Chapter 2 - Governance and Risk Flashcards
Availability?
Uptime and timeliness
What is AIC or CIA?
Availability Integrity Confidentiality
Used to define security platform and threat surfaces
Integrity?
Unaltered information accuracy
Confidentiality?
Authorized disclosure
Shoulder surfing
Looking over the shoulder to view screen data or passwords
Social engineering
Tricking someone into divulging information
Vulnerability?
Lack of or weakness in a countermeasure that is exploitable
Threat?
The potential danger if a vulnerability is exploited
Threat Agent?
The entity that takes action on the threat and vulnerability
Risk?
The likelihood a threat agent will exploit a vulnerability and the impact that could cause to the business
Exposure?
This is the damage caused by a successful attack
Control?
Countermeasure to reduce risk a vulnerability may cause
Also known as safeguard
Deterrent control?
Discourage attacker
What three categories make for defense in depth ?
Administrative
Technical
Physical controls
Preventive control?
Avoid an incident entirely
Corrective control?
Fixes after an incident
Recovery control?
Intended to bring the environment back
Detective control?
Detect what occurred and who did it
Compensating control?
Alternative controls (a proxy server instead of a port block)
What three controls commonly make up a security policy?
Preventative, detective, and recovery
Why is security by obscurity a bad thing?
It assumes you are smarter than the attacker and in most cases lowers productivity
What cycle does the ISO standards follow?
Plan-Do-Check-Act (PDCA)
What is the BS7799? What did it become?
BS7799 was a British security defacto standard that was adopted by ISO 27000 it also goes by the name ISO 17799
What is the difference between framework and architecture?
Framework is an outline blueprint and architecture is the blueprint that fits the specific need
Define a view in terms of an enterprise architecture..
A view is how an individual element of a business supports the architectural integrity of a business
What is the benefit of having an architecture?
It shows the company as an organism and how each part has a role
An architecture is to a human body as views are to what?
A circulatory system
A bone structure
A digestive track
Etc.
What is the zachman framework best at illustrating?
A two dimensional view of each view in an architecture asking the 5 w’s for each
TOGAF is a comprised of what views of architecture?
In order:
Business
Data
Applications
Technology
What framework uses ADM as part of its definition?
TOGAF
What is the primary benefit of the complex DoD architectures like DODAF and MODAF?
Synchronous data types and standard communication channel so everyone is quickly on the same page
When do stakeholders become important?
When choosing an architecture that fits the business model. There concerns will help guide that decision.
What does tactical, strategic, and operational mean?
Strategic - the long term goals..(a retirement)
Tactical - the medium goals (a security plan in place)
Operational - short term (lock down that port)
ISMS
Information security management system
SABSA
It is a 2 dimension model like Zachman, using the 5 w’s to define security in increasing detail
What is a methodology?
A step by step process to implement and architecture
Strategic alignment?
The alignment of the business within an enterprise architecture
Business enablement?
Business needs and productivity come before security
Process enhancement?
Architecture planning will force diagnostics of business process and give a rich opportunity to fine tune the business process
Security effectiveness?
Use of tools like ROI SLA or baselines to see security efficiency
CobiT?
Controls oriented private business framework with 32 domains and complete checklist of it governance policies
NIST 800-53
Government version of a cobit like framework with specific steps
What is unique about the NIST categories?
Management
Technical
Operational
Instead of the standard:
Administrative
Technical
Physical
COSO
Architecture model focused on corporate governance instead of IT governance
What common law is built on COSO?
SOX
What is the primary focus of ITIL?
SLA
Six Sigma?
Process methodology architecture
CMMI?
Capability Maturity Model Integration
Used to help define maturity level of process, similar to cobit maturity model
Top-Down approach vs bottom-up approach
Top down is starting from senior management and working down. Bottom up is the other way around starting from the janitor up
What are the 4 domains of a security program life cycle?
Plan and organize
Implement
Operate and maintain
Monitor and evaluate
What is a blueprint?
Specific roles, outlines, responsibilities, or guidelines within the architecture
What is the first thing you do when securing and environment?
Find out how the business works down to the user and client experiences and up to the board members day to day
What is IRM?
Information Risk Management