1_6_2 Section 1 – Attacks, Threats, and Vulnerabilities - 1.6 – Vulnerabilities - Third-party Risks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Why is it important to have security measures in place for third-party access to your systems?

  • Because third parties are never trustworthy
  • Because third parties are only contractually obligated to follow security protocols
  • Because third parties have access to your systems, but not your data
  • Because third parties can make errors, and you should plan for the worst-case scenario (correct)

What is a common reason for system integrators to have additional access to systems?

  • To perform their job functions (correct)
  • To access sensitive data
  • To install malware
  • To test system security

What is a possible way a third party may have access to your data?

  • Only through physical access
  • Only through virtual access
  • Neither virtual nor physical access
  • Through both virtual and physical access (correct)

What should you plan for when it comes to third-party access to your systems?

<p>The worst-case scenario (A)</p> Signup and view all the answers

Why is it necessary to have security policies and procedures in place for third-party access?

<p>To mitigate potential security risks (C)</p> Signup and view all the answers

What type of security is important to consider when it comes to third-party access?

<p>Both physical and technology security (C)</p> Signup and view all the answers

Where should production services be located?

<p>On a separate, isolated part of the network (C)</p> Signup and view all the answers

What should be done after the code is completed?

<p>Check the code for any vulnerabilities (D)</p> Signup and view all the answers

Why is encryption important when storing data in a third-party location?

<p>To protect the data against unauthorized access (A)</p> Signup and view all the answers

What type of data may require special consideration when storing in a third-party location?

<p>Customer information (A)</p> Signup and view all the answers

How should data be transferred in and out of a third-party location?

<p>Over an encrypted channel (B)</p> Signup and view all the answers

What is a benefit of storing data in an encrypted form?

<p>It protects the data against unauthorized access (A)</p> Signup and view all the answers

What is a major concern with integrators being inside the network?

<p>They can install malware on systems without going through security controls (D)</p> Signup and view all the answers

What is an example of a security issue that was identified with a vendor?

<p>A security vulnerability in a thermostat (B)</p> Signup and view all the answers

What is the importance of partnering with vendors?

<p>To ensure they are motivated to resolve security issues (B)</p> Signup and view all the answers

What is a potential security issue in the supply chain?

<p>All of the above (D)</p> Signup and view all the answers

What is a rare but possible security issue?

<p>Malware infection from a third-party software (D)</p> Signup and view all the answers

What is an example of a security issue with hardware from a third party?

<p>A counterfeit switch (B)</p> Signup and view all the answers

Why is it important to have processes and procedures in place for the supply chain?

<p>To monitor security concerns (A)</p> Signup and view all the answers

What is a concern when having programming services done by a third party?

<p>Building a secure environment for developers (C)</p> Signup and view all the answers

What is a consideration when deciding where to store code?

<p>Storing code on a centralized cloud-based server (C)</p> Signup and view all the answers

Why is it important to ensure vendors are aware of security problems?

<p>So they can resolve the issues quickly (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser