Cs205 Mid Term Question
Cs205 Mid Term Question
Precautions taken to guard against unauthorized access to data (in electronic form) or
information Systems connected to the internet
Ans: Protecting information and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction.
People
Process
- Technology
Ans:
1. Security hardening
2. Vulnerability management
3. Security engineering
4. Security governance
Five step
Accreditation/testing
Q No. 07: Who Are The Players in Information Security?
Government
International organizations
Professional associations
Description:
SSH1 was
the original protocol & was subject to security issues. SSH2 is more advanced and secure.
1. Analyze assets
- 1. Examine assets to scan - Gather details on IP subnet - Look at potential issues with network
traffic
- Inform asset owners and relevant department heads
2. Prepare scanner
Set scanner parameters - Select type of scan - Look at credentials-based scan - Explore and
research plug-ins - Do a test run - Coordinate with asset owner
Run the automated scan - Monitor network performance degradation issues - Generate report
4. Assess results
- Evaluate results - Prioritize according to the risk level - Collate results for asset owners
Communicate the results and remediation timelines
5. Patch systems
Research vulnerabilities - Evaluate fixes and remediation method - Test the patches and fixes -
Apply patches/fixes - Monitor results
6. Verify (re-scan)
Re-scan to confirm that the vulnerability scanner gives a positive report - Collate results of
vulnerability scan - Report findings
Nessus
Qualys
Rapid7
Browser check,
SSL
1. Vulnerability
-2. OWASP
-4. SCAP
Initial
Policy
Responsibility
Periodic review
Intermediate
Change management
SOP,S
Awareness Monitoring
Mature
Risk management
Internal audit
Incident management
Question No 19: Info sec Governance Block arrange them. (Aise table ho ga usko arrange kerma
ho ga vad ker lo initail intermdiate and mature blocks k Name) sari vad kaut lain intial inter
and maure
Answer:
Intermediate (Darmiyani
Initial (Shuruati Stage) Mature (Pukhta Stage)
Stage)
Q No 20: Question: Which kind of vulnerability scanner used code-based vulnerabilities and
configuration-based vulnerabilities (as enumerated by the Common Configuration Enumeration
Project)
Enterprise antivirus
Vulnerability manager
Logs management
Automated backups
Edge router
NGN FW
DMZ:
Distribution switch
Access switch
NAC
App-DB encryption
Answer
DISA (Defense Information Systems
Aspect CIS (Center for Internet Security)
Agency)
Tools available for configuration checks Tools like SCAP Compliance Checker
Tool Support
(CIS-CAT) (SCC) and ACAS
Rationale
- Audit
Remediation
Default value
References
STIG content:
Discussion
Check content
Fix text
-CCI (References)
Layer 2: VM (1 Mth)
CCI (Control Correlation Identifier) (for Mcqz only. CCi stands for?)
Q No 31: OWASP Software Assurance Maturity Model (SAMM) Governance Phase!
- Security Requirements
Threat Assessment
Secure Architecture
Business Continuity (BC) is the capability of the org to continue delivery of products or services
at acceptable predefined levels following a disruptive incident
Q No 33: How web and email can secured against malware and attacks in enterprise
To secure web and email in an enterprise, implement antivirus software, firewalls, and intrusion
detection systems. Train employees on security best practices, use email encryption, update
software, employ MFA, monitor traffic, backup data, and conduct security assessments.
Q No 34: Software security flow?
Software security flow refers to the systematic process of identifying, assessing, and mitigating
security risks and vulnerabilities in software applications, following a structured approach to
ensure the development of secure and robust software systems.
Q No 35: Bangladesh Bank SWIFT Hack - Feb 2016: Hackers used SWIFT credentials of
Bangladesh Central
Bank employees to send more than three dozen fraudulent money transfer requests.
Requests sent to the Federal Reserve Bank of New York asking the bank to transfer millions of
the Bangladesh Bank's funds to bank accounts in the Philippines, Sri Lanka and other parts of
Asia.
Recover 19 Million
Q No 36. Topic No 198 How To Build Effective Info Sec Governance? (imp Repasted)
Key success factors: (see also minor detail of all these 06 points)
- Leadership
Strategy
Structure
Reporting
Project management
- Culture
Under the Security Transformation Model, security controls are implemented by the IT teams
- Security controls are validated by the Information Security team or by a third party consultant
following the principle of segregation of duty