Chapter 4 Flashcards

1
Q

What are standards?

A

more detailed statements of what must be done to comply with policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define the practice triangle.

A
Policies
Standards
Guidelines
Procedures
(Step by step instructions)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of policies?

A

Enterprise Information Security Policies NIST
Issue-specific security policies
System-specific security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the iso 27000 series of standards?

A

The ISO/IEC 27000 family of standards helps organizations keep information assets secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EISP?

A

Enterprise Information Security Policy.
Sets strategic direction, scope, and tone for all security efforts within the organization.
Drafted by the CIO of the organization.
Typically addresses compliance in two areas, ensure meeting requirements to establish program and responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EISP Components?

A

Statement of purpose
Defines information security
Importance of info sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISSP?

A

Issue-Specific Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does ISSP do?

A

Addresses specific areas of technology
Requires frequent updates
Contains statement on organization’s position on specific issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List approaches of ISSP

A

Create a number of independent ISSP documents
Create a signle comprehensive ISSP document
Create a modular ISSP document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some of the components of ISSP?

A

Statement of Policy
Authorized Access and Usage of Equipment
Prohibited use of Equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SysSP?

A

Systems-Specific Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does SysSP do?

A

It functions as standards and procedures used when configuring or maintaining systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is policy management and how is it used?

A

Policies must be managed as they constantly change.
To remain viable, security policies must have:
Individual responsible for the policy
A schedule of reviews
Method for making recommendations for reviews.
Specific policy issuance and revision date.
Automated policy management.
Sunset clause - expiry date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ISO 27000 series?

A

One of often discussed security models.

Purpose is to give recommendations for information and security management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is BIA?

A

Business Impact Analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does BIA do?

A

Investigation and assessment of the impact that various attacks can have on the organization.
Assumes security controls have been bypassed, have failed, or have proven ineffective, and attack has succeeded.

17
Q

Stages of BIA?

A
Threat attack identification
Business unit analysis
Attack success scenario development
Potential damage assessment
Subordinate plan classification
Continuity strategies.