1. Information Security Governance - 24% Flashcards

1
Q

What is a RACI Chart

A

Responsible
Accountable
Consultable
Informed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 principles of the National Association of Corporate Directors

A

Principle 1 - cybersecurity is an enterprise-wide issue

Principle 2 - Understand legal implications of cyber risks

Principle 3 - access to cybersecurity expertise

Principle 4 - boards should set expectations that management will establish an enterprise wide cyber risk management framework

Principle 5 - should discuss cyber risk including avoidance, acceptance, mitigation and transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are different types of metrics used for simple categorization

A

Key Risk Indicators - metrics associated with risk with measurement of risks

Key Goal Indicators - attainment of strategic goals

Key Performance Indicators - show efficiency and effectiveness of security-related goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ROSI

A

Return on Security Investment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the acronym SMART in the effective ness of a metric

A

Specific
Measurable
Attainable
Relevant
Timely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is BMIS

A

Developed by ISACA in 2009 the Business Model for Information Security is a guide for business aligned risk-based security governance.

This was derived from the Systemic Security Management Framework developed by USC Marshal School of Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the dominant enterprise architecture standard established in the late 80s

A

The Zachman Framework

starts with a high functional level and then in increasing details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Zachman model do not do for IT Systems

A

It does not convey the relationships between IT System. Data Flow Diagrams are used to depict that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between a leading indicator and trailing indicator

A

leading indicators are a predictor of the probability of future security incidents. Patch Management Stats, Phishing Sim Results, UEBA, etc.

Trailing indicators are more reactive in nature based on security incidents related to attacks blocked by firewall, viruses stopped, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the elements of the business model for information security (BMIS)

A

Organization, people, process and technology.

The dynamic interconnections (DI’s) are culture, governing architecture, emergence, enabling and support, and human factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the Primary Factor to the selection of a control framework is

A

Industry Vertical - for example a healthcare organization is going to want to utilize HIPAA Security Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a balanced scorecard?

A

Measure organizational performance and effectiveness against strategic goals.

tool used to quantify the performance of an organization against strategic objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A process that is performed consistently but it is not documented is generally considered to be

A

Repeatable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T or F all processe should reach the maturity level of optimized

A

False - there are no rules that the maturity levels of different processed need to be the same or at a different level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary responsibility of the custodial related to customers

A

Custodian makes decisions based on customer’s defined interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compare CISO, CRO, CSO, and CIRO

A

CISO is responsible for information assets and not physical assets

Chief Risk Officer is responsible for managing risks for multiple type of assets.

Chief Security Officer is responsible for design, deployment, and operation of protective controls.

Chief Information Risk Officer is responsible for risk management and protection of information assets but not property, plant and equipment.

17
Q

A completion % metric is most likely associated with what type of Indicator

A

Key Goal Indicator (KGI)

18
Q

If two organizations are merging which is the greater risk. Difference in practices or gaps in coverage

A

Differences in practices.

19
Q

What is the purpose of value delivery metrics

A

Long-term reduction in costs

20
Q

What is a common term for mechanisms that ensure a desired outcome in a selected business process

A

Control

21
Q

What are the best explanation for the Implementation Tiers in NIST CSF

A

CSF states that Implementation Tiers are not strictly maturity levels but are very similar to them.

22
Q

What are 3 factors that a risk manager may consider when developing an Infosec Strategy

A

Risk Levels
Operating Costs
Compliance Levels

23
Q

If an Infosec Policy is considered aspirational what is the consequence and first step

A

Org does not appear to be in control of its security practice

Meet with legal counsel to develop a plan of action

Roll back controls to reasonable level

24
Q

An organization is required by PCI to include several policies that are highly technical and not applicable to the majority of its employees. What is the best course of action for implementing these policies?

A

Have a separate technical security policy containing those required items, with a separate aup for all workers.

25
Q

If an org lacks security architecture function what is most likely a result and what is the main advantage for larger distributed organizations

A

Inconsistent application of standards

Greater consistency in the use of tools and configurations

26
Q

What value does a BIA for a security leader

A

Provides a view of the criticality of business processes in an organization

27
Q

What are the levels of Capability Maturity Model

A

Initial
Repeatable
Defined
Managed
Optimizing

28
Q

What source would be the best to learn about the current state of cybersecurity program

A

Risk Assessment
Followed by
Risk Register

29
Q

What are the elements of a business case

A

Current state, desired state, success criteria, requirements, constraints, approach and plan

30
Q

Who would make the decision on cyber-risk treatment decision

A

Information Security Steering Committee

31
Q

An installation metric is typically associated with what type of metric

A

Key Goal Indicator (KGI)

32
Q

What best describes ISO 27001

A

Consists primarily of a body of requirements for running a security management program along with an appendix of security controls.

33
Q

What view does the BIA provide for a security leader in an organization

A

criticality of BUSINESS Processes

34
Q

What makes BMIS unique

A

It takes into consideration the Organization and its culture through D1 interconnections

35
Q
A