Chapter 5: Security Governance Concepts, Principles, and Policies Flashcards

1
Q

What is the purpose of security management planning?

A

Ensuring the proper creation, implementation, and enforcement of a security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most important key factor in a security plan?

A

Senior management approval. Without this, it’s toothless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a strategic plan?

A

A long term, fairly stable plan defining the organization’s security purpose. Useful for about 5 years if updated annually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a tactical plan?

A

A midterm plan developed to provide more details on accomplishing the goals of the strategic plan. Useful for about a year, and often prescribes and schedules taks. Includes project, acquisition, hiring, budget, maintenance, support, and system development plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an operational plan?

A

A short term, highly detailed plan based on the strategic and tactical plans, valid and useful only for a short time. Includes resource allotments, budgetary requirements, staffing assignments, scheduling, step by step or implementation procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is security governance?

A

The collection of practices related to supporting, defining, and directing the security efforts of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the sources of governance?

A

Some are imposed due to legislative and regulatory compliance needs. Others are imposed by industry guidelines or license requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the responsibilities of the senior manager?

A

Ultimately responsible for the security of the organization
Should be most concerned about the protection of its assets
All activities must be approved by this role
Rarely implements the solutions directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the responsibilities of the security professional?

A

AKA InfoSec officer or CIRT.
Responsible for following the directives mandated by senior management
Functional responsibility for security, including writing the security policy and implementing it.
Often filled by a team responsible for desigining and implementing security solutions based on an approved security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the responsibilities of the data owner?

A

Responsible for classifying information for placement and protection within the security solution.
Typically a high-level manager ultimately responsible for data protection
Data management is usually delegated to a data custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the responsibilities of the data custodian?

A

Responsible for the tasks of implementing the proscribed protection defined by the security policy and senior management.
CIA triad
Backups/testing/deploying security solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the responsibilities of the user?

A

Any person who has access to the secured system.
Responsible for understanding and upholding the security policy by following prescribed operational procedures and operating within defined security parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the responsibilities of the auditor?

A

Responsible for reviewing and verifiying that the security policy is properly implemented and the security solutions are adequate. Produces compliance and effectiveness reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define “privacy”.

A
  1. Active prevention of unauthorized access to information that is personally identifiable
  2. Freedom from unauthorized access to information deemed personal or confidential
  3. Freedom from being observed, monitored, or examined without consent or knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the CIA Triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Confidentiality?

A

A high level of assurance that data, objects, or resources are restricted from unauthorized subjects.

17
Q

What is Integrity?

A

Objects must retain their veracity and be intentionally modified only by authorized subjects.

18
Q

What are the three perspectives on maintaining integrity?

A
  1. Prevent unauthorized subjects from making modifications
  2. Prevent authorized subjects from making unauthorized modifications
  3. Maintain internal and external consistency so that data is correct and true
19
Q

What is Availability?

A

Authorized subjects are granted timely and uninterrupted access to objects.

20
Q

More from 218-220?

A

.

21
Q

What is a Security Policy?

A

A document that defines the scope of security needed by the organization and discusses the assets that need protection and the extent to which security solutions should go to provide the necessary protection.

22
Q

What are the three categories of security policies?

A

Regulatory, advisory, and informative

23
Q

When is a regulatory security policy required?

A

When industry or legal standards are applicable to your organization.

24
Q

What is an advisory security policy?

A

One that discusses behaviors and activities that are acceptable and defines consequences for violations.

25
Q

What is an informative security policy?

A

One that is designed to provide information or knowledge about a specific subject, such as company goals, mission statements, or how the organization interacts with partners and customers.

26
Q

What are security standards?

A

Definitions of compulsory requirements for the homogenous use of hardare, software, technology, and security controls.

27
Q

What are the goals of Change Control?

A
  1. Implement changes in a monitored and orderly manner
  2. Include a formalized testing process to verify that a change produces expected results
  3. All changes can be reversed
  4. Users are informed of changes before they occur to prevent lost productivity
  5. Effects of changes are systematically analyzed
  6. Negative impact of changes on capabilities, functionality, and performance is minimized.
28
Q

What is the primary objective of data classification?

A

To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity. Data classification is used to provide security mechanizms for storing, processing, and transferring data, as well as removing and destroying it.

29
Q

What are the steps of implementing a data classification scheme?

A
  1. Identify the custodian and define their responsibilities
  2. Specify the evaluation criteria of how the information will be classified and labeled.
  3. Classify and label each resource (by owner, reviewed by supervisor)
  4. Document exceptions to the classification policy, integrate them into the policy
  5. Select the security controls that will be applied to each classification level to provide necessary protection
  6. Specify procedures for declassifying resources or transferring them to an external entity.
  7. Create an enterprise wide awareness system
30
Q

What are the two common classification schemes?

A

Government/military and commercial business/private sector

31
Q

What are the five levels of government/military classification?

A
Top secret
Secret
Confidential
Sensitive but unclassified
Unclassified
32
Q

More?

A

p 227

33
Q

What are the four levels of commercial/private classificatioN/

A

Confidential
Private
Sensitive
Public

34
Q

More?

A

p 228