CGRC Week 2 Flashcards

1
Q

What is Corporate Governance?

A

A rulebook or a set of guidelines/polices that helps the company manage/conduct itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IS Governance?

A

Information Security governance ensures security strategies align with business objectives, comply with laws, and mitigate risks and achieves the CIA triad through leadership, structures and compliance enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Benefits of IS Governance?

A

1) Increase in Shared Value
2) Reduced Uncertainty
3) Protection from liability (lawsuits & penalities)
4) Optimise Allocation with structure and frameworks to limited security resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the SIX basic outcomes of IS Governance?

A

1) Strategic Alignment: Align with business strategies
2) Risk management: Reduces risks to acceptable levels by taking measures and mitigating IS risks
3) Value delivery: Optimizes IS investments to support business objectives
4) Performance measurement: Monitors security objectives whether if they are achieved.
5) Resource management: Efficiently utilizes security knowledge and tools. Basically, having a rulebook, policies for the organization to follow.
6) Integration: Making sure that all necessary security processes and controls work together seamlessly to protect information for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Framework?

A

It helps enterprises to respond rapidly with effective deployment of security governance infrastructure. Building a foundational security program that is cost-effective, aligning with business goals/objectives and reduce the impact of adverse events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a Framework consist of?

A

1) Security Strategies aligned with business goals
2) Security Policies to address the strategies, controls and regulations
3) Standards ensures procedures and guidelines comply with policies.
4) Organizational Structures provides sufficient authority & resources
5) Metrics & Monitoring processes to ensure compliance, provide feedbacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who makes decisions? Manage Teams and Strategies?

A

Senior Management (Board of Directors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the roles in IS Governance?

A

1) Board of Directors
2) Executive Management
3) Security Steering Committee
4) The Chief of Information Security Officer (CISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the responsibilites each role has?

A

1) Board of Directors
- Tone of risk appetite
- Risk Management

2) Executive Management
- Integrates security with business objectives

3) Security Steering Committee
Represented by senior representatives of the main operational and administrative functions to:
- Provide feedbacks and input on security strategies
- Review and advise if security initiatives meet business objectives
- Identify Risks and issues

4) The Chief of Information Security Officer (CISO)
- Conduct Risk Assessment
- Develop security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As a IS manager, you have created a security plan. What should be the next step?

A

Gaining the approval from senior management to have a required level of support which includes adequate resources and the sufficient authority, supporting security awareness training and addressing security issues with board and senior management meetings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a business case?

A

A business case is when an organization provides information required to decide whether the project should proceed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the considerations that can be called a “business case”

A

1) Value proposition (Is it worth the value? Is it cost-benefitting?)
2) Justification (Why is it so important then?)
3) Presentation (Brief overview of the project)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does COSO stand for? What does it provide?

A

A Committee of sponsoring organizations of the Treadway Committee

A process of internal controls effected by board of directors and management to provide assurance to the achievement of objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is COSO categorized?

A

Effectiveness and efficiency of operations
Reliability of financial reporting
Compliance with laws and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the five “effective” internal control system components of COSO to support the achievement of business objectives?

A

1) Risk Assessment
2) Control Environment
3) Control Activities
4) Information & Communication
5) Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does COBIT stand for? What does it provide?

A

Control Objectives for Information and related technologies

It is a framework that aligns IT strategies with organizational goals, risk management and regulatory compliance

17
Q

What are the 5 principles of COBIT 5

A

1) Meeting Stakehold needs
2) Covering enterprise end to end
3) Applying a single integrated framework
4) Enabling a holistic approach
5) Separating governance from management

18
Q

What does ITIL stand for? What does it provide?

A

Information Technology Infrastructure Library

Provides best practices for ITSM (IT Service Management) and helps IT services to align to business needs.

19
Q

What does ISO27000 Series provide?
What does ISO27001 do?
What does ISO27002 do?

A

1) It provides best practice recommendations on ISMS to keep organizations safe from information security risks

2) it specifies a checklist of what organizations need to do in order to set up their ISMS

3) Provides best practice recommendations for people who are responsible for maintaining or implementing ISMS