Chapter4 Flashcards
List the 6 steps to developing a complaint security program
1 - Identify information Assets
2- Conducting risk assessment
3 - Selecting & Implementing security controls
4 - Monitor & Test the controls
5 - Review & Adjust the program
6 - Oversee third party service providers
Which step is the baseline for security controls?
Step 2: Conducting a risk assessment
What is a threat?
Anything that has the potential to cause harm
What is a Vulnerability?
Flaw or weakness that can be exploited.
What are the 3 security controls?
Physical Security Controls
Technical Security Controls
Administrative Security Controls
Factors citied in security statutes and regulations:
Organization size and combabilities Nature & Scope of the business Nature and sensitivity of information State of the art tech. Cost of the security Infrastructure Capabilities
Businesses must conduct periodic internal reviews to evaluate and adjust the information security program as a result of:
Testing & Monitoring Material Changes to the business Changes in technology Changes in threats Environmental or operational changes
What are the 3 basic requirements on businesses for outsourcing?
1- Exercising due diligence in selecting service provider
2- Contractually require outsource provider to implement appropriate security measures
3- Monitor the performance of the outsource provider
Physical Security Controls focuses on?
Facility and equipment
Media
Technical security controls focus on?
Access Controls
Identification and authentication
System and service acquisition Controls
System and information Integrity
Administrative Security Controls focus on?
Personal Security
Employee awareness and training
Contigency
Administrative Security Controls focus on?
Personal Security
Employee awareness and training
Contingency Planning, backup & disaster recovery
Incident Response Plan
3 categorization to protect facility and equipment
Physical access restriction
Protection against technological failures
Protection against environmental threats
Security Laws & Regulations require to protect data media from being:
Read
Copied
Altered
Removed
Controlling access to system and data requires?
Identification
Authentication
Authorization