8. Controls for Information Security Flashcards

1
Q

What does the The Trust Services Framework do?

Tip: IT-related control

A

The Trust Services Framework organizes IT-related controls into five principles that contribute systems reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the five principles

Tip: chapter 8, 9 og 10

A
Security
Confidentiality/fortroligt (chapter 9)
Privacy (chapter 9)
Processing Integrity (chapter 10)
Availability (chapter 10)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe security from chapter 8

A
  1. Security – access to the system and its data is controlled and restricted to legitimate user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is security a management issues and just not a technical issue?

Tip: security of life cycle 1) response, 2) develop and communicate policy, 3) acquire and implement solutions, 4) monitor performance

A

Because of the security life cycle

  1. Assess threats and select risk response (from chapter 7)
  2. Develop and communicate policy - to all employees, managers must be involved in a high degree and the employees receive training and not only handed out documents
  3. Acquire and implement solutions – build or acquire specific technological tools to identify threats and achieve the desired level of security
  4. Monitor performance – regular evaluating the effectiveness of the organizations information security program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Defense-in-depth is about having multiple layers of control (Protection and Detection) to avoid a single point of failure:
Training, firewalls, Multiple authentication methods, log analysis, continuous monitoring.

Explain the time-based model of information security

A

The time-based model of information security: employ a combination of preventive, detective and corrective controls to protect information assets long enough to enable an organization to recognize that an attack is occurring and take the steps to thwart it before any information is lost or comprised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can organizations timely respond to attacks against their information system from COBIT 5?

Tip: CRIT, consist of who? and a) recognize, b) containment, c) recovery and d) patch

Chief information security officer

A

Establish a computer incident response team (CIRT) that should consist of specialist and senior operations management. It’s CRIT responsibility to

a) recognize that a problem exist,
b) containment of the problem,
c) recovery,
d) follow-up about how and why the system was comprised and patch it.

Also hire a chief information security officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Distinguish between user access control; authentication and authorization

A

Authentication: verifies the person, it could be something the person knows or has like biometric characteristic.

Authorization: what a person can get access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe confidentiality(fortroligt) and privacy from chapter 9

A
  1. Confidentiality – sensitive organizational information is protected from unauthorized disclosure
  2. Privacy – personal information about customers, employees, suppliers or business partners is collected, used, disclosed and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe processing integrity and availability from chapter 10

A
  1. Processing Integrity – data are processed accurately, completely, in timely manner and only with proper authorization
  2. Availability – the system and its information are available… to meet operational and contractual obligations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to improve network access control

Tip: smaller networks

A

Physical defense using routers and firewalls dividing the total network into smaller networks.

Some networks are open for public (homepage, web shop, Wi-Fi, etc.) in the demilitarized zone.

Remaining network is only for internal use at different locations and departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly