1.3 Evaluate and Apply Security Concepts Flashcards

1
Q

What is Corporate Governance Based Upon?

A

The goals and objectives of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Goal of Governance?

A

Enhance and Organizations value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are examples of Corporate Governance Activities.

A

Anything that helps and organization meet their goals and adds value to an organization. | Creating new processes, product, services | Making relationships with 3rd-party clients | Improving margins and cashflows | etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How Must Security be Managed to Ensure Alignment of Goals?

A

From top down, starting with the ones driving what security must do to achieve the goals of the organization. | From CISO executives, to management, to employees, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Must Security Governance Align With and What Should Drive its Goals?

A

Security Governance must align with corporate governance and should be driven by the companies goals and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rather than Being a Reactive Function, What should Security be?

A

A Proactive Enabler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Required by Senior Management to Ensure Strong Security Governance?

A

Strong Convictions about the need for security | Can convince them alone, or hire outside consultants to push the needle in securities favor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you Sum up Governance in a Few Sentences?

A

To govern is to lead. Ultimately, governance is elected to increase value for the assets under their jurisdiction. Often, done by a team of people with the ultimate goal of increasing the value– prosperity, sustainability, and viability– of their organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who are the Governing Bodies of an Organization?

A

Board of Directors, CEO, and Senior Management. | Can include more roles, but always those representing/overseeing a team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Organizations’ Equivalence of Local and Municipal Laws?

A

Policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is in Charge of Establishing an Organization’s Goals and Objectives that Ultimately set the Tone for Governance?

A

The Board of Directors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who is Appointed by the Board of Directors to be Accountable for Corporate Governance?

A

Chief Executive Office (CEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Goals of an Organization’s CEO?

A

Be accountable for all the activities and initiatives that an organization undertakes to achieve its goals and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who is Responsible for Consistently Communicating a Security Culture to Ensure Effective and Good Security?

A

From Top Down Structure, Board of Directors, CEO, and Senior Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Effective Security Governance can be Achieved by Drawing Knowledge and Experience from Where/Who?

A

Senior Management, Legal, IT, HR, and key functional areas of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can be Created to Maintain Strong Organizational Governance?

A

An Organization Governance Committee who meets often to ensure goals between functional departments are aligned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Scoping and Tailoring?

A

Scoping look are potential control elements and determines if they are in scope. Tailoring is refining these scoped elements to they’re most effective for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TRUE or FALSE:
Tailoring is not concerned with the cost-effectiveness of security measures so long as it mitigates exposed risk?

A

False: Tailoring should be cost-effective relative to what they’re protecting, and ultimately add value to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TRUE or FALSE:
The Board of Directors and Senior Management do not Need to Support Security Functions?

A

False: Without support from the top of the hierarchy, security can quickly become a reactive nuisance versus a proactive enabler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are CEO’s, CFO’s, and Data Controllers individually resposnible for?

A

CEOs is ultimately accountable for organizations goals, CFOs are accountable for accuracy of financial reports, Data Controllers are accountable for privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain the Difference Between Accountability and Responsibility.

A

Accountability cannot be delegated and is applicable to one person or group. They make the rules and policies.
Responsibility can be delegated and multiple people can be responsible, though accountability ultimately falls on the delegater. They develop plans and implement controls.

22
Q

If Certain Functions of an Organzation are Managed by a Responsible 3rd party, such as payroll, who is accountable for the assets managed?

A

Ultimately, the owner of the assets being managed. CEO or group assigned to the assets who delegated the responsibility to the downstream party.

23
Q

If a Cloud Service Provider (CSP) houses customer data your organization owns, who is accountable in the event of data being leaked if a breach of the CSP occurs?

A

Ultimately, the owner of the data is responsible. This is whoever delegated the responsibility to the CSP.

24
Q

Who is Ultimately Responsible for Every Single Asset and Organization Owns?

A

Ultimately, the CEO and the Board of Directors, though this is not realistic for larger companies. You cannot delegate the accountability, but in large companies senior management is accountable for the data they manage.

[This is not a delegation of accountability, but rather a means to assign a person the position to ‘own’ that assets they manage, making them accountable. If they are not listed, then the next up in the hierarchy is responsible.]

25
Q

What Accountability does the Security Function Hold?

A

All Security Governance Activities that have been driven, or initiated by, those who are accountable: the Board, CEO, and other C-Suite executives.

26
Q

What is the Overall Role of Security?

A

To be an Enabler.

27
Q

Who is the Owner/Controller of an Asset?

A

Whoever created, bought, or is most familiar with an asset.

28
Q

What are Owners, Controllers, Functional Leaders, and Senior Management Accountable For?

A

Ensuring appropriate security controls consistent with the organization’s security policy are implemented to protect the organization’s assets. | Determine appropriate sensitivity or classification levels | Determine access privileges

29
Q

What are Information System Security Professionals and IT Security Officers responsible for?

A

Designing, Implementing, managing, and reviewing organization’s security policies, standards, baselines, procedures, and guidelines.

30
Q

What are Information Technology Officers responsible for?

A

Developing and implementing technology solutions. | Working closely with IS and IT security professionals and officers to evaluate security strategies | Working closely with the Business Continuity Team (BCM) to ensure continuity of operations should disruption occur.

31
Q

What is the IT Function Responsible for?

A

Implementing and Adhering to security policies.

32
Q

What are Operator’s and Administrators responsible for?

A

Managing, Troubleshooting, and applying hardware and software patches to systems as necessary. | Managing user permissions, per the owner’s specifications | Administering and managing specific applications and services.

33
Q

What are Network Administrators responsible for?

A

Maintaining computer networks and resolving issues with them. | Installing and configuring network equipment and systems and resolving problems.

34
Q

What are Information System Auditors responsible for?

A

Providing management with independent assurance that the security objectives are appropriate. | Determining whether security policies, standards, baselines, procedures, and a guidelines are appropriate and effective to comply with the Organization’s objectives | Determining whether objectives have been met.

35
Q

What are Users responsible for?

A

Adherence to security policies and preserving the availability, integrity, and confidentiality of assets when accessing and using them.

36
Q

What is a Data Custodian Responsible for?

A

Ensuring the assets entrusted to them are protected and accessible when needed, as well as ensuring data is not divulged while in their care.

37
Q

How do Data Owners and Data Custodians differ?

A

Data Owners ultimately own the assets belonging to them. Data Custodians are granted ‘custody’ of the assets are responsible for their protection while it is in their care.

38
Q

In the event of a data breach, who is ultimately responsible for accountable for the data if handled by a data custodian?

A

Ultimately, the responsibility falls on the Data Custodian. However, the accountability belongs to the asset owner. This is because the asset owner entrusted the data with the data custodian, and must work with the security function to provide the resources to properly protect the data.

39
Q

Who provides the tools to protect data passed to the data custodian?

A

The Security Function will provide these tools. The asset owner is accountable for ensuring this.

40
Q

Who Specifically is Responsible for Ensuring Security?

A

EVERYONE!!! | Security follows the top-down structure for a reason. It start with the Board and CEO, then trickles down to each individual user. Top-level responsibilities include creating policies and rules to ensure security, while it is all users’ roles to follow these policies.

41
Q

How does Due Care and Due Diligence differ?

A

Due Care is the actions taken to ensure that assets are assessed and protected. Due Diligence is the ability to prove Due Care was established in a cost-effective way.

42
Q

When Applying Asset Controls, What Requirements MUST be Met?

A

At a minimum, Compliance Requirements must be met to ensure the organization meets minimum standards for protecting sensitive assets.

43
Q

What Four Compliance Requirements must and Organization Follow?

A

Laws, Regulations, Industry standards and Policies.

44
Q

What are Compliance Laws?

A

Laws that must be followed based on the assets owned or managed, or the industry, jurisdiction, or country in which the organization resides. | Examples include HIPPA, GLBA, COPPA, FISMA, DMCA, and GDPR.

45
Q

What are Compliance Regulations?

A

Specific regulations that an organization must comply with that are based on assets owned or managed, of the industry, jurisdiction, or country the organization operates. |Examples include International Traffic and Arms Regulations (ITAR) and Encryption Export Controls.

46
Q

What are Industry Standards?

A

Industry specific procedural and technical rules that help guide activities of an organization.

47
Q

What three functions must work together to ensure compliance? Who does these functions support?

A

Legal, Privacy, and Audit/Compliance. These will ultimately provide the drive and initiative for security when implementing security controls.

48
Q

How does Legal and Privacy help Security?

A

They help understand what is required from a compliance perspective?

49
Q

How does Audit/Compliance help Security?

A

They monitor active compliance, so the security function will advice and enforce security controls.

50
Q
A