1A: Compare and Contrast Information Security Roles Flashcards

1
Q

Any external responsibility for an organization’s security lies mainly with which individuals?

A

Senior Executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which security related phrase relates to the integrity of data?

A

Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An engineer looks to implement security measures by following the five functions in the National Institute of Standards and Technology (NIST) Cybersecurity Framework. When documenting the “detect” function, what does the engineer focus on?

A

Ongoing proactive monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the “respond” function?

A

Identify, analyze, and eradicate threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the CIA Triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is condifentiality?

A

certain information should only be known to certain people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Integrity?

A

data is stored and transferred as intended and that modification is only done by authorized sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is availability?

A

information is accessible to those authorized to view or modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is non-repudiation?

A

The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.

a subject cannot deny doing something, such as creating, modifying, or sending a resource.

Ex. Something is witnessed, witness can provide evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 5 Functions of security developed by NIST?

A

Identify
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the “identify” function?

A

develop security policies and capabilities. Evaluate risks, threats, and vulnerabilities and recommend security controls to mitigate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the “protect” function?

A

procure/develop, install, operate, and decommission IT hardware and software assets with security as an embedded requirement of every stage of this operations life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the “recover” function?

A

implement cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the basic responsibilities of someone in IT?

A

-Participate in risk assessments and testing of security systems and make recommendations.
-Specify, source, install, and configure secure devices and software.
-Set up and maintain document access control and user privilege profiles.
-Monitor audit logs, review user privileges, and document access controls.
-Manage security-related incident response and reporting.
-Create and test business continuity and disaster recovery plans and procedures.
-Participate in security training and education programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is in charge of overall internal responsibility for Security?

A

Director of Security, Chief Security Officer (CSO), Chief Information Security Officer (CISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How might the goals of basic network management not align with the goals of security?

A

Management focuses on availability over confidentiality

17
Q

What are IT managers typically in charge of?

A

Managers may have responsibility for a domain, such as building control, ICT, or accounting.

18
Q

What is the responsibility of Technical and specialist staff?

A

implementing, maintaining, and monitoring the policy

19
Q

Who has external responsibility for security (due care/laibility)

A

Directors and owners

20
Q

What responsibility does non-technical staff have?

A

complying with policy and with any relevant legislation.

21
Q

What is an SOC

A

Security Operations Center?

location where security professionals monitor and protect critical information assets across other business functions, such as finance, operations, sales/marketing, etc

22
Q

What is DevOps?

A

A combination of software development and systems operations, and refers to the practice of integrating one discipline with the other.

23
Q

What is DecSevOps?

A

A combination of Development + Operations + Security?

24
Q

What does CIRT stand for?

A

cyber incident response team

25
Q

What does CSIRT stand for?

A

Computer security incident response team

26
Q

What are the properties of a secure information processing system?

A

Confidentiality, Integrity, and Availability (and Non-repudiation).

27
Q

What term is used to describe the property of a secure network where a sender cannot deny having sent a message?

A

Non-repudiation

28
Q

A multinational company manages a large amount of valuable intellectual property (IP) data, plus personal data for its customers and account holders. What type of business unit can be used to manage such important and complex security requirements?

A

A security operations center (SOC).

29
Q

A business is expanding rapidly and the owner is worried about tensions between its established IT and programming divisions. What type of security business unit or function could help to resolve these issues?

A

Development and operations (DevOps) is a cultural shift within an organization to encourage much more collaboration between developers and system administrators. DevSecOps embeds the security function within these teams as well.

30
Q

A business is expanding rapidly and the owner is worried about tensions between its established IT and programming divisions. What type of security business unit or function could help to resolve these issues?

A

Development and operations (DevOps) is a cultural shift within an organization to encourage much more collaboration between developers and system administrators. DevSecOps embeds the security function within these teams as well.

31
Q

What is confidentiality?

A

The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.

32
Q

What us a CISO (Chief Information Security Officer)?

A

Typically the job title of the person with overall responsibility for information assurance and systems security. Sometimes referred to as Chief Information Officer (CIO).

33
Q

What is a CSIRT (Computer Security Incident Response Team)?

A

Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing for instance).

34
Q

What is an ISSO (Information Systems Security Officer)

A

Organizational role with technical responsibilities for implementation of security policies, frameworks, and controls.