Chapter 7: Security Flashcards
Managers must understand that breaches occur to?
- Clarify the picture of what is going on
- To understand their organization’s vulnerabilities,
- To protect their own company from damages caused by successful cyberattacks
What are the five (5) key steps to a successful and holistic cybersecurity program?
- Identify
- Protect
- Detect
- Respond
- Recover
An organizations ability to understand and manage cybersecurity risks.
Identify
Activities that safeguard critical infrastructure services
Protect
Activities to identify the occurrence of a cybersecurity event
Detect
Activities to take action regarding a detected cybersecurity incident
Respond
Activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident
Recover
What are the Five (5) Key Information Security Decisions?
- Strategy
- Infrastructure
- Policy
- Culture
- Investments
An information security decision that is based on such IT principles as protecting the confidentiality of customer information, strict compliance with regulations, and maintaining a security baseline that is above the industry benchmark.
Information security strategy
involve selecting and configuring the right tools to achieve consistency in protection, economies of scale, and synergy among the components.
Information security infrastructure
guidelines for the organization’s activities, both technical and organizational, to increase cyber resilience.
Information security policy
Cybersecurity behaviors that are important to the success of the business
Cybersecurity culture
applying the basic system updates and patches offered from the vendors of systems
cybersecurity hygiene
decisions about the appropriate level of investment must be made jointly with the security expertise of the IT security managers and with the business priorities expertise of the business managers
Information security investments
occur when unauthorized actors gain access to systems, passwords, data, or other assets.
Breach