options in continuity strategies
hot sites, warm sites, cold sites
17
fully configured computer facilities, all services and communication links, physical plant operations
hot sites
18
doesn't include actual applications, application may not be installed in configured, required hours today is to become operational
warm sites
19
rudimentary services and facilities, no hardware or peripherals, empty room
cold sites
20
three shared functions in continuity strategies
time-share, service bureaus, mutual agreements
21
hot, warm, cold, leased with other organizations
time-share
22
provides service for a fee
service bureaus
23
a contract between two or more organizations that specifies how each will assist the other and the event of a disaster
mutual agreements
24
to get sites up and running quickly, organization ability to port data into new site's system
off-site disaster data storage
25
three types of off-site disaster data storage
electronic vaulting, journaling, shadowing
26
transfer of large batches of data, receiving server archives data
electronic vaulting
27
transfer of live transactions to off-site, only transactions are transferred, transfer is real time
journaling
28
duplicated databases, multiple servers, processes duplicated, three or more copy simultaneously
shadowing
29
6 steps in contingency planning process
identifying mission - or business-critical functions, identifying resources that support critical functions, anticipating potential contingencies or disasters, selecting contingency planning strategies, implementing contingency strategies, testing and revising strategy
30
control measure that reduces accidental security breaches
information security education, training, and awareness
31
uses data classification schemes
mandatory access control
32
data classification schemes
each collection of information is rated, may use matrix or authorization
33
non-discretionary controls
role-based, task-based
34
tied to the role a user performs
role-based
35
ties to a set of tasks user performs
task-based
36
all controls rely on:
identification, authentication, authorization, accountability
37
unverified entity
supplicant
38
seek access to a resource by label, mapped to one and only one entity
identification
39
label is called an
identifier
40
something a supplicant knows, has, is
authentication
41
matches supplicant to resource, often uses access control matrix
authorization
42
known as auditability, all actions on a system can be attributed to an authenticated identity, system logs and database journals
accountability
43
prevent information from moving between the outside and inside world
firewalls
44
5 major categories in processing mode
packet filtering, application gateway, circuit gateway, MAC layer, hybrids
45
filtering firewall, examine header information and data packets
packet filtering
46
inspect networks at the network layer
Packet filtering
47
uses a state table
stateful
48
tracks of the state in context of each packet
stateful
49
installed on dedicated computer
application gateway
50
used in conjunction with filtering router
application gateway
51
goes between external request and web page
proxy server
52
between trusted and untrusted network, exposed to risk, can place additional filtering routers behind, restricted to a single application
resides in demilitarized zone
53
operates at transport level
circuit gateway
54
authorization based on addresses
circuit gateway
55
create tunnels between networks
circuit gateway
56
designed to operate at Media Access sublayer
Mac layer firewalls
57
able to consider specific host computer identity in filtering
Mac layer firewalls
58
allows specific types of packets that are acceptable to each host
mac layer firewalls
59
combined elements of other types of firewalls, elements of packet filtering and proxy servers or circuit gateways
hybrid firewalls
60
inconsist of two separate firewall devices, each separate firewall system, but are connected to work in tandem
hybrid firewalls
61
categorization by development generation
first generation, second generation, third generation, fourth generation, fifth generation
62
static packet filtering, simple networking devices, filter packets according to their headers
first generation
63
application level or proxy servers, dedicated systems, provides intermediate services for the requests
second generation
64
stateful, uses state tables
third generation
65
dynamic filtering, particular packet with a particular source, destination
fourth generation
66
Kernel proxy, works in the windows NT executive, evaluates at multiple layers
fifth generation
67
categorized by structure
commercial-grade, small office/home office
68
State-alone, combination of hardware and software
commercial-grade
69
configured application software, runs on general-purpose computer
commercial-grade firewall systems
70
broadband gateways or DSL or cable modem routers
small office/home office
71
firewall architectures
configuration decision, packet filtering routers, screened host firewall, dual homed host, screened subnet firewalls with DMZ, socs servers
72
objectives of the network, organizations ability to develop and implement architecture
configuration decision
73
lacks auditing and strong authentication and can degrade network performance
packet filtering routers
74
combines packet filtering router with dedicated firewall: proxy server, allows router to pre-screen packets
screened host firewall
75
application proxy examines at ______
application layer
76
has two network interface cards
dual homed host
77
dominant architecture used today, provides DMZ
screened subnet firewalls with DMZ
78
protocol for handling TCP traffic through a proxy server
SOCS servers
79
propriety circuit-level proxy server, places special SOCS client-side agents on each workstation
SOCS servers
80
logic based on set of guidelines most commonly referred to as
firewall rules
81
allows administrators to restrict content access from within network
software filter
82
authentication systems
RADIUS and TACACS, Kerberos
83
Access control for dial-up
RADIUS and TACACS
84
metric key encryption to validate, keeps a database containing the private keys
kerberos
85
automatic phone-dialing program that dials every number in a configured range in records number if modern picks up
war dialer
86
similar to Kerberos, user first authenticated to an authentication server and receives a token
secure European system for applications in multiple vendor environment
87
implementation of cryptographic technology, private and secure network connection
VPN
88
data within IP packet is encrypted, but header information is not, allows user to establish secure link directly with remote host, encrypting only data contents of packet
transport mode
89
organization established 2 perimeter tunnel servers
tunnel mode
90
these servers act as _______, encrypting all traffic that will traverse and secured network
encryption points
91
analysis and prioritization-business functions, identify and prioritize functions within organization units
business unit analysis
92
series of scenarios showing impact
attack success scenario development
93
estimate cost of best, worst, probable
potential damage assessment
94
basis for classification as disastrous not disastrous
subordinate plan classification
95
determine the extent of resulting damage
threat attack identification and prioritization