Chapter 2 - Planning and Policy Flashcards

1
Q

How much of your time, if done properly, should Planning and Protection take up, compared to Response?

A

If all is done well with planning and protection, the two should take up about 90% of your time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the hardest, and most important, part of information security planning?

A

Management is the hardest and most important part of information security. Security is a process, not a product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is comprehensive security?

A

Comprehensive security is the state of having closed off all possible avenues of attack. This is pretty damn tricky, but very important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is weakest link failure?

A

Weakest link failure is the concept that it only takes one failure in any component or part of a security process to invalidate security efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is it best to manage security?

A

Security management must, MUST be formalized and continuous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When should security be factored into a new system?

A

Security should be considered at the very beginning of the design of a system, within the SDLC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the difference between police and security?

A

Security prevents “crime”. Police punish it more often than not, but rarely prevent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can IT security be planned?

A

IT security can be planned by identifying current security gaps, identifying the threat environment, laws and standards that impact security, and then identifying the corporate resources that need to be protected, calculating the worth of a resource compared to the cost of protecting it. The ones that provide the most return get protected first, and the rest get coverage as cycles move forward.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the benefits and downsides of having IT security located within IT?

A

With IT security located within IT, there will be a lot of technical compatibility, but it makes it rather hard for “whistle-blowing” on IT. It’s recommended that security be placed outside of IT, for that reason, although there are downsides (silo’d knowledge).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is it important to have “top management support”?

A

Top management support brings with it a significant increase in budget, but just as important, it also brings a good example to follow; if top management isn’t following ITSec, then no one else will. The inverse of this is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the best way to treat users? Or rather, how not to treat them?

A

THE USER IS NOT STUPID, JUST UNDER-EDUCATED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Single Loss Expectancy? How is it calculated?

A

Single Loss Expectancy (SLE) is the expected loss to an organization in the event of a compromise of a specific asset. This is calculated by taking the Asset Value (AV) and multiplying it by the Exposure Value (EV), which is the percentage of loss in value an asset suffers from being compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Annualized Loss Expectancy? How is it calculated?

A

Annualized Loss Expectancy (ALE) is the expected loss per year that an asset is projected to have, based on the probability of a compromise. This is calculated by multiplying the Single Loss Expectancy (SLE) by the Annualized Rate of Occurrence (ARO, the odds of a compromise happening in a year).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is classic risk analysis, and what are some problems with it?

A

Classic risk analysis takes a look at the Annualized Loss Expectancy and compares it to the annualized cost of the countermeasures, and determines the total value of the countermeasure (whether or not it’s cost-effective to prevent the loss).
This is good, but there are problems. Attack and defense costs will need to be calculated with discounted values (net present value), depreciation, that sort of thing. Also, not all compromises involve actual “loss” of data. Finally, the actual ARO is all but impossible to predict accurately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For what reasons is security management hard?

A

Security management is hard because it is abstract. That’s a lot of it. Also, the idea that all avenues of attack must be covered, and that if even one fails, they’re all basically gone, well. That doesn’t make it any easier. Finally, companies usually have a lot to protect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List the three stages in the plan–protect–respond cycle. Is there a sequential flow between the stages?

A

Plan, protect, respond. Simple enough. There actually is not a sequential flow, all three stages are occurring at once, and feed into one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Of the plan-protect-respond cycle, which phase consumes the most time?

A

The wide majority of time is spent on the protection phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the definition of protection?

A

Protection is the plan-based creation and operation of countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the definition of response?

A

Response is recovery according to plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the key factor to making security an enabler rather than a frustration?

A

To make security an enabler over a frustration, it is important to make security an early part of any given project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In developing an IT security plan, what would a company do first?

A

The first step of developing an IT security plan is to first identify the existing security, weaknesses and strengths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the major categories that drive IT security?

A

The major categories that drive IT security are the threat environment, laws and regulations, corporate structure, mergers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When can the Federal Trade Commission (FTC) act on companies?

A

The FTC can act on companies when they fail to take reasonable precautions to protect private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the usual title of the manager of the security department?

A

The manager of the security department is generally called the Chief Security Officer (CSO), or Chief Information Security Officer (CISO).

25
Q

Why is the HR department important to security?

A

HR is important to security because it is responsible for training, including security training. It also handles hiring and firing employees, and needs to work alongside security throughout these processes.

26
Q

What are the three main types of corporate auditing units?

A

The three types of corporate auditing units are:
Internal Auditing - Examines organizational units for efficiency, effectiveness, and adequate controls.
Financial Auditing - Examines financial processes for efficiency, effectiveness, and adequate controls.
IT Auditing - Examines processes involving IT for efficiency, effectiveness, and adequate controls.

27
Q

What is a Managed Security Service Provider?

A

A MSSP, or Managed Security Service Provider, is a system that takes event logs for a company’s network and monitors it for suspicious events, only notifying only for major incidents requiring events.

28
Q

What are the two main advantages of using a Managed Security Service Provider?

A

The main two benefits of using a managed security service provider are that an MSSP is experienced in dealing with threats and attacks, compared to an internal department, who might deal with one or two a year.
The other main benefit is independence. An MSSP can hold accountable everyone in a company, including IT and security staff.

29
Q

What security concerns are not usually outsourced?

A

Security planning and policy are generally not outsourced, as they are too vital and company-specific.

30
Q

Why is information assurance a poor name for IT security?

A

Information assurance leads to the idea that a company can guarantee the confidentiality of information, and that is not true.

31
Q

Why is reasonable risk the goal of IT security?

A

Reasonable risk is preferable because absolute security isn’t possible, and getting close to it can impact performance and be unpleasant.

32
Q

What are some negative consequences of IT security?

A

Some negative consequences of IT security would be psychological and productivity costs, and extensive expense.

33
Q

What is exposure factor?

A

Exposure factor is the percentage of an asset’s value that is lost in a breach.

34
Q

What is single loss expectancy?

A

Single loss expectancy is the amount of damage that would be sustained to a specific asset in a breach.

35
Q

What is the annualized probability/rate of occurrence?

A

The annualized rate of probability/occurrence is the expected number of times an attack will succeed in a year. Notoriously inaccurate.

36
Q

What is the annualized loss expectancy?

A

The annualized loss expectancy is how much a company stands to lose from an asset due to attacks in a given year.

37
Q

What are some flaws with classic risk analysis?

A

Some flaws in classic risk analysis are:
Uneven Multi-Year Cash Flows - Security countermeasures tend to get cheaper after their first year, and their benefits tend to increase. Over time, this inverts.
Total Cost of Incident - It’s damn hard to properly calculate loss of “value” in a breach.
Many-to-Many Relationships - Classic risk analysis assumes there’ll be one countermeasure to one asset; shit no, firewall protects everyone, baby. Basically, one countermeasure can work on multiple assets at once.

38
Q

What are four ways of responding to risk?

A
The four methods of responding to risk are:
Risk Reduction - Adopting active countermeasures to risks. 
Risk Acceptance - Understanding risks and doing nothing, generally when the cost of a countermeasure is greater than the damage that the risk could inflict.
Risk Transference (Insurance) - As long as reasonable countermeasures are in place, insurance will cover damages of risks.
Risk Avoidance - Flat-out not taking an action that seems too risky. "Kills" innovation, though.
39
Q

What is technical security architecture?

A

Technical security architecture is all of a company’s technical countermeasures and how those countermeasures are organized into a complete system of protection.

40
Q

Why is technical security architecture needed?

A

Technical security architecture allows a company to have a good understanding of the structure of their security, and allows them to see areas of weakness when compared to the security needs of the company.

41
Q

Why do firms not immediately replace their legacy security technology?

A

There are many reasons that a company might not replace its legacy security technology immediately; expense, technical complexity, difficulty of planning and implementation, and so on.

42
Q

What is the difference between the “Defense In Depth” philosophy and “Weakest Link”?

A

Defense in Depth refers to the idea of having multiple different, independent and overlapping countermeasures in place, so that if one fails, the others remain up. Weakest link refers to one countermeasure that is itself composed of multiple interdependent components.

43
Q

Why are central security management consoles dangerous?

A

A central security management console would give an illicit user the ability to do massive damage.

44
Q

Why are central security management consoles desirable?

A

Having a centralized location to manage security makes management and coordination considerably easier. This prevents things like inconsistent policies from being implemented.

45
Q

Why is border management important?

A

Border management is important because it keeps networks properly secured against the rest of the world.

46
Q

Why isn’t border management a complete security solution?

A

Border management (firewalls ‘n such) aren’t complete solutions because they don’t adhere to defense-in-depth.

47
Q

Why is remote connection from home a dangerous thing?

A

Often, connecting remotely from home involves using the users’ home computers, which can have god-only-knows-what on them, and lets that stuff onto the secured network.

48
Q

Why are interorganizational systems dangerous?

A

Interorganizational systems are dangerous because neither of the two companies can enforce their security standards on the other, or shit, even learn about the other’s security in general, leaving weaknesses.

49
Q

What’s so great about centralized security management?

A

Centralized security management is important because it allows for policies to be deployed easily from one or a few secure points, consistently, across all devices, immediately.

50
Q

What is a policy?

A

A policy is a statement of what should be done under certain circumstances. Note, what should be done, not how it should be done.

51
Q

What is implementation?

A

Implementation is how a policy is performed.

52
Q

What’s the difference between policy and implementation?

A

A policy sets the general goal and vision of what should occur under circumstances, and is generally static. Implementation can change as the required work to enact that policy may change.

53
Q

What are the categories of security policy?

A

These are the categories of security policy:
Corporate Policy - This is the topmost level of security policy, defining a firm’s stance on security. It should be brief and to the point.
Major Policy - More detailed than the corporate policy, the major policy are broad, but detailed. Things like email policies, hiring and termination policies, etc.
Acceptable Use Policy - An AUP details important points of a major policy as it applies specially to users, in a legally binding way.
Policies for Specific Resources/Countermeasures - The most detailed, these are necessary to fill in the ambiguity still left by Major Policies when it comes to individual needs.

54
Q

What is the difference between standards and guidelines?

A

Standards are mandatory implementation guidance, and they must be met. Guidelines are discretionary. The only requirement of a guideline is that it must be considered, not followed.

55
Q

When are guidelines appropriate?

A

Guidelines are appropriate in complex or uncertain situations where rigid standards might get snarled up. Think of situations where exceptions to the hard-and-fast rule might pop up from time to time.

56
Q

What is implementation guidance?

A

Implementation guidance is a way of limiting the “discretion” of implementers, trying to avoid bad implementation decisions when implementing policies, and trying to keep some consistency in implementation.

57
Q

What are some types of implementation guidance?

A

Some forms of implementation guidance are as follows:
Procedures - Procedures are highly detailed instructions as to the actions that must be taken by specific employees.
Processes - For more managerial positions, processes are necessary. Processes are high-level descriptions of what needs to be done, as it is often difficult to reduce everything to a series of low-level instructions.
Baselines - Baselines are meant to describe the necessary accomplishments, without actually describing the actions themselves required to produce them. Baselines must usually be tailored to specific situations.
Best Practices - Best practices are examples of what the top firms in an industry are doing about security.

58
Q

How does segregation of duties impact procedures?

A

Segregation of duties, if it’s being honored, would require that a procedure not be undertaken entirely by one person, to prevent them from being unchecked and causing possible harm. Mind you, collusion between people can still make this happen, but this helps.

59
Q

How are best practices different than recommended practices?

A

Best practices are examples distilled from top companies, generally applied. Recommended practices are prescriptive statements about what companies should do.