Chapter 1: Security and Risk Management Flashcards
What is CIA triad?
It’s an acronym that means confidentiality, integrity, and availability.
What HVAC stands for?
Heating, ventilation, and air conditioning
What is Availability protection ensure?
Availability protection ensures reliability and timely access to data and resources to authorized individuals.
What does integrity guarantee from a security point of view?
Integrity is upheld when the assurance of the accuracy and reliability of information and systems is provided and any unauthorized modification is prevented.
What is Confidentiality protection ensure?
Confidentiality ensures that the necessary level of secrecy is enforced at each junction of data processing and prevents unauthorized disclosure.
Six examples of Integrity
Hashing (data integrity)
Configuration management (system integrity)
Change control (process integrity)
Access control (physical and technical)
Software digital signing
Transmission cyclic redundancy check (CRC) functions
What is a Vulnerability?
A vulnerability is a weakness in a system that allows a threat source to compromise its security
What is a Threat?
A threat is any potential danger that is associated with the exploitation of a vulnerability
What is a Risk?
A risk is the likelihood of a threat source exploiting a vulnerability and the corresponding business impact.
What is an Exposure?
An exposure is an instance of being exposed to losses.
What is an Administrative Control?
Commonly referred to as “soft controls”, like security documentation, risk management, personnel security, and training.
What is a Technical Control?
Also called logical controls, they are software or hardware components, as in firewalls, IDS, encryption, and identification and authentication mechanisms.
What is a Physical Control?
Items put into place to protect facilities, personnel, and resources, like security guards, locks, fencing, and lighting.
What is the functionality of a Preventive Control?
Intended to avoid an incident from occurring
What is the functionality of a Detective Control?
Helps identify an incident’s activities and potentially an intruder
What is the functionality of a Corrective Control?
Fixes components or systems after an incident has occurred
What is the functionality of a Deterrent Control?
Intended to discourage a potential attacker
What is the functionality of a Recovery Control?
Intended to bring the environment back to regular operations
What is the functionality of a Compensating Control?
Controls that provide an alternative measure of control
What type of control are administrative, physical, and technical?
They are preventive in nature.
Security Program Development
ISO/IEC 27000 series
Enterprise Architecture Development
Zachman Framework, TOGAF, DoDAF, MODAF and SABSA model
Security Controls Development
COBIT 5, NIST SP 800-53 and COSO Internal Control— Integrated Framework
Process Management Development
ITIL, Six Sigma and Capability Maturity Model Integration (CMMI)
What BS7799 Part 1 outlined?
Control objectives and a range of controls that can be used to meet those objectives
What BS7799 Part 2 outlined?
How a security program (ISMS) can be set up and maintained
Why the companies seek for ISO/IEC 27001?
Check Information Security Management System (ISMS) requirements and attests to the organization’s compliance level
What are the four architecture types that TOGAF framework can develop?
Business architecture, Data architecture, Applications architecture and Technology architecture
What is the difference between an ISMS and an enterprise security architecture?
An ISMS outlines the controls that need to be put into place (risk management, vulnerability management, business continuity planning, data protection, auditing, configuration management, physical security, etc.) and provides direction on how those controls should be managed throughout their life cycle
The enterprise security architecture illustrates how these components are to be integrated into the different layers of the current business environment
What Business enablement means?
Business enablement means the core business processes are integrated into the security operating model—they are standards based and follow a risk tolerance criteria.
Help the business to achieve their goals but adding security controls to make it work securely.
What Process enablement means?
So while business enablement means “we can do new stuff,” process enhancement means “we can do stuff better.”
What Security Effectiveness means?
It’s a way to determine how useful the current security solutions and architecture as a whole are performing (using SLA, metrics, ROI…)
What is the difference between Enterprise and System Architectures
?
An enterprise architecture addresses the structure of an organization. A system architecture addresses the structure of software and computing components.
COBIT five key principles
Meeting stakeholder needs
Covering the enterprise end to end
Applying a single integrated framework
Enabling a holistic approach
Separating governance from management
What is the different between COSO IC and COBIT?
COSO IC deals more at the strategic level, while COBIT focuses more at the operational level
What is the different between Polymorphic and Metamorphic malware
A polymorphic virus decrypts its code, runs that code, and then when propagating itself encrypts the decrypted code with a different key. A metamorphic virus simply runs its code and then when propagating itself mutates its code into different but functionally identical code