Accounting Information Systems (Chapter 8) Study online at quizlet.com/_2o2yh2 1. Access Control List (ACL) A set of IF-THEN rules used to determine what to do with arriving packets 12. Because it will not be long before an exploit is created Why is it important to take time steps to remediate a vulnerability once it has been identified? 2. Access Control Matrix Authorization controls are often implemented by creating an __________________. 13. 3. Access Control Matrix a table used to implement authorization controls Because it will only allow an attacker to acquire limited rights on the machine Why is it important that the employee use a limited regular user account when browsing the web or reading e-mail? 14. Because preventive controls can never provide 100% protection Why is it necessary to supplement preventive controls with methods for detecting incidents and procedures for taking corrective remedial action? 15. Because some potential responses to security incidents have significant economic consequences Why should the CIRT include not only technical specialists but also senior operations management? 16. Because the incoming connection is not filtered by the main firewall Why do modems create a huge hole in perimeter security? -Anti-malware controls -Network access controls -Devices and software hardening -Encryption What are the 4 components of the "IT solutions" preventive control? -Assess threats and select risk response -Develop and communicate policy -Acquire and implement solutions -Monitor performance What are the 4 steps of the security life cycle? 6. Authentication Verifying the identity of the person or device attempting to access the system 17. Because there are fewer problems to fix as well as lower costs Why does good change control often result in better operating performance? 7. Authorization The process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform 18. Because they must decide the sanctions they are willing to impose for noncompliance Why must senior management participate in developing policies? 8. Availability The system and its information are available to meet operational and contractual obligations 19. Better Good change control often results in ____________ operating performance. 20. Biometric Identifier 9. Because employees may become disgruntled and seek revenge or may be facing financial difficulties Why do organizations need to implement a set of controls designed to protect their information assets from unauthorized use and access by employees? A physical or behavioral characteristic that is used as an authentication credential 21. Border Router A device that connects an organization's information system to the Internet Because examining a pattern of traffic is often the only way to identify undesirable activity What are IPSs important? 22. Buffer Most programs set aside a fixed amount of memory, known as a ___________, to hold user input. 23. Because if no one fails or gets circumvented, another may function as planned Why does the use of overlapping, complementary, and redundant controls increase overall effectiveness? -Buffer overflows -SQL injection -Cross-site scripting What are 3 common attacks against the software running on websites? 4. 5. 10. 11. 24. 25. • Can create problems because of unanticipated side effects • Likely to be multiple patches released each year thus an organization faces the risk of applying hundreds of patches to thousands of machines every year What are 2 problems with patches? Change Control or Change Management The formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability 26. Cloud Computing Using a browser to remotely access software, data storage, hardware, and applications 27. -Compare traffic patterns to a database of signatures of known attacks -Develop a profile of "normal" traffic and using statistical analysis to identify packets that do not fit that profile What are two primary traffic patterns used by IPS to identify undesirable traffic patterns? Compatibility Test Matching the user's authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action 28. 29. Computer Incident Response Team (CIRT) A team that is responsible for dealing with major security incidents 30. -Computer incident response teams (CIRT) -Chief information security officer (CISO) -Patch management What are the most important corrective controls? (3) -Conduct reconnaissance -Attempt social engineering -Scan and map the target -Research -Execute the attack -Cover tracks What are 6 basic steps criminals use to attack an organization's information systems? 31. 32. Confidentiality Sensitive organizational information is protected from unauthorized disclosure 33. Create the position of CISO It is especially important that organizations assign responsibility for information security to someone at an appropriate senior level of management . What is one way to complete the above objective? 34. -Creation of a "securityconscious" culture -Training What are 2 components of the "people" preventive control? 35. Cross-Site Scripting _________________ attacks occur when web application software does not carefully filter user input before returning any of that data to the browser. 36. C (time-based model of security) Time it takes to respond to the attack and take corrective action 37. Deep Packet Inspection A process that examines the data in the body of a TCP packet to control traffic, rather than looking only at the information in the IP and TCP headers 38. Defense-in-Depth Employing multiple layers of controls to avoid a single point-of-failure 39. Demilitarized Zone (DMZ) A separate network located outside the organization's internal information system that permits controlled access from the Internet 40. D (time-based model of security) Time it takes to detect that an attack is in progress 41. Employees can perform only the specific tasks that the system has assigned to them How do business process management systems enforce segregation of duties? 42. Endpoints Can be made more secure by modifying their configurations 43. Ensuring that vulnerability and risk assessments are performed regularly and that security audits are carried out periodically What should the CISO have responsibility for? 44. Exploit A program designed to take advantage of a known vulnerability 45. The failure to "scrub" user input to remove potentially malicious code What is the common theme in buffer overflow, SQL injection, and cross-site scripting? False (much more complex) True/False: The trend towards permitting employees to use their own personal devices at work makes endpoint configuration much easier to manage effectively. 46. 47. 48. 49. 50. 51. Firewall Hardening A special-purpose hardware device or software running a general-purpose computer that controls both inbound and outbound communication between the system behind the firewall and other networks The process of modifying the default configuration of endpoints to eliminate unnecessary settings and services An IDS only produces a warning alert when it detects a suspicious pattern of network traffic where it is then up to a human to decide what course of action to take, while an IPS not only issues an alert but also automatically takes steps to stop a suspected attack What is the main difference between an IDS and an IPS? In identifying where additional protections are most needed to increase the time and effort required to compromise the system Where is the value in penetration testing? Internet Protocol (IP) The __________________ header contains fields that specify the IP address of the sending a receiving devices. 52. An intruder can quickly destroy, compromise, or steal the organization's economic information resources Why must detecting a security breach and initiating corrective remedial actions be timely? 53. Intrusion Detection System (IDS) A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions 54. Intrusion Prevention Software (IPS) Software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks 55. It is hard to derive accurate, reliable measures of the parameters P, D, and C What is one problem with the Time-Based Model of Security? 56. Log Analysis The process of examining logs to identify evidence of possible attacks 57. -Log analysis -Intrusion detection system -Penetration testing -Continuous monitoring What are 4 types of detective controls? 58. Multifactor Authentication The use of two or more types of authentication credentials in conjunction to achieve a greater level of security 59. Multimodal Authentication The use of multiple authentication credentials of the same type to achieve a greater level of security 60. Not only increases security but also strengthens internal control by providing a means for enforcing segregation of duties What is the benefit of internal firewalls? 61. o Logs can quickly grow in size o Many devices produce logs with proprietary formats Why is it difficult to regularly analyze logs to detect problems in a timely manner? (2) 62. One with administrative rights and another that has only limited rights What two accounts should employees who need administrative powers on a particular computer should be assigned? 63. o Something they know (passwords or PINs) o Something they have (smart cards or ID badges) o Some physical or behavioral characteristic (fingerprint ) What are 3 types of credentials that can be used to verify a person's identity? 64. Overflow the Buffer If the program does not carefully check the size of the data being input, an attacker may enter many times the amount of data that was anticipated and ________________. 65. P>D+C According to the Time-Based Model of Security, when are the organization's security procedure effective? 66. Packet Filtering A process that uses various fields in a packet's IP and TCP headers to decide what to do with the packet 67. Patch Code released by software developers that fixes a particular vulnerability 68. Patch Management The process of regularly applying patches and updates to software 69. Penetration Test An authorized attempt to break into the organization's information system 70. People What is the most important preventive control? 71. -People -Processes (user access controls) -IT solutions -Physical security -Change controls and change management What are 5 types of preventive controls? Place all wireless access points in the DMZ What is an important part of securing wireless access? 72. 73. Privacy Personal information about customers, employees, suppliers, or business partners is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure 74. Processing Integrity Data are processed accurately, completely, in a timely manner, an only with proper authorization 75. P (time-based model of security) Time it takes an attacker to break through the organization's preventive controls 76. The reason this happens is that almost every local area network uses the Ethernet protocol, which is designed to transmit information in packets with a maximum size of about 1,440 bytes Why is a file broken up into a series of small pieces that are reassembled upon delivery when being sent? 77. • Recognition that a problem exists • Containment of the problem • Recovery • Follow-up What 4 steps should the CIRT follow to lead the organization's incident response process? 78. Remote Authentication Dial-In User Services (RADIUS) A standard method for verifying the identity of users attempting to connect via dial-in access 79. • Restrict access to authorized users only • Protect information integrity • Provide protection against a variety of attacks What are 3 benefits of information security procedures? 80. Routers Special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send the packet next 81. Security Access (both physical and logical) to the system and its data is controlled and restricted to legitimate users 82. -Security -Confidentiality -Privacy -Processing Integrity -Availability What 5 principles does the Trust Services Framework organize ITrelated controls into? 83. Senior Management Information security professionals possess the expertise to identify potential threats/estimate their likelihood and impact, however, __________________ must choose which of the 4 risk responses is appropriate to adopt so that the resources invested in information security reflect the organization's risk appetite. 84. Since logs are not normally deleted or updated, changes to a log file indicate that the system has likely been compromised Why is it important to analyze changes to logs? 85. Social Engineering Using deception to obtain unauthorized access to information resources 86. Spear Phishing A social engineering attack that involves sending emails purportedly from someone that the victim knows 87. 88. SQL Injection This treats all wireless access as though it were coming in from the Internet and forces all wireless traffic to go through the main firewall and any IPSs that are using to protect the perimeter of the internal network __________________ attacks occur whenever web application software that interfaces with a database service does not filter user input, thereby permitting an attacker to embed SQL commands within a data entry request and have those commands executed on the database server. What is the benefit of placing all wireless access points in the DMZ? 89. Time-Based Model of Security Implementing a combination of preventive, detective, and corrective controls that protect information assets long enough to enable an organization to recognize that an attack is occurring and take steps to thwart it before any information is lost or compromised 90. To ensure that only legitimate users can access the system What is the objective of authentication? 91. To integrate physical or remote access control systems In regards to physical security, what is a promising way to achieve defense-indepth? 92. To learn as much as possible about the target and to identify potential vulnerabilities What is the objective of a criminals initial reconnaissance? 93. To limit actions to specified individuals in accordance with the organization's security policy What is the role of preventive controls in defense-in-depth? 94. Top management must not only communicate the organization's security policies, but must also lead by example How can a security-conscious culture be created within a company? 95. Transmission Control Protocol (TCP) The ______________________ header contains fields that specify the sequential position of that packet in relation to the entire file and port numbers on sending/receiving devices. 96. True True/False: Information security is the foundation of systems reliability and is necessary for achieving each of other four principles. 97. True True/False: an IPS blocks not only known attacks but also any new attacks that violate the standards. 98. Virtualization Running multiple systems simultaneously on one physical computer 99. Vulnerabilities Flaws in programs that can be exploited to either crash the system of take control of it 100. Vulnerability Scanners Automated tools designed to identify whether a given system possesses any unused and unnecessary programs 101. War Dialing Searching for an idle modem by programming a computer to dial thousands of phone lines