1-Information Security Management Flashcards

1
Q

Information security Management

A

The collection of policies, processes, and procedures that ensures an organization’s security policy is effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The key success of a security management program

A

Ongoing executive support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is information security management a separate activity?

A

No, Information security management works right-in-gloves with IT governance and risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should be included in an effective information security policy

A
  • Statement of executive support
  • Roles & Responsibilities
  • Value of information-related assets
  • Protection of Information Assets
  • Acceptable behavior
  • Risk Management
  • Support of laws and regulations
  • Enforcement and consequences,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The element of security awareness

A
  • Signed acknowledgment of security policy
  • Security awareness training upon hire
  • Annual security awareness training - refresher et updates
  • Internal website
  • Periodic message
  • Posters and Flyers
  • Rewards for desired behavior.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a security incident

A

An event where the confidentiality, integrity, or availability of information /information system has been or is in danger of being compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident to include in an incident response plan

A
  • Information exposure or theft
  • Information system theft
  • Information system damage
  • Information corruption
  • Malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is advisable to most organizations when it comes to incident response

A

Organizations are advised to test their incident response plans to make sure that they will be effective when a real security incident occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of corrective and preventive actions when it comes to security risk

A

To reduce risks by opting for corrective and preventives actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are part of a culture of continuous improvment

A

Corrective and preventives actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Role of the Board of Directors to the protection of information and assets

A

Responsible for directing executive management to provide adequate resources to the protection of information and assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Role of the Executive Management to the protection of information and assets

A

Responsible for ratification and support of information security policy and overall responsibility for asset protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Role of the Security steering committee to the protection of information and assets

A

A committee of senior-level officials from every department in the organization that is convened for approval of securities policies, discussions of risks-related matters , and allocation of resources to carry out asset protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Chief Information Officer - CIO

A

Senior level official who is responsible for the deployment and operation of all information systems, and for the management of all information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Chief Information Security Officer (CISO) or Chief Information Risk Officer (CIRO)

A

Senior level official who is responsible for operation of the organization’s risk management program, and the development and enforcement of security policy and the protection of information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Chief Privacy Officer - CPO

A

The senior-level official who is responsible for the proper handling of personally sensitive information belonging to employees and customers to protect their privacy rights

17
Q

• Security auditors

A

Responsible for monitoring and testing security controls and delivering written opinions on the effectiveness of those controls

18
Q

Security administrators

A

Responsible for operating or monitoring specific security controls such as user access controls, firewalls, or intrusion detection systems

19
Q

Security analyst

A

Responsible for implementing and/or enforcing security policy by designing, improving, and/or monitoring security processes and security controls

20
Q

Systems analysts

A

Responsible for implementing and/or enforcing security policy by designing application software that includes adequate controls to protect the application as well as the information that it manages and stores

21
Q

Responsible for coding application

A

Software developers software that includes controls to prevent application misuse or bypass of controls to protect the integrity and confidentiality of information

22
Q

Asset owners

A

Responsible for protection and integrity of assets, and for approving requests to access the assets they control

23
Q

Audit committee

A

A subset of the board of directors, responsible for reviewing internal and external audit reports and requiring executive management to respond to any nonconformities.

24
Q

What an effective security management program need to align with

A

The organization’s mission, strategies, and objectives.

25
Q

Information assets categories

A
  • Information - software, tools and every type of data
  • Information system - servers, workstation, mobile device, IT hardware etc.

Both information and information system need to be inventoried, and classified

26
Q

Hardware asset inventory

A
  • Identification
  • Value
  • Location
  • Condition
  • Security classification
  • Asset group
  • Owner
  • Custodian
27
Q

What is a hardware asset owner

A

Person or group responsible for the operation of the asset

28
Q

What to periodically check

A

Hardware asset since they are movable, they must be physically checked periodically to verify the information and existence of the asset.

29
Q

Information Assets

A

Intangible information stored in systems should be treated as an asset.

They should also be inventoried periodically.

30
Q

The four levels of information classification

A

secret, restricted, confidential, and public.