Podcast
Questions and Answers
What does the principle of confidentiality ensure?
What does the principle of confidentiality ensure?
- Traceability of an entity's actions
- Verification of content changes during transmission
- Timeliness and reliability of information access
- Protection against unauthorized access and disclosure (correct)
What does integrity in information security primarily protect against?
What does integrity in information security primarily protect against?
- Delayed access to information
- Unauthorized access to data
- Unreliable authentication of messages
- Improper modification or destruction of data (correct)
Which factor describes the incentives or pressures that lead to malicious acts?
Which factor describes the incentives or pressures that lead to malicious acts?
- Motivation (correct)
- Accountability
- Integrity
- Availability
What is the role of nonrepudiation in information security?
What is the role of nonrepudiation in information security?
Which term refers to the ability to trace the actions of an individual entity?
Which term refers to the ability to trace the actions of an individual entity?
What vulnerability can arise from flaws in a system?
What vulnerability can arise from flaws in a system?
What does the principle of availability focus on in information security?
What does the principle of availability focus on in information security?
Which aspect involves a third party's ability to verify message integrity?
Which aspect involves a third party's ability to verify message integrity?
What was the primary goal of the Sarbanes-Oxley Act of 2002?
What was the primary goal of the Sarbanes-Oxley Act of 2002?
Which section of SOX requires management to evaluate the operational effectiveness of Internal Controls over Financial Reporting?
Which section of SOX requires management to evaluate the operational effectiveness of Internal Controls over Financial Reporting?
Who is primarily responsible for the application of risk treatment in achieving business objectives?
Who is primarily responsible for the application of risk treatment in achieving business objectives?
What does Section 404 (b) of SOX require regarding internal controls?
What does Section 404 (b) of SOX require regarding internal controls?
In the context of risk management, what does risk reduction entail?
In the context of risk management, what does risk reduction entail?
Who has the tertiary responsibility for the oversight of compliance with legal and regulatory expectations?
Who has the tertiary responsibility for the oversight of compliance with legal and regulatory expectations?
Which of the following is a common method of risk transfer in project management?
Which of the following is a common method of risk transfer in project management?
What is the secondary responsibility in evaluating risk treatment effectiveness?
What is the secondary responsibility in evaluating risk treatment effectiveness?
What is the primary goal of Enterprise Risk Management?
What is the primary goal of Enterprise Risk Management?
Which of the following best describes 'risk avoidance'?
Which of the following best describes 'risk avoidance'?
Which term refers to flaws in a system that can be exploited?
Which term refers to flaws in a system that can be exploited?
What does 'significant deficiency' indicate in risk treatment?
What does 'significant deficiency' indicate in risk treatment?
What is meant by 'uncertainty' in the context of risk management?
What is meant by 'uncertainty' in the context of risk management?
Who does the Enterprise Risk Management process primarily serve?
Who does the Enterprise Risk Management process primarily serve?
Which of the following is a characteristic of a 'material weakness'?
Which of the following is a characteristic of a 'material weakness'?
What do compensating controls do in risk assessment?
What do compensating controls do in risk assessment?
What is the primary purpose of DNS tunneling?
What is the primary purpose of DNS tunneling?
Which of the following best describes whaling?
Which of the following best describes whaling?
What characterizes a Distributed Denial of Service (DDoS) attack?
What characterizes a Distributed Denial of Service (DDoS) attack?
What is a zero-day exploit?
What is a zero-day exploit?
What is deepfake technology primarily used for?
What is deepfake technology primarily used for?
Which of the following concepts refers to misleading AI/ML systems?
Which of the following concepts refers to misleading AI/ML systems?
What must be done to ensure the safety of buildings regarding fire hazards?
What must be done to ensure the safety of buildings regarding fire hazards?
Where should an emergency evacuation plan be posted?
Where should an emergency evacuation plan be posted?
What is the primary purpose of threat intelligence?
What is the primary purpose of threat intelligence?
What information is typically collected during manual logging of visitors?
What information is typically collected during manual logging of visitors?
What is a key benefit of virtualization?
What is a key benefit of virtualization?
What does Mobile Device Management (MDM) primarily help with?
What does Mobile Device Management (MDM) primarily help with?
What is a major concern with Bring Your Own Device (BYOD) policies?
What is a major concern with Bring Your Own Device (BYOD) policies?
Which of the following best describes cloud computing?
Which of the following best describes cloud computing?
What is a risk associated with signing in visitors at a front reception desk?
What is a risk associated with signing in visitors at a front reception desk?
What is a characteristic of zero-day threats?
What is a characteristic of zero-day threats?
What technique involves a malicious actor posing a false scenario to gain trust?
What technique involves a malicious actor posing a false scenario to gain trust?
Which term refers to the method of accessing a server by hijacking a session through the client's IP address?
Which term refers to the method of accessing a server by hijacking a session through the client's IP address?
What method is characterized by trial-and-error attempts to crack passwords?
What method is characterized by trial-and-error attempts to crack passwords?
What method involves using existing stolen credentials across different applications?
What method involves using existing stolen credentials across different applications?
Flashcards
Risk Transfer
Risk Transfer
A method of managing risk by transferring responsibility for the risk to another party, typically through outsourcing.
Risk Reduction
Risk Reduction
A method of managing risk by reducing the likelihood or impact of the risk, often through outsourcing part of the project.
Risk Sharing
Risk Sharing
A method of managing risk by sharing the risk with another party, often through outsourcing part of the project.
Risk Management
Risk Management
Signup and view all the flashcards
Internal Controls over Financial Reporting (ICFR)
Internal Controls over Financial Reporting (ICFR)
Signup and view all the flashcards
Evaluation of Design and Operating Effectiveness of ICFR
Evaluation of Design and Operating Effectiveness of ICFR
Signup and view all the flashcards
Attestation over Effectiveness of Internal Controls
Attestation over Effectiveness of Internal Controls
Signup and view all the flashcards
Business Process Owners
Business Process Owners
Signup and view all the flashcards
Enterprise Risk Management
Enterprise Risk Management
Signup and view all the flashcards
Risk
Risk
Signup and view all the flashcards
Uncertainty
Uncertainty
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Threat
Threat
Signup and view all the flashcards
Material Weakness
Material Weakness
Signup and view all the flashcards
Significant Deficiency
Significant Deficiency
Signup and view all the flashcards
Deficiency
Deficiency
Signup and view all the flashcards
Attack
Attack
Signup and view all the flashcards
IT Risk
IT Risk
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Motivation
Motivation
Signup and view all the flashcards
Rationalization
Rationalization
Signup and view all the flashcards
Pretexting
Pretexting
Signup and view all the flashcards
Eavesdropping
Eavesdropping
Signup and view all the flashcards
Tailgating/Piggybacking
Tailgating/Piggybacking
Signup and view all the flashcards
Honeytrap
Honeytrap
Signup and view all the flashcards
Quid Pro Quo
Quid Pro Quo
Signup and view all the flashcards
Brute Force Attack
Brute Force Attack
Signup and view all the flashcards
Kerberoasting
Kerberoasting
Signup and view all the flashcards
Man-in-the-Middle
Man-in-the-Middle
Signup and view all the flashcards
Spear Phishing
Spear Phishing
Signup and view all the flashcards
Whaling
Whaling
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS)
Signup and view all the flashcards
Smishing
Smishing
Signup and view all the flashcards
Vishing
Vishing
Signup and view all the flashcards
Zero-day Exploit
Zero-day Exploit
Signup and view all the flashcards
Deepfake
Deepfake
Signup and view all the flashcards
Threat Intelligence
Threat Intelligence
Signup and view all the flashcards
Virtualization
Virtualization
Signup and view all the flashcards
Cloud Computing
Cloud Computing
Signup and view all the flashcards
Manual Logging
Manual Logging
Signup and view all the flashcards
Mobile Device Management (MDM)
Mobile Device Management (MDM)
Signup and view all the flashcards
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Signup and view all the flashcards
Study Notes
Risk Management - AUDCIS US SOX History
- Twenty years ago, financial reporting scandals eroded investor confidence.
- The Sarbanes-Oxley Act (SOX) of 2002 aimed to restore trust.
- SOX 404 primarily focuses on internal controls over financial reporting (ICFR).
Evaluation of Design and Operating Effectiveness
- Section 404(a) mandates annual evaluation of internal controls.
- Management documents control procedures and testing.
- Results publicly reported in Form 10-K.
Attestation Over Effectiveness of Internal Controls
- Section 404(b) requires auditor attestation of ICFR.
Enterprise Risk Management
- Identifying vulnerabilities in achieving business objectives.
- Implementing countermeasures to reduce risk.
- Definition of Risk: Uncertainty of an event affecting objective attainment.
- Uncertainty: Lack of information about impact and timing of an event.
Risk Treatment
- Risk Avoidance: Stopping a project.
- Risk Transfer: Outsourcing a project.
- Risk Reduction: Outsourcing part of a project.
- Risk Sharing: Outsourcing part of a project
Enterprise Risk Management Responsibility
- Business Process Owners: Apply risk treatment to achieve business objectives.
- Internal Audit: Assess risk treatment applied by business process owners.
- Those Charged with Governance: Oversee compliance with legal and regulatory expectations, stakeholder management and resource-provision.
- External Audit: Provide assurance to legislative and regulatory bodies.
Reportorial Requirements
- Material Weakness: Potential for a financial misstatement.
Information Security Principle
- Confidentiality: Restrictions against unauthorized access and disclosure.
- Integrity: Restrictions against improper modification or destruction.
- Availability: Protection against untimely and unreliable access.
Fraud Risk Factors
- Motivation: Incentives and pressures driving perpetrator actions.
- Rationalization: Justification for the perpetrator's actions.
- Opportunity: Methods for the perpetrator to commit fraud, e.g., poor internal controls.
Vulnerabilities, Threats, and Attacks
- Risk: Uncertainty affecting objective achievement.
- Uncertainty: Lack of information about impact and timing.
- Vulnerability: Result of flaws in a system.
- Threat: System flaw that's exploited by malicious action.
- Attack: Intentional malicious action to access, damage, or delay an asset.
- IT Risk: Lack of information impacting and timing an event due to a system flaw.
Example of Vulnerabilities
- Authenticity: Verifying content hasn’t changed in transit
- Nonrepudiation: Verifying origin or receipt of a message
- Accountability: Trackable actions of an entity
- Network Availability: Timely and reliable IT resource access
Perpetrators May Use and Their Controls
- Unauthorized hardware/software.
- Untrusted wireless network.
- Use of unsecured network.
- Untrusted devices.
Types of Attacks
- Malware (malicious software).
- Viruses: Software activated to cause damage.
- Trojans: Viruses hidden in legitimate software.
- Worms: Viruses that replicate on their own.
- Spyware: Secretly collects sensitive data.
- Ransomware: Demands payment to recover data.
Social Engineering
- Exploitation of human behavior to gain physical/security access.
- Tailgating/piggybacking: Tagging along behind employees.
- Eavesdropping: Listening to private communications.
- Shoulder surfing: Physically spying on someone.
- Brute Force: Trial-and-error password cracking.
- Keylogging: Recording every keystroke.
- Credential stuffing: Re-using stolen credentials.
- Kerberoasting: Brute force attack on authentication systems.
- Downgrading: Forcing into less secure environments.
- Phishing: Enticing victims to share info.
- Spear phishing: Targeted phishing attacks.
- WHaling: Attacking top-level executives.
- Smishing: Phishing via text messages.
- Vishing: Phishing via phone calls.
- Spoofing: Disguising as a trusted source.
- Honeytrap: Luring victims into traps.
- Domain spoofing: Disguises use of a known organization's email.
- ARP spoofing: Disguising use of a known organization protocol.
- Pretexting: False scenarios to gain trust.
- Quid pro quo: Exchanging services for sensitive data
- Man-in-the-middle: Altering communications between parties.
- Session hijacking: Changing IP address to access a server.
- Pass-the-Hash: Using stolen info.
- DNS tunneling: Using DNS to bypass firewalls.
- Denial-of-service (DoS): Flooding networks with malicious requests.
- Distributed denial-of-service (DDoS): Using multiple compromised computers to launch attacks.
- Zero-day exploits: Exploiting vulnerabilities before patches.
- Deepfakes: Al-generated forgeries to cause damage to reputation and sway political landscapes.
- Adversarial AI/ML: Exploiting AI/ML models by introducing inaccuracies.
Physical and Environmental Controls
- Information asset protections (physical).
- Fire and Humidity hazards.
- Disaster recovery plan.
- Recovery time objectives (RTO).
- Recovery point objective (RPO).
- Emergency evacuation plan.
- Fire suppression system.
Virtualization
- Virtualization (on-prem server): Increase efficiency by allowing multiple OSs to coexist on one hardware.
- Cloud Computing (third-party or backup server): On-demand access to computing resources.
Emerging Technologies
- Private Branch Exchange (PBX).
- Peer-to-Peer.
- Voice over Internet Protocol (VoIP).
- Wireless networks.
- Instant messaging (IM).
- Digital signatures.
- Mobile (Edge) Computing.
- Bring your own device (BYOD).
- Internet of Things (IoT).
- Cloud Computing (sharing computing resources).
Cloud Models
- Private Cloud: Solely for one organization.
- Community Cloud: Shared by several organizations.
- Public Cloud: Available to the general public.
- Hybrid Cloud: Composition of two or more clouds for data portability.
IT Forensics
- Process of identifying, preserving, analyzing, and reporting digital evidence.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.