• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back

Disgruntled employee

Assuming of working ideas is in place this group is best capable of stealing sensitive information due to the absence of system auditing.

Trusted paths

Provides controlled and un-intercepted interfaces into privileged user functions. Intended to provide a way to ensure that any communications over that path cannot be intercepted or corrupted.

Ring protection

Can be used to enforce boundary control between kernel functions and end user controls.

Anti-Malware

Used to protect against malicious software.

Maintenance hooks

Coding constructs written by software developers for troubleshooting an impersonation purposes but can be potential back door for malicious software.

An example of fail safe

The doors of the datacenter spring open in the event of a fire. Focuses on failing with a minimum of harm to personnel.

An example of fail secure

Doors of the marketing closets lock in the event of a fire. Focuses on failing in a controlled manner to block access while the system is in an inconsistent state.

RAID

Redundant array of independent disks. A data mirroring technique.

RAID 0

Write files in stripes across multiple disks without the use of parity information. Allows for fast reading and writing to disk because all the disks can be accessed in parallel. Does not provide redundancy and should not be used for systems with high availability requirements. Suitable in scenarios where resilience is not required. For example to store temporary data that will only be required for a short period of time.

RAID 1

Duplicates all disk writes from one disk to another to create two identical drives. Also known as data mirroring. Redundancy is provided at this level when one hard drive fails the other is still available. Is very costly from a drive space perspective because half of the available disk is given to the mirroring and is typically only used between pairs of drives. Commonly used to provide redundancy for system disks where the core operating system files are found.

RAID 2

Theoretical and not used in practice. Data is spread across multiple discs at the bit level using this technique. Redundancy information is computed using a Hammering error correction code, which is the same technique used within hard drive and error-correcting memory modules. Due to the complexity involved with this technique it is not used.

RAID 3&4

Requires three or more drives to implement. Parity information is written to a dedicated disk if one of the data disk fails, then the information on the parity disk may be used to reconstruct the drive. Data is striped across multiple disks at the byte level for RAID 3 and at the block level for RAID 4. 3 is more efficient but 4 is faster.

RAID 5

Requires 3 or more drives. Data and parity information are striped across all drives. Most common for general data storage.

RAID 6

Requires three or more drives to implement and computes two sets of parity information. The dual parity distribution accommodates the failure of two drives. Performance is slightly less than RAID 5. Not as frequently used in commercial environments.

RAID 0+1 and RAID 1+0

Nested RAID levels, combining two different RAID types together to try to get the advantages of both. In RAID 0+1 two different arays of disks are at play. One set stripes all of the data across the available drives and the drives are mirrored to a second set of disks. RAID 1+0 each drive in the first set is mirrored to a matching drive in the second set. When data is striped to one drive, it is immediately striped to another.RAID 1+0 is considered to be superior to RAID 0+1 in all respects, both in terms of speed and redundancy.

Shadowing

Updating records in multiple locations or copying an entire database on to a remote location as a means to ensure the appropriate levels of fault tolerance and redundancy.

Archiving

The storage of data that is not in continual use for historic purposes.

Backup method used when the window is not long enough to backup all of the data and restoration of backup must be as fast as possible.

Differential - full backup is not available as window is not long enough. Banker mental backup only gets files that changed since the last incremental backup. And differential backup or leg its files that changed since the last full backup. To restore from incremental backups the last bowl back of the end all of the incremental backups performed are combined. In contrast, restoring from a differential backup requires only the last full backup and the latest differential.

Is an example of least privilege in physical security

A guard verifying identification cards against a list of authorized visitors.

Background investigations

Provides the best determination of access and suitability of an individual.

Clipping level

Used to ensure the only needed logs are collected.

Difference between security event information system SEIM and log management system

SEIM are useful for log collection, collation, and analysis in real time. Log management is similar but more for historic purposes.

Best way to ensure no data remanence of sensitive information stored on DVD - R

Destruction - optical media such as CDs and DVDs must be physically destroyed to make sure that there is no residual data that can be disclosed.

Problem management

Concerned with tracking that event back to a root cause and addressing the underlying problem

Ensure production systems are backed up

Before applying a software update to production systems it is most important

Computer forensics

The marriage between computer science, information technology, and engineering with law.

Locard's principle of exchange

States that when a crime is committed the perpetrators leave something behind and take something with them, hence the exchange. Works even with a purely digital crime scene.

5 rules of evidence

Must be authentic, be accurate, be complete, be convincing, be admissible.

Incident response phases

Triage


Investigation


Containment


Analysis and tracking


Documentation

Civil law

Emphasizes the abstract concepts of law and is influenced by writings of legal scholars and academics, more so than common law systems.

MOM

Means, opportunity and motive

Various computer forensic guidelines

IOCE- international organization of computer evidence


SWEDGE- scientific Working Group on digital evidence


ACPO- Association of Chief Police Officers

Sub-phases of the incident response triage phase

Detection, identification, notification

Integrity of forensic bit stream image is determined by

Comparing hash totals to the original source

When dealing with digital evidence, the crime scene

Must have the least amount of contamination that is possible.

When outsourcing IT systems

All regulatory and compliance requirements must be passed on to the provider.

With digital evidence, the chain of custody must

Followe formal documented process

An incident response program must

Treat every incident as though it may be a crime

For heavily damaged media

Professional data recovery services are the best chance for recovery

To fully complete of vulnerability assessment it is critical that protection systems are well understood through,

Threat identification, threat definition and facility characterization

Defense in depth

Forming layers of protection around an asset or facility

Successful physical protection systems integrate

People, procedures, and equipment

5 fc

Advised lighting for parking lots or garages for safety considerations in perimeter areas

Acoustic / shock glass break sensors

Most appropriate interior sensor used for a building that has windows along the ground floor. The dual alarm system requires both acoustic and shock sensors to be activated before an alarm is triggered, reducing false alarms.

Three separate functions of CCTV

Surveillance, deterrence, and evidentiary archives

Tamper protection

Best method of protecting the physical devices associated with the alarm system

Direct evidence

Proves or disproves a specific act through oral testimony based on information gathered through the witnesses five senses.

Circumstantial evidence

Evidence that relies on inference to connect it to a conclusion of fact - like fingerprint at the scene of a crime.

Conclusive evidence

Evidence that is either unquestionable because it is so clear and convincing or because the law precludes it's contradiction.

Corroborating evidence

Evidence that tends to support a proposition that is already supported by some initial evidence, therefore confirming the proposition.