3. Information Security Program Development & Management Flashcards
Name the two common Enterprise Architecture Framework
The Open Group Architecture Framework (TOGAF) and the Zachman Framework
What are the key elements of TOGAF
Business-driven, life-cycle management framework for enterprise architecture
Multiple phases starting with Preliminary, Vision Business Architecture, Technology Architecture, Oppurtunites and solutions, migration planning, governance, etc.
What is unique about Zachman Framwork
Similar to office building architecture. Starts with high-level and then increasingly detail.
Does not convey the relationship between IT Systems. Data Flow diagrams are used instead.
What are the components of ISACA’s Risk-IT Framework
Risk Governance - includes integrating with organizations ERM
Risk Evaluation
Risk Response
T or F a vulnerability ranking is influenced by probability of that threat will be realized and the asset value
False - a vulnerability ranking should depend on whether the threat will actually bring about harm to the asset.
T or F that Asset Value is always the replacement value
False - usually but now always
What is the financial loss that results from the realization of a threat expressed in percentage of the assets totals value
Exposure Factor (EF)
Most threats do not completely eliminate the asset value but instead reduce it.
SLE represents what?
Single loss expectancy is the value when the threat is realized one time.
AV X EF - SLE
What is the term for the estimate of the number of times that a threat will occur per year
Annual Rate of Occurrence
1 in 10 is 10%
1 in 50 is 2%
ALE is ?
Annualized loss expectancy
SLE X ARO = ALE
What is some Risk Analysis Standards
NIST 800-30
ISO/IEC 27005
Who is the best person (s) to make a decision on risk treatment
Security steering commitee
T or F being compliant is the same as being secure
False
Compliance is a checkbox starting point
What is another name for span port
Network Tap
What are the 3 types of controls
Physical
Technical
Administrative
What are some examples of Preventative Controls
Login Screens
Keycard screens
Encryption
What are some examples of Detective Controls
Video Surveillance
Event Logs
What are some examples of Deterrent Controls
Guard Dogs
Warning Signs
Visible Video Surveillance
Note: Deterrent controls only work if they are known by potential vioalator