Chapter 3 - Info Sec Governance & Risk Management Flashcards
ITGI
IT Governance Institute defines IT governance as being the responsibility of the board of directors and executive management
Executive Management
maintains the overal responsibility for protection of the information assets. - Must be aware of risks that they are accepting
Security Officer
responsible for design, implementation, management, and review of the organization’s security policies, standards, procedures, baselines, and guidlines.
Information Systems Security Professional
drafting of policies, standards, guidelines and baselines is coordinated through these individuals.
Data/Information/Business Owners
assign appropriate classification to information assets. ensure business information is protected with appropriate controls. Need to determine the criticality, sensitivity, retention, backups and safeguards for the information. need to understand risks for information that they control.
Data/Information Custondian/Steward
takes care of the information on behalf of the owner. This group administers rights to the information assets.
Information Systems Auditor
determine compliance with policy, procedures, standards, baselines, designs, architectures, management direction and other requirements placed on systems. Provide top management with an independent view of controls and their effectiveness.
Business Continuity Planner
develop contigency plans. ensures business process can continue through the disaster and coordinates those activities with the buisness areas and information technology personnel responsible for disaster recovery.
Information Systems/Information Technology Professionals
responsible for designing security controls into information systems, testing the controls, and implementing the systems in production through agreed upon policies and procedures
Security Administrator
manages the user acces request process and ensures that privileges are provided to those individuals who have been authorized for access by application/system/data owners. Has elevated privileges and creates and deletes accounts and access permissions. Maintains records
Network/System Administrator
configures network and server hardware and the operating system, ensuring informaion is available and accessible
Physical Security
establish relationships with external law enforcement to assist in investigations. Manage the installation, maintenance and ongoin operation of the closed circuit television, burglar alarms, card reader access. Act as a deterrent to unauthorized access
Administrative Assistants/Secretaries
be subject to social engineering attacks
Help desk administrator
ususally where first security incidents will be seen. Contacts Computer Security Incident response team (CIRT). Reswet passwords, tokens and smart cards
Safe Harbor Provision
“good faith” conditions
Control Frameworks
Must be Consistent. meaurable, standardized, comprehensive, and modular
European Data Protection Directive
compliance with a legal action, protect life of subject, subject provided consent, performed within the scope of public interest and the law. NIST 800-3 ISO 27001