AIT612 Midterm_Class 8(1)
doc
keyboard_arrow_up
School
Hampton University *
*We aren’t endorsed by this school
Course
612
Subject
Information Systems
Date
Apr 3, 2024
Type
doc
Pages
3
Uploaded by AdmiralLemurMaster472
3/27/2024
Towson University
Center for Applied Information Technology
AIT612 Information Systems Vulnerability and Risk Analysis
Mid-Term Exam
Name: _________________________
Date: ___________
Instructions: Post your completed exam on BlackBoard Assignments. All of these questions are worth 2 points each unless specified differently. Use NIST SP 800-53
for all questions related to security controls.
1.
Sarbanes-Oxley contains 11 titles that describe specific mandates and requirements for financial reporting. Which title enforces IT security controls and
explain how these controls can be implemented to protect banking assets. (5 points)
2.
Describe the critical success factors to implement an efficient and effective information security risk assessment program. (5 points)
3.
The GAO Report, Information Security Risk Assessment, identified three methods of conducting and documenting the assessment. These three methods were discussed in class. Using the information from the case study provided below identify the pertinent threats, vulnerabilities, and recommended countermeasures using one of the risk assessment methods from the GAO Report.
(15 points)
Case Study: Recently, the Department of Veteran’s Affairs reported that an employee took a laptop computer home that contained records of millions of veterans. The computer was stolen. You were hired as an outside consultant to conduct a risk assessment and present the results to the Department’s Chief Information Security Officer so she can prepare for a Congressional testimony.
4.
Based on previous discussions in class/online about FISMA security controls, answer the following questions:
a.
Your IT enterprise is comprised of both host-based and network-based IDSs, application gateway firewalls, and VPN-enabled applications to support its sales department. Identify the security controls that each technology implements and explain how these controls support confidentiality, integrity, and availability. (10 points)
b.
Identify the appropriate security controls that apply to an organization that
has medical applications. Specifically, identify 5 security controls and 1
3/27/2024
explain (1-2 paragraphs) how these controls help mitigate the risk of inadvertent disclosure of personal information, modification of data, or the
availability of data. (10 points)
c.
You report to the CIO for a large financial institution and he/she tasked you to develop procedures to implement 5 Access Control mechanisms for
the IT systems. Explain (1-2 paragraphs for each mechanism) how you would implement each control. (10 points)
5.
Using the Security Target for Bioscript, Version 2.1.3 (see attached document in BlackBoard), identify the relevant security features for logical and physical access, and identify how these features would support best security practices (e.g.,
FISMA, SOX, or HIPAA). Select 5 security controls. Additionally, explain how these security functional requirements protect inadvertent disclosure of information, modification of data, and/or the availability of data. (15 points)
6.
What type of VPN connection is considered to be the most secure?
a.
Router-based VPN
b.
Dedicated hardware and software
c.
Firewall-based VPN
7.
Application Gateway Firewalls are typically the least complex and least expensive
type of firewall to implement. (T/F)
8.
What is the Principle of Least Privilege?
a.
Each employee will be granted access to the most sensitive information
b.
Each employee will be granted access to the least sensitive information
c.
Each employee will be granted access to only the information required to perform their job
9.
Identify which is not a drawback using a host-based IDS.
a.
Not capable of fending off attacks against the protocol stack
b.
Cannot detect an intrusion if running multiple services
c.
Practical for many different types of environments
10. Prior to installing a Firewall, the most important aspect of planning is determining
the location of the firewall? (T/F)
11. If the server is running multiple services (e.g., DNS, file sharing, POP3, etc.), the host-based Intrusion Detection System may not be able to detect an intrusion? (T/F)
2
3/27/2024
12. Select the statement that’s not a limitation of Intrusion Detection Systems:
a.
Insertion of data into traffic can be accomplished to camouflage an attack string
b.
The ability to embed an attack in traffic which is ignored by an IDS
c.
The ability to close ports to prevent unauthorized users accessing the network
d.
Flood an IDS with lots of expected traffic that it has to process
13. Network-based IDS helps identify and prevent insider attacks, such as a disgruntled employee. (T/F)
14. When securing your network from devices like port scanners, an open port can be used to send commands to a computer, gain access to a server, and exert control over a network device. Is it a good security practice to secure all ports not absolutely necessary for the conduct of business? (T/F)
15. Port scanning allows a user to sequentially probe a number of ports on a target system in order to see if there is a service that is listening. In general, packet filtering is unable to deter scanning probes from devices like FIN scanners? (T/F)
16. Explain which NIST security controls enforce the Principle of Least Privilege. (5 points)
17. Port scanning allows a user to sequentially probe a number of ports on a target system in order to see if there is a service that is listening. Explain how effective packet filtering can deter scanning probes from devices like FIN scanners. (5 points)
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help