Chapter 1 Security Governance Through Principles and Policies Flashcards
Similar elements are put into groups, classes, or roles that
are assigned security controls, restrictions, or permissions as a collective.
Abstraction
Layering
Data Hiding
Encryption
Abstraction
use of multiple controls in a series.
Abstraction
Layering
Data Hiding
Encryption
Layering
the art and science of hiding the meaning or intent of a communication from
unintended recipients.
Abstraction
Layering
Data Hiding
Encryption
Encryption
preventing data from being discovered or
accessed by a subject by positioning the data in a logical storage compartment that is not
accessible or seen by the subject.
Abstraction
Layering
Data Hiding
Encryption
Data Hiding
A ______ is typically useful for about a year and often prescribes and schedules the tasks necessary to accomplish organizational goals.
Strategic Plan
Operational Plan
Tactical plan
tactical plan
a short-term, highly detailed plan
Strategic Plan
Operational Plan
Tactical plan
Operational Plan
a long-term plan that is fairly stable. It defines the organization’s security purpose. It also helps to understand security function and align it to goals, mission, and objectives of the organization.
Strategic Plan
Operational Plan
Tactical plan
Strategic Plan
The disclosure of this data does not compromise confidentiality or
cause any noticeable damage.
Top Secret
Secret
Confidential
Unclassified
Unclassified
The unauthorized disclosure of this data will have signifcant effects and cause critical damage to national security.
Top Secret
Secret
Confidential
Unclassified
Secret
The unauthorized disclosure of top-secret
data will have drastic effects and cause grave damage to national security.
Top Secret
Secret
Confidential
Unclassified
Top Secret
Used for data of a private, sensitive, proprietary, or highly valuable nature.
The unauthorized disclosure this data will have noticeable effects and cause serious damage to national security
Top Secret
Secret
Confidential
Unclassified
confidential
If this data is disclosed, it can have drastic effects on the competitive edge of an organization.
Confidential
Private
Sensitive
Public
Confidential
Its disclosure does not have a serious negative impact on the
organization.
Confidential
Private
Sensitive
Public
Public
data that is of a personal nature and intended for internal use only. A significant negative impact could occur for the company or individuals if this data is disclosed.
Confidential
Private
Sensitive
Public
Private
A negative impact could
occur for the company if sensitive data is disclosed.
Confidential
Private
Sensitive
Public
Sensitive
is responsible for reviewing and verifying that the security policy is
properly implemented and the derived security solutions are adequate.
Senior Manager Security Professional Data Owner Data Custodian User Auditor
Auditor
responsible for understanding and upholding the security policy of an
organization by following prescribed operational procedures and operating within defi ned
security parameters.
Senior Manager Security Professional Data Owner Data Custodian User Auditor
User
performs all activities necessary to provide adequate protection
for the CIA Triad (confi dentiality, integrity, and availability) of data and to fulfi ll
the requirements and responsibilities delegated from upper management.
Senior Manager Security Professional Data Owner Data Custodian User Auditor
Data Custodian