Review Questions

advertisement
Chapter 11
Review Questions
1. A(n) _____ is a weakness that allows a threat agent to circumvent security.
a. vulnerability
b. exploit
c. risk
d. mitigation
2. The _____ defines the overall process involved with developing a security policy.
a. security policy cycle
b. risk identification cycle
c. monitoring scope
d. evaluation cycle
3. Each of the following is a step of risk identification except _________________.
a. Inventory the assets
b. Decide what to do about the risks
c. Determine what threats exist against the assets
d. Write the security policy
4. Each of the following is an asset except _________________.
a. data
b. wireless access point
c. antivirus software
d. loans
5. Each of the following is an attribute that should be compiled for a wireless access
point when performing an asset identification except _________________.
a. the name of the equipment
b. the manufacturer’s serial number
c. the MAC and IP address
d. the number of wireless devices that associate with it
6. A tool that is used in threat modeling is a threat tree. True or false?
7. A vulnerability appraisal is the first step of compliance monitoring and
evaluation. True or false?
8. It is possible to eliminate the risk for all assets. True or false?
9. A guideline is a document that outlines specific requirements or rules that must be
met. True or false?
10. Two elements that must be balanced in an information security policy are trust
and control. True or false?
11. _____ means that one person’s work serves as a complimentary check on another
person’s. Separation of duties
12. A(n) _____ defines what actions the users of a system may perform while using
the computing and networking equipment. acceptable use policy (AUP)
13. An information security policy should clearly outline that all information is
provided on a strictly _____ basis. need-to-know
14. A(n) _____ is policy that governs how an employee can use a hotspot. public
access WLAN use policy
15. _____ is defined as the obligations that are imposed on owners and operators of
assets to exercise reasonable care of the asset and take necessary precautions to
protect it. Due care
16. Explain the difference between a policy, a standard, and a guideline.
A policy is the correct means by which an organization can establish for wireless
security. Unlike a policy, a standard is a collection of requirements specific to the
system or procedure that must be met by everyone. For example, a standard may
describe how to a wireless user must configure her wireless network adapter
interface card to connect to the network. Users must follow this standard exactly if
they want to be able to connect. On the other extreme, a guideline is a collection of
suggestions that should be implemented. These are not requirements to be met but
are strongly recommended.
17. What is a public access WLAN use policy and why is it important?
Because of the proliferation of public access wireless hotspots in coffee shops and
restaurants, airports, hotels, convention centers, business travelers frequently make
use of these facilities to check e-mail or communicate with customers and vendors.
However, these facilities rarely have any type of wireless security in place in order
to minimize technical difficulties for users. Many organizations now enforce a
public access WLAN use policy to address accessing public hotspots.
18. What are the actions that an incidence response team (IRT) should take when an
attack occurs.
After an incident is identified, the IRT is immediately convene and assess the
situation. They quickly decide how to contain the incident. If the attack is coming
electronically through the network, it may be necessary to take preventive measures
to limit the spread of the attack, such as temporarily shutting off the wireless LAN.
Other containment actions may include reconfiguring firewalls, updating antivirus
software, or implementing an emergency patch management system. In extreme
cases even the connection to the Internet may be terminated. After the incident is
contained, the next steps are to determine the cause of the attack, assess its damage,
and implement recovery procedures to get the organization back to normal as
quickly as possible. When the incident is over, a review of security is essential to
ensure that a repeat attack is not successful.
19. List and define the three actions an organization may take regarding risk.
There are three options an organization can take with the risks: 1) Accept the risk –
This is accomplished by doing nothing at all but leaving everything as is. 2)
Diminish the risk – To diminish or reduce the risk, additional hardware, software,
or procedures would be implemented; 3) Transfer the risk – This option makes
someone else responsible for the risk.
20. What is threat modeling and how can attack trees to be used?
Determining the threats that could pose a risk to the assets can be a complicated
process. One way to approach this task is a process known as threat modeling.
Threat modeling constructs scenarios of the types of threats that assets can face. The
goal of threat modeling is to better understand who the attackers are, why they
attack, and what types of attacks may occur. A valuable tool used in threat modeling
is the construction of an attack tree. An attack tree provides a visual image of the
attacks that may occur against an asset. Drawn as an inverted tree structure, an
attack tree shows the goal of the attack, the types of attacks that may occur, and the
techniques used in the attacks.
Download