← AIS Final

Final Exam Guide

AIS · Prof. Lanz · Ch 16 cybersecurity + Center for Internet Security focus
Format 40 MC Questions
Primary Focus Ch 16 + CIS Controls
Also Tested SOC, TSC, Frameworks
Case Equifax
What Lanz emphasized
Read the CIS introduction — it will be tested. For each control, read the overview, "why is this control critical?", and the safeguards. Always read IG1; he'll tell you if IG2/IG3 matter. Don't memorize which safeguard maps to which control — know the concept of what each safeguard accomplishes.
Chapter 16 — Cybersecurity
The Cyber-Kill Chain
Definitely Tested
Stage 1
Reconnaissance
Gather information about the network. Identify targets and vulnerabilities.
Stage 2
Access
Get into the network. Use info from recon or force entry.
Stage 3
Disrupt
Damage, destroy, steal, ransom, or shut down the network.
Reconnaissance Attacks — Physical vs Logical
Definitely Tested
Physical recon
Human interaction required
Phishing — deceptive email tricking the victim. Social engineering is always physical because the target is a person.

Dumpster diving — looking through trash for passwords, network diagrams, sensitive info.

Eavesdropping (sniffing) — unauthorized interception of communication. Mitigate with encryption + secure FTP.
Logical recon
Fully digital, no human target
Ping sweep (IP probe) — pings each IP to see which hosts are active.

Port scan — narrows the active list by finding which ports are open and accepting traffic.

Defenses: internal vulnerability scans, penetration testing, applying patches promptly.
Email phishing red flags
Access Attacks — Physical vs Logical
Definitely Tested
Physical access
Tailgating (piggybacking)
Following an authorized user through a checkpoint to use their credentials.

Accidental: authorized user is unaware.
Polite: authorized user holds the door.

Controls: PE-2/3 (authorizations, escorts, guards, barriers), PE-6 (intrusion alarms, surveillance).
Logical access
Force or exploit the network
Brute-force — guess passwords with automation; dictionary attacks use common words.

On-path (MITM) — actively injects between two endpoints. Different from eavesdropping (passive).

IP spoofing — forges source addresses to impersonate a legitimate host.
NIST password guidelines
Disruptive Attacks
Definitely Tested
Denial-of-service family
Malware types — replication is the key distinction
Replicates
Virus · Worm
Virus — replicates with human interaction (clicking, opening attachments).

Worm — replicates without human interaction. Same destructive power as a virus.
Does not replicate
Trojan · Logic Bomb
Trojan horse — disguised as benign software; usually installs a back door.

Logic bomb — dormant code that triggers when conditions are met. Hard to detect or prevent until activated.
NIST — Framework vs Control Catalog
Definitely Tested
High-level framework
NIST CSF — Functions
v1.1: 5 functions — Identify, Protect, Detect, Respond, Recover.

v2.0: 6 functions — added Govern.

Best-practice cybersecurity program framework.
Detailed control catalog
NIST 800-53 — 18 Families
18 control families (AC, AT, AU, CA, CM, CP, IA, IR, MA, MP, PE, PL, PS, RA, SA, SC, SI, PM).

Each family contains specific controls (e.g. RA-5 Vulnerability Scanning, CA-8 Pen Testing, SC-5 DoS Protection).
Recent Cybersecurity Threats
Know the Examples
CIS Controls — Center for Internet Security
Background & Threat Intelligence
Read the Intro
The Six Asset Classes
Memorize
Documentation
Users Devices Software Data
Network
Documentation Hierarchy — 4 P's
Memorize
Highest
Plan
Strategic direction.
Policy
Rules and intent.
Process
How work flows.
Lowest
Procedure
Specific steps.
Implementation Groups (IG1, IG2, IG3)
Always Read IG1
The 18 CIS Controls
Know Each Concept
01
Inventory and Control of Enterprise Assets
"Can't protect what you don't know you have." Active discovery, DHCP logging. Static inventory is most secure but a pain. Know all safeguards.
02
Inventory and Control of Software Assets
Ensure software is currently supported — unsupported software won't get security patches. Allowlist authorized software (SG 2.5).
03
Data Protection
Inventory + risk-rank data (3.7). When in doubt, encrypt (3.9). Encrypt data in transit (3.10), segment data (3.12), data loss prevention (3.13). Firewalls cannot read encrypted packets — that's why DLP exists.
04
Secure Configuration of Enterprise Assets and Software
Harden all assets — configure for security. Eliminate default accounts (everybody knows them). Host firewalls (4.5). Uninstall unused software (4.8) — if it's there, you're responsible for it.
05
Account Management
Hierarchy of admin types — what each can do. Review access every 30 days. Dedicated admin accounts separate from daily-use accounts.
06
Access Control Management
Role-Based Access Control (RBAC, SG 6.8). MFA required for externally-exposed apps, remote access, and admin access.
07
Continuous Vulnerability Management
"Where accounting and audit go crazy." Vulnerability scanners rate findings. This is the Equifax control.
08
Audit Log Management
Logs let you know everything that's going on. Configuration determines log detail — wrong config can disable logs. Centralize logs (SG 8.9).
09
Email and Web Browser Protections
Lighter coverage in lecture.
10
Malware Defenses
Anti-malware signatures must update automatically, daily (10.2) — manual or quarterly defeats the purpose.
11
Data Recovery
Need ability to restore after a breach. Test recovery quarterly (SG 11.5) — untested backups are unproven.
12
Network Infrastructure Management
Keep network infrastructure up to date (12.1). Maintain a current network schematic (12.4) so you understand what you're looking at.
13
Network Monitoring and Defense
Encryption + firewalls. Configurations are everything. Segment the network (13.4) and put a safeguard in each segment via firewalls.
14
Security Awareness and Skills Training
Train people to recognize threats. Counters phishing and social engineering at the human layer.
15
Service Provider Management
Ties directly to SOC reports. Walk through the Trust Services Criteria for any provider holding your data.
16
Application Software Security
Apps need their own security. Safeguards follow the SDLC. Know 16.1 / 16.2 at a high level.
17
Incident Response Management
Need policies/procedures before something happens. Alternate communication channels (17.6) — assume the hacker is inside and primary channels are compromised. Run exercises (17.7).
18
Penetration Testing
Simulate a real attacker. Pen test exploits (only finds one way in). Vulnerability assessment identifies (find as many as possible, no exploit). If you hear "exploit," it's a pen test. Engage external testers (18.2). Fix what you find (18.3). Not ready for a pen test = a weakness.
Regulations — Match the Industry to the Rule
Industry-to-Regulation Quick Map
Definitely Tested
SOC Reports & Trust Services Criteria
SOC Report Types
Definitely Tested
Type 1 vs Type 2
Type 1
Design at a point in time
"How we would like it to be." Are the controls designed properly?
Type 2
Effectiveness over a period
"What's actually there." Are the controls operating as designed?
The Five Trust Services Criteria
Memorize
Connecting Pieces
Equifax — The Anchor Case
Will Show Up
Penetration Test vs Vulnerability Assessment
Classic Trap
Pen test
Exploits
Actively breaks in. Demonstrates impact. Usually finds one way in. Run after every other test. "Exploit" → pen test.
Vulnerability assessment
Identifies
Never goes in. Tries to find as many weaknesses as possible. Output feeds the remediation backlog.
Lanz's Quiet Emphases
Easy Points
Test-Taking Strategy