Chapter 4: Governance and Risk Management Flashcards

1
Q

Security Programme

A

An ongoing management activity for the preservation and advancement of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most crucial element in a programme

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Charter

A

Top of the policies and standards library; usually built by management; another word for a programme level policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policy informational elements (best practice)

A

Title,
Purpose
Authorizing individual,
Author,
Other policy references,
Scope,
Measurement expectations,
Exception process,
Accountability,
Compliance management (and measurements description)
Effective/expiration dates,
Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Programme level policy

A

Management sponsored “mission statement”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Programme framework policy

A

Describes the elements and organization of the program and department(s) that will carry out the programme level policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Issue specific policy

A

Addresses specific issues or sets of issues of concern to the organization. Can be regulatory or compliance oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System specific policy

A

Focuses on a specific system, such as an access system, a particular piece of equipment, or legacy items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PLP Purpose

A

Defines goals of the program and structure. My designate high level departments or offices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PLP Scope

A

Specifies which resources, information, and personnel are covered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PLP Responsibilities

A

Addresses which officials, offices, owners, and users are responsible for which tasks and own which information and to what degree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PLP Compliance

A

Authorizes creation of guidelines for penalties or disciplinary actions for those who do not fulfill their responsibilities

Must account for both willful and unwillful noncompliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PFP - Descriptive Points

A

More stable long term than an issue specific policy
Can address multiple semi related issues in one shot
Examples include business continuity planning, application development security frameworks, physical security requirements for data centers, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISP- Issue Statement

A

Defines the issue and includes any relevant terms, distinctions, or conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISP - Position

A

States an organization’s position clearly on the issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISP - Applicability

A

States when, where, how, to whom and to what a particular policy applies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ISP - Roles and Responsibilities

A

Assigns roles and responsibilities within the issue

18
Q

ISP - Compliance

A

Describes penalties and disciplinary actions in cases of violation. May require coordination with collective bargaining bodies.

19
Q

ISP - Points of Contact and Supplemental Info

A

Lists who to talk to if more information is required or if an issue requires an interaction (a manager, administrator, etc)

20
Q

Security Objectives

A

Series of statements to describe meaningful actions about specific resources; connected to

21
Q

Operational Security

A

Nuts and bolts of who can access which things and when

22
Q

Formal policies

A

Security role assignments, access lists, anything controversial

23
Q

Policy implementation

A

Requires both hardware and software as well as the human element… how do you actually achieve the granular level of the thing you want?

24
Q

Regulations

A

Laws passed by regulators or lawmakers (GLBA,HIPAA, etc)

25
Q

Standards and baselines

A

Topic specific (standards) or system specific (baselines) that describe how to achieve a particular security state; NIST, etc. What auditors are looking for when they audit a company

26
Q

Guidelines

A

Best practices (often from industry) in implementing a preferred state of security

27
Q

Procedures

A

Step by step instructions for a process; ensures repeatability

28
Q

ISO/IEC 17799

A

Common set of standards used to describe domains similarly to CISSP; suggestive in nature

29
Q

British Standard 7799

A

More specific that ISO/IEC 17799; places specific dictates about how to meet general principles or areas of responsibility

30
Q

Control Objectives for Information and Related Technology (COBIT)

A

Standards preferred by many IT auditors

31
Q

Public information

A

Marketing content on a website, directories of contact information, published reports

32
Q

Business sensitive/confidential

A

Comapny directories, GALs, internal policies, invoice info

33
Q

Customer confidential

A

Any customer PII, SSN, credit card numbers, account activity, purchase activity, grades

34
Q

Trade secret

A

Secret recipes, disciplinary actions, proprietary info

35
Q

Quantitative Risk Analysis

A

Independent set of risk metrics and statistics

36
Q

Annualized Loss Expectancy (ALE)

A

Single loss expectency (SLE) multiplied by annual rate of occurance (ARO)

37
Q

Qualitative Risk Analysis

A

Uses only estimates of potential loss and takes into account Threats, Vulnerabilities, and Controls

38
Q

Threats (QRA)

A

Things that can go wrong or attack the system; always exists, can’t be eliminated

39
Q

Vulnerabilities (QRA)

A

Makes a system more prone to attack or more likely to see a threat realized (combustible paper in a flammable zone, for example)

40
Q

Controls (QRA)

A

Countermeasures for vulnerabilities; consist of deterrents, preventatives, correctives, detectives, and recoveries

41
Q

Risk

A

Exists when there is the presence of a threat, a corresponding vulnerability, and the likelihood that someone will exploit them both

42
Q

Three questions Risk Analysis asks

A

What am I trying to protect?
What is threatening my system?
How much time, effort and money am I willing to spend