Chapter 2 - Planning and Policy Flashcards
How much of your time, if done properly, should Planning and Protection take up, compared to Response?
If all is done well with planning and protection, the two should take up about 90% of your time.
What is the hardest, and most important, part of information security planning?
Management is the hardest and most important part of information security. Security is a process, not a product.
What is comprehensive security?
Comprehensive security is the state of having closed off all possible avenues of attack. This is pretty damn tricky, but very important.
What is weakest link failure?
Weakest link failure is the concept that it only takes one failure in any component or part of a security process to invalidate security efforts.
How is it best to manage security?
Security management must, MUST be formalized and continuous.
When should security be factored into a new system?
Security should be considered at the very beginning of the design of a system, within the SDLC.
What’s the difference between police and security?
Security prevents “crime”. Police punish it more often than not, but rarely prevent.
How can IT security be planned?
IT security can be planned by identifying current security gaps, identifying the threat environment, laws and standards that impact security, and then identifying the corporate resources that need to be protected, calculating the worth of a resource compared to the cost of protecting it. The ones that provide the most return get protected first, and the rest get coverage as cycles move forward.
What are the benefits and downsides of having IT security located within IT?
With IT security located within IT, there will be a lot of technical compatibility, but it makes it rather hard for “whistle-blowing” on IT. It’s recommended that security be placed outside of IT, for that reason, although there are downsides (silo’d knowledge).
Why is it important to have “top management support”?
Top management support brings with it a significant increase in budget, but just as important, it also brings a good example to follow; if top management isn’t following ITSec, then no one else will. The inverse of this is true.
What is the best way to treat users? Or rather, how not to treat them?
THE USER IS NOT STUPID, JUST UNDER-EDUCATED.
What is Single Loss Expectancy? How is it calculated?
Single Loss Expectancy (SLE) is the expected loss to an organization in the event of a compromise of a specific asset. This is calculated by taking the Asset Value (AV) and multiplying it by the Exposure Value (EV), which is the percentage of loss in value an asset suffers from being compromised.
What is Annualized Loss Expectancy? How is it calculated?
Annualized Loss Expectancy (ALE) is the expected loss per year that an asset is projected to have, based on the probability of a compromise. This is calculated by multiplying the Single Loss Expectancy (SLE) by the Annualized Rate of Occurrence (ARO, the odds of a compromise happening in a year).
What is classic risk analysis, and what are some problems with it?
Classic risk analysis takes a look at the Annualized Loss Expectancy and compares it to the annualized cost of the countermeasures, and determines the total value of the countermeasure (whether or not it’s cost-effective to prevent the loss).
This is good, but there are problems. Attack and defense costs will need to be calculated with discounted values (net present value), depreciation, that sort of thing. Also, not all compromises involve actual “loss” of data. Finally, the actual ARO is all but impossible to predict accurately.
For what reasons is security management hard?
Security management is hard because it is abstract. That’s a lot of it. Also, the idea that all avenues of attack must be covered, and that if even one fails, they’re all basically gone, well. That doesn’t make it any easier. Finally, companies usually have a lot to protect.
List the three stages in the plan–protect–respond cycle. Is there a sequential flow between the stages?
Plan, protect, respond. Simple enough. There actually is not a sequential flow, all three stages are occurring at once, and feed into one another.
Of the plan-protect-respond cycle, which phase consumes the most time?
The wide majority of time is spent on the protection phase.
What is the definition of protection?
Protection is the plan-based creation and operation of countermeasures.
What is the definition of response?
Response is recovery according to plan.
What is the key factor to making security an enabler rather than a frustration?
To make security an enabler over a frustration, it is important to make security an early part of any given project.
In developing an IT security plan, what would a company do first?
The first step of developing an IT security plan is to first identify the existing security, weaknesses and strengths.
What are the major categories that drive IT security?
The major categories that drive IT security are the threat environment, laws and regulations, corporate structure, mergers, etc.
When can the Federal Trade Commission (FTC) act on companies?
The FTC can act on companies when they fail to take reasonable precautions to protect private information.