CSC 1: Inventory and Control of Enterprise Assets
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is an Information System according to ISO/IEC 27000:2018?

  • A set of networks and devices
  • A set of applications, services, information technology assets or other information-handling components (correct)
  • A set of people and procedures
  • A set of software and hardware
  • What is involved in developing and operating an Information System?

  • Methods and procedures, data, technology (software/hardware), and people (correct)
  • Only technology (software/hardware)
  • Only data
  • Only methods and procedures
  • What is a fundamental question in managing information security?

  • How do we know that we are secure? (correct)
  • What is ISO/IEC 27000:2018?
  • How do we manage information security?
  • What is an Information System?
  • What is a critical component of an Information System?

    <p>People</p> Signup and view all the answers

    What is the primary goal of software whitelisting?

    <p>To actively manage all software on the network</p> Signup and view all the answers

    What is necessary to ensure an Information System is secure and stays secure?

    <p>Managing information security</p> Signup and view all the answers

    What is essential for maintaining the security of an Information System?

    <p>All of the above</p> Signup and view all the answers

    Which of the following is a potential risk associated with employees installing software from third parties?

    <p>Malware infection</p> Signup and view all the answers

    What is the purpose of deploying a software inventory tool?

    <p>To track operating system and application installations</p> Signup and view all the answers

    What is a critical aspect of Network Infrastructure Security?

    <p>Implementing Firewalls</p> Signup and view all the answers

    What is a potential attack vector mentioned in the text?

    <p>Vulnerability scanning</p> Signup and view all the answers

    What is essential for ensuring the security of an Information System?

    <p>All of the above</p> Signup and view all the answers

    What is the purpose of creating a whitelist of authorized software?

    <p>To prevent unauthorized software installation</p> Signup and view all the answers

    What is the potential consequence of not implementing software whitelisting?

    <p>Unmanaged software installation and execution</p> Signup and view all the answers

    What is the primary objective of the analytics system mentioned in the text?

    <p>To generate alerts and reports</p> Signup and view all the answers

    What is the role of Enforce!Access in the context of software whitelisting?

    <p>To enforce access control policies</p> Signup and view all the answers

    What is the primary goal of actively managing hardware devices on a network?

    <p>To ensure only authorized devices have access to the network</p> Signup and view all the answers

    What is the main reason why attackers continuously scan address spaces for new systems?

    <p>To exploit unprotected systems for malicious activities</p> Signup and view all the answers

    What is the purpose of a Public Key Infrastructure (PKI) in network security?

    <p>To provide authentication for network devices</p> Signup and view all the answers

    What is the function of an Analytics System in network security?

    <p>To monitor and analyze network traffic for security threats</p> Signup and view all the answers

    What is the purpose of passive device discovery in network security?

    <p>To identify and manage assets on the network</p> Signup and view all the answers

    What is the main benefit of using 802.1x authentication in network security?

    <p>It ensures that only authorized devices have access to the network</p> Signup and view all the answers

    What is the primary purpose of an Asset Inventory in network security?

    <p>To manage and track devices on the network</p> Signup and view all the answers

    What is the main risk associated with unauthorized devices on a network?

    <p>All of the above</p> Signup and view all the answers

    Study Notes

    Inventory and Control of Enterprise Assets

    • Goal: Actively manage all hardware devices on the network to ensure only authorized devices have access, and unauthorized devices are found and prevented from accessing the network.
    • Rationale: Attackers continuously scan address spaces for new systems that might be unprotected.
    • Components involved:
      • Asset Inventory Database
      • Network Level Authentication (NLA)
      • Public Key Infrastructure (PKI)
      • 802.1x
      • Passive Device Discovery
      • Active Device Discovery
      • Analytics System (Alerting/Reporting)

    Information System

    • Definition: A set of applications, services, information technology assets, or other information-handling components.
    • Includes:
      • Methods and procedures
      • Data
      • Technology (software/hardware)
      • People

    Fundamental Questions

    • How do we manage information security to ensure an information system (or an entire organization) is secure and stays secure?
    • How do we know that we are secure?

    Software Whitelisting

    • Goal: Actively manage all software on the network to ensure only authorized software is installed and can execute, and unauthorized software is found and prevented from installation/execution.
    • Rationale: Attackers continuously try to find vulnerable software versions, and employees install/run software from third parties that might cause problems.
    • Implementation:
      • Devise a white-list of authorized software and versions required in the enterprise.
      • Deploy a software inventory tool to track the operating system and applications installed on each asset.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the concepts and principles of inventory and control of enterprise assets in the context of Computer Systems and Communications.

    More Like This

    Use Quizgecko on...
    Browser
    Browser