Chapter 5: Prevention and Risk Management Flashcards

1
Q

Information Security Management System (ISIM)

A

Organizational internal control process that ensures the following 3 objectives in relation to data and information within the organization: integrity, confidentiality, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISIM Security Objectives

A

Confidentiality
Integrity
Availibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

This concept involves ensuring that data and information are made available only to authorized persons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A
  1. Accuracy means inputting the correct data into the system and then processing it as intended, without errors.
  2. Completeness ensures that no unauthorized additions, removals, or modifications are made to data that has been inputted into the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

This concept involves ensuring that data and information are available when and where they are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implementing ISMSsPlan Phase

A
  • Initiating the project
  • Defining the scope of the ISMS
  • Establishing an ISMS policy,
  • Performing a risk assessment,
  • Selecting risk treatments,
  • Selecting control objectives, and
  • Producing a statement of applicability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Implementing ISMSsPlan Phase

A
  • Initiating the project
  • Defining the scope of the ISMS
  • Establishing an ISMS policy,
  • Performing a risk assessment,
  • Selecting risk treatments,
  • Selecting control objectives, and
  • Producing a statement of applicability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

General categories of assets at risk:

A
  • Human resources
  • Information
  • Documents
  • Software
  • Physical equipment
  • Services
  • Company image and reputation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four security classifications?

A

Unclassified, Shared, Company only, Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unclassified

A

Unrestricted assets; the asset is available to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shared

A

Restricted access to specific groups of individuals including organizational insiders and outsiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Company only

A

Restricted access to organizational insiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Confidential

A

Restricted access to a specific list of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active Threat

A

Potential intentional attack on the information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Active Threat Examples

A
  • Input manipulation (most common source of fraud)
  • Direct file alteration (bypass normal software)
  • Program alteration (requires sophistication)
  • Data theft (hard to detect and prove)
  • Sabotage (disgruntled employees)
  • Misappropriation of information system resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information security assurance (ISA)

A

Refers to some type of evidence-based assertion that increases the certainty that a security-related deliverable can withstand specified security threats.

17
Q

target of evaluation (TOE)

A

performing assurance activities that satisfy a predefined security target or security protection profile.

18
Q

target of evaluation (TOE)

A

This is the information security deliverable, the object for which assurances are made.

19
Q

Assurance activities

A

These activities depend on the method of assessment. Various methods of assessment are discussed later.

20
Q

Security target (ST)

A

This is the set of security specifications and requirements used to evaluate the target of evaluation.

21
Q

Security protection profile (SPP)

A

Similar to a security target, this profile is much broader in scope. Unlike an ST, a SPP does not apply to any one particular deliverable but represents the security needs of a given individual or group of individuals.