100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
FITSP Manager-Part 2|| LATEST UPDATE 2024|| Correct 100% €11,71   In winkelwagen

Tentamen (uitwerkingen)

FITSP Manager-Part 2|| LATEST UPDATE 2024|| Correct 100%

 8 keer bekeken  0 keer verkocht
  • Vak
  • FITSP-Auditor
  • Instelling
  • FITSP-Auditor

HIDS/HIPS - ANSWER - Host-Based, - monitors the characteristics of a single host and the events occurring within that host for suspicious activity and most commonly deployed on critical hosts such as publicly accessible servers and servers containing sensitive information - network traffic (only ...

[Meer zien]

Voorbeeld 4 van de 52  pagina's

  • 19 augustus 2024
  • 52
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • FITSP-Auditor
  • FITSP-Auditor
avatar-seller
FITSP Manager-Part
2|| LATEST UPDATE
2024|| Correct 100%
HIDS/HIPS - ANSWER - Host-Based,

- monitors the characteristics of a single host and the events occurring within that host for suspicious
activity and most commonly deployed on critical hosts such as publicly accessible servers and servers
containing sensitive information

- network traffic (only for that host), system logs, running processes, application activity, file access and
modification, and system and application configuration changes.



NIST SP 800-60, Rev 1 - ANSWER Security Categorization



NIST SP 800-122 - ANSWER Categorizing PII



FIPS-199 - ANSWER Security Categorization



FIPS-200 - ANSWER Minimum Security Requirements



NIST SP 800-18, Rev 1 - ANSWER System Security Plan



NIST SP 800-30, Rev 1 - ANSWER Risk Assessment

Please note that original version has been replaced by 800-39, which is Risk Management

,Risk Impact - ANSWER Risk associated with the operation and use of information systems that support
the missions and business functions of their organizations



NIST SP 800-34 - ANSWER Contingency Planning for IT Systems



NIST SP 800-37, Rev 2 - ANSWER RMF/Roles and Process



FIPS 180-2 - ANSWER - Secure Hash Standard

- Federal agencies must use the Secure Hash Standard if we use hashing

- Provides Integrity

- SHA (Secure Hash Algorithm) there are 4 hash algorithms (SHA-1, SHA-256, SHA-384, SHA-512)

- Secure because a change to a message results in a different message digest.

- Other non-standard hash algorithms (MD2, MD5, CRC, HAVAL)



FIPS 186-2 - ANSWER - Digital Signature Standard

- Provides integrity (message digest) and nonrepudiation (only I have my private key)

- Algorithms

- Digital Signature Algorithm (DSA)

- RSA digital signature algorithm, specified in American National Standard (ANS) X9.31 and Public - Key
Cryptography Standard (PKCS)

- Elliptic Curve Digital Signature Algorithm (ECDSA), specified in ANS X9.62. FIPS 186-3 approves the use
of ECDSA



FIPS 197 - ANSWER - specifies AES, Advanced Encryption Standard

- uses Rijndael Algorithm

- Encrypting is best way to provide confidentiality

- Symmetric encryption - faster than asymmetric encryption

- Cipher Key lengths -128, 192, 256 - three "flavors"



FIPS 198-1 - ANSWER - Keyed Hash Message Authentication Code (HMAC)

, - Purpose of a MAC is to authenticate both the source of the message and its integrity.

- HMACs have 2 parameters: 1) Message input and 2) secret key known only to originator and intended
receiver.

- HMAC is used by the message sender to produce a value (the MAC) that is formed by hashing the
secret key and the message input.



FIPS 140-2 - ANSWER - Security Requirements for Cryptographic Modules

- Level 1: Basic Security.

Atleast one approved algorithm or approved security function shall be used

- Level 2: Adds tamper evident coatings, adds role-based authentication

Tamper evidence

Role based, e.g. AD security groups, user account inherit rights of the group

- Level 3: Adds identity based authentication,

intrusion prevention, and

critical access parameters

- Level 4: requires any tampering of the module to erase all critical security information/self-destruction
e.g., Bitlocker

Environmental protection

- FIPS 140-2 establishes with Cryptographic Module Validation Program



FIPS 201-2 - ANSWER - PIV

- HSPD 12




M-14-03 - ANSWER - Continuous monitoring (REMOVED 3 year authorization requirement if CM is in
place)



M-11-11 - ANSWER - PIV



CNSSI-1253, Version 1 - ANSWER NSS C&A process

, Which law requires annual IT Reporting to Congress? - ANSWER Clinger Cohen Act



what is the Best method for integrity? - ANSWER - Best method for integrity is hashing; if there is a
different message digest we know the content has changed



What is another name for the Clinger Cohen Act? - ANSWER Information Technology Management
Reform Act of 1996



Which law/regulation requires agencies annual Reporting to OMB? - ANSWER - FISMA

- Also requires Annual Reviews, Must cover:

1) Adequacy/effectiveness of Security Program,

2) Adequacy of plans or reports for budget,

3) Significant deficiency



What do digital signatures provide? - ANSWER - Provides integrity (message digest) and nonrepudiation
(only I have my private key)

- Algorithms

- Digital Signature Algorithm (DSA)

- RSA digital signature algorithm, specified in American National Standard (ANS) X9.31 and Public - Key
Cryptography Standard (PKCS)

- Elliptic Curve Digital Signature Algorithm (ECDSA), specified in ANS X9.62. FIPS 186-3 approves the use
of ECDSA



Which requires Accreditation at minimum every 3 years? - ANSWER OMB Circular A-130



what is the best method for confidentiality? - ANSWER - Best method for confidentiality is ENCRYPTION



Which requires agencies to develop a system security Plan? - ANSWER - FISMA

- OMB Circular A-130

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper shantelleG. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €11,71. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 77254 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€11,71
  • (0)
  Kopen