27001 Information Security Management System Flashcards

1
Q

What is the Asset and Risk Assessment Register

A

The register details all the threats and vulnerabilities of the company due to the asset information it holds, processes or has access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps of Change Request (IS)

A
  1. An assessment is made in the Change Request and Risk Assessment. This includes details, justification, authorisation, any threats/risks.
  2. Change Request Implementation - providing a list of actions that need to be completed in order to manage effectively.
  3. A new supplier approval form (if applicable)
  4. Test Results Form - to confirm the results of the change and if it performed as expected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What examples can you provide that require the Asset and Risk Assessment Register to be updated?

A

Security Incident
Identification of a new threat/vulnerability.
Any change in legal contracts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to control the versioning of documents?

A

The Owner can be found in the Control of Documented Information Procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Information Classification, Labelling and Handling Rules Document?

A

This features the classifications of the documents. Eg. Public, highly confidential etc. The document also includes document types and storage requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What documents does the Business Context and Critical Requirements Management Procedure connect to?

A

Business Risk Register - details of how this document should be filled out can be found in section 6.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When should the Business Risk Register be updated?

A

At least annually.

Following any external or internal issues that could effect the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What examples does the Change Control Procedure apply to?

A

Computer Hardware, Software, Suppliers of critical services, equipment or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the objectives of the Security Incident Management Procedure?

A

To ensure all security incidents are reported promptly so any adverse effects can be limited.
Root causes can be identified and preventative action taken to prevent future incidents taking place.
Whoosh can meet the aims of the Information Security Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What document should be refereed to an employee is suspended due to a data security issue?

A

The Security Incident Management Procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If the confidentiality of a document is compromised, where should this be reflected?

A

The Asset and Risk Assessment Register and Personal Information Processing Register should be reviewed and edited in accordance to the Information Asset and Risk Management Procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between Business Risk Register and Asset and Risk Assessment Register?

A

Asset and Risk Assessment Register is asset specific. Any risks that are due to assets eg Service or data compromise due to social networking attacks. Business Risks is across the whole company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly