CISM Practice A Topic 1 Flashcards
Which of the following should be the FIRST step in developing an information security plan?
Perform a technical vulnerabilities assessment
Analyze the current business strategy
Perform a business impact analysis
Assess the current levels of security awareness
Analyze the current business strategy
Prior to assessing technical vulnerabilities or levels of security awareness, an information security manager needs to gain an understanding of the current business strategy and direction. A business impact analysis should be performed prior to developing a business continuity plan, but this would not be an appropriate first step in developing an information security strategy because it focuses on availability.
Senior management commitment and support for information security can BEST be obtained through presentations that:
use illustrative examples of successful attacks.
explain the technical risks to the organization.
evaluate the organization against best security practices.
tie security risks to key business objectives.
tie security risks to key business objectives.
Senior management seeks to understand the business justification for investing in security. This can best be accomplished by tying security to key business objectives. Senior management will not be as interested in technical risks or examples of successful attacks if they are not tied to the impact on business environment and objectives. Industry best practices are important to senior management but, again, senior management will give them the right level of importance when they are presented in terms of key business objectives.
The MOST appropriate role for senior management in supporting information security is the:
evaluation of vendors offering security products.
assessment of risks to the organization.
approval of policy statements and funding.
monitoring adherence to regulatory requirements.
approval of policy statements and funding.
Since the members of senior management are ultimately responsible for information security, they are the ultimate decision makers in terms of governance and direction. They are responsible for approval of major policy statements and requests to fund the information security practice. Evaluation of vendors, assessment of risks and monitoring compliance with regulatory requirements are day-to-day responsibilities of the information security manager; in some organizations, business management is involved in these other activities, though their primary role is direction and governance.
Which of the following would BEST ensure the success of information security governance within an organization?
Steering committees approve security projects
Security policy training provided to all managers
Security training available to all employees on the intranet
Steering committees enforce compliance with laws and regulations
Steering committees approve security projects
The existence of a steering committee that approves all security projects would be an indication of the existence of a good governance program. Compliance with laws and regulations is part of the responsibility of the steering committee but it is not a full answer. Awareness training is important at all levels in any medium, and also an indicator of good governance. However, it must be guided and approved as a security project by the steering committee.
Information security governance is PRIMARILY driven by:
technology constraints.
regulatory requirements.
litigation potential.
business strategy.
business strategy.
Governance is directly tied to the strategy and direction of the business. Technology constraints, regulatory requirements and litigation potential are all important factors, but they are necessarily in line with the business strategy.
Which of the following represents the MAJOR focus of privacy regulations?
Unrestricted data mining
Identity theft
Human rights protection
Identifiable personal data
Identifiable personal data
Protection of identifiable personal data is the major focus of recent privacy regulations such as the Health Insurance Portability and Accountability Act (HIPAA). Data mining is an accepted tool for ad hoc reporting; it could pose a threat to privacy only if it violates regulator provisions. Identity theft is a potential consequence of privacy violations but not the main focus of many regulations. Human rights addresses privacy issues but is not the main focus of regulations.
Investments in information security technologies should be based on:
vulnerability assessments.
value analysis.
business climate.
audit recommendations.
value analysis.
Investments in security technologies should be based on a value analysis and a sound business case. Demonstrated value takes precedence over the current business climate because it is ever changing. Basing decisions on audit recommendations would be reactive in nature and might not address the key business needs comprehensively. Vulnerability assessments are useful, but they do not determine whether the cost is justified.
Retention of business records should PRIMARILY be based on:
business strategy and direction.
regulatory and legal requirements.
storage capacity and longevity.
business case and value analysis.
regulatory and legal requirements.Retention of business records is generally driven by legal and regulatory requirements. Business strategy and direction would not normally apply nor would they override legal and regulatory requirements. Storage capacity and longevity are important but secondary issues. Business case and value analysis would be secondary to complying with legal and regulatory requirements.
Which of the following is characteristic of centralized information security management?
More expensive to administer
Better adherence to policies
More aligned with business unit needs
Faster turnaround of requests
Better adherence to policies
Centralization of information security management results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economics of scale. However, turnaround can be slower due to the lack of alignment with business units.
Successful implementation of information security governance will FIRST require:
security awareness training.
updated security policies.
a computer incident management team.
a security architecture.
updated security policies.
Updated security policies are required to align management objectives with security procedures; management objectives translate into policy, policy translates into procedures. Security procedures will necessitate specialized teams such as the computer incident response and management group as well as specialized tools such as the security mechanisms that comprise the security architecture. Security awareness will promote the policies, procedures and appropriate use of the security mechanisms.
Which of the following individuals would be in the BEST position to sponsor the creation of an information security steering group?
Information security manager
Chief operating officer (COO)
Internal auditor
Legal counsel
Chief operating officer (COO)
The chief operating officer (COO) is highly-placed within an organization and has the most knowledge of business operations and objectives. The chief internal auditor and chief legal counsel are appropriate members of such a steering group. However, sponsoring the creation of the steering committee should be initiated by someone versed in the strategy and direction of the business. Since a security manager is looking to this group for direction, they are not in the best position to oversee formation of this group.
The MOST important component of a privacy policy is:
notifications.
warranties.
liabilities.
geographic coverage.
notifications.
Privacy policies must contain notifications and opt-out provisions: they are a high-level management statement of direction. They do not necessarily address warranties, liabilities or geographic coverage, which are more specific.
The cost of implementing a security control should not exceed the:
annualized loss expectancy.
cost of an incident.
asset value.
implementation opportunity costs
asset value.
The cost of implementing security controls should not exceed the worth of the asset. Annualized loss expectancy represents the losses that are expected to happen during a single calendar year. A security mechanism may cost more than this amount (or the cost of a single incident) and still be considered cost effective. Opportunity costs relate to revenue lost by forgoing the acquisition of an item or the making of a business decision.
When a security standard conflicts with a business objective, the situation should be resolved by:
changing the security standard.
changing the business objective.
performing a risk analysis.
authorizing a risk acceptance.
performing a risk analysis.
Conflicts of this type should be based on a risk analysis of the costs and benefits of allowing or disallowing an exception to the standard. It is highly improbable that a business objective could be changed to accommodate a security standard, while risk acceptance* is a process that derives from the risk analysis.
Minimum standards for securing the technical infrastructure should be defined in a security:
strategy.
guidelines.
model.
architecture.
architecture.
Minimum standards for securing the technical infrastructure should be defined in a security architecture document. This document defines how components are secured and the security services that should be in place. A strategy is a broad, high-level document. A guideline is advisory in nature, while a security model shows the relationships between components.
Which of the following is MOST appropriate for inclusion in an information security strategy?
Business controls designated as key controls
Security processes, methods, tools and techniques
Firewall rule sets, network defaults and intrusion detection system (IDS) settings
Budget estimates to acquire specific security tools
Security processes, methods, tools and techniques
A set of security objectives, processes, methods, tools and techniques together constitute a security strategy. Although IT and business governance are intertwined, business controls may not be included in a security strategy. Budgets will generally not be included in an information security strategy. Additionally, until information security strategy is formulated and implemented, specific tools will not be identified and specific cost estimates will not be available. Firewall rule sets, network defaults and intrusion detection system (IDS) settings are technical details subject to periodic change, and are not appropriate content for a strategy document.
Senior management commitment and support for information security will BEST be attained by an information security manager by emphasizing:
organizational risk.
organization wide metrics.
security needs.
the responsibilities of organizational units.
organizational risk.
Information security exists to help the organization meet its objectives. The information security manager should identify information security needs based on organizational needs. Organizational or business risk should always take precedence. Involving each organizational unit in information security and establishing metrics to measure success will be viewed favorably by senior management after the overall organizational risk is identified.
Which of the following roles would represent a conflict of interest for an information security manager?
Evaluation of third parties requesting connectivity
Assessment of the adequacy of disaster recovery plans
Final approval of information security policies
Monitoring adherence to physical security controls
Final approval of information security policies
Since management is ultimately responsible for information security, it should approve information security policy statements; the information security manager should not have final approval. Evaluation of third parties requesting access, assessment of disaster recovery plans and monitoring of compliance with physical security controls are acceptable practices and do not present any conflicts of interest.
Which of the following situations must be corrected FIRST to ensure successful information security governance within an organization?
The information security department has difficulty filling vacancies.
The chief information officer (CIO) approves security policy changes.
The information security oversight committee only meets quarterly.
The data center manager has final signoff on all security projects.
The data center manager has final signoff on all security projects.
A steering committee should be in place to approve all security projects. The fact that the data center manager has final signoff for all security projects indicates that a steering committee is not being used and that information security is relegated to a subordinate place in the organization. This would indicate a failure of information security governance. It is not inappropriate for an oversight or steering committee to meet quarterly. Similarly, it may be desirable to have the chief information officer (CIO) approve the security policy due to the size of the organization and frequency of updates. Difficulty in filling vacancies is not uncommon due to the shortage of good, qualified information security professionals.
Which of the following requirements would have the lowest level of priority in information security?
Technical
Regulatory
Privacy
Business
Technical
Information security priorities may, at times, override technical specifications, which then must be rewritten to conform to minimum security standards. Regulatory and privacy requirements are government-mandated and, therefore, not subject to override. The needs of the business should always take precedence in deciding information security priorities.
When an organization hires a new information security manager, which of the following goals should this individual pursue FIRST?
Develop a security architecture
Establish good communication with steering committee members
Assemble an experienced staff
Benchmark peer organizations
Establish good communication with steering committee members
New information security managers should seek to build rapport and establish lines of communication with senior management to enlist their support. Benchmarking peer organizations is beneficial to better understand industry best practices, but it is secondary to obtaining senior management support. Similarly, developing a security architecture and assembling an experienced staff are objectives that can be obtained later.
It is MOST important that information security architecture be aligned with which of the following?
Industry best practices
Information technology plans
Information security best practices
Business objectives and goals
Business objectives and goals
Information security architecture should always be properly aligned with business goals and objectives. Alignment with IT plans or industry and security best practices is secondary by comparison.
Which of the following is MOST likely to be discretionary?
Policies
Procedures
Guidelines
Standards
Guidelines
Policies define security goals and expectations for an organization. These are defined in more specific terms within standards and procedures. Standards establish what is to be done while procedures describe how it is to be done. Guidelines provide recommendations that business management must consider in developing practices within their areas of control; as such, they are discretionary.
Security technologies should be selected PRIMARILY on the basis of their:
ability to mitigate business risks.
evaluations in trade publications.
use of new and emerging technologies.
benefits in comparison to their costs.
ability to mitigate business risks.
The most fundamental evaluation criterion for the appropriate selection of any security technology is its ability to reduce or eliminate business risks. Investments in security technologies should be based on their overall value in relation to their cost; the value can be demonstrated in terms of risk mitigation. This should take precedence over whether they use new or exotic technologies or how they are evaluated in trade publications.
Which of the following are seldom changed in response to technological changes?
Standards
Procedures
Policies
Guidelines
Policies
Policies are high-level statements of objectives. Because of their high-level nature and statement of broad operating principles, they are less subject to periodic change. Security standards and procedures as well as guidelines must be revised and updated based on the impact of technology changes.
The MOST important factor in planning for the long-term retention of electronically stored business records is to take into account potential changes in:
storage capacity and shelf life.
regulatory and legal requirements.
business strategy and direction.
application systems and media.
application systems and media.
Long-term retention of business records may be severely impacted by changes in application systems and media. For example, data stored in nonstandard formats that can only be read and interpreted by previously decommissioned applications may be difficult, if not impossible, to recover. Business strategy and direction do not generally apply, nor do legal and regulatory requirements. Storage capacity and shelf life are important but secondary issues.
Which of the following is characteristic of decentralized information security management across a geographically dispersed organization?
More uniformity in quality of service
Better adherence to policies
Better alignment to business unit needs
More savings in total operating costs
Better alignment to business unit needs
Decentralization of information security management generally results in better alignment to business unit needs. It is generally more expensive to administer due to the lack of economies of scale. Uniformity in quality of service tends to vary from unit to unit.
Which of the following is the MOST appropriate position to sponsor the design and implementation of a new security infrastructure in a large global enterprise?
Chief security officer (CSO)
Chief operating officer (COO)
Chief privacy officer (CPO)
Chief legal counsel (CLC)
Chief operating officer (COO)
The chief operating officer (COO) is most knowledgeable of business operations and objectives. The chief privacy officer (CPO) and the chief legal counsel (CLC) may not have the knowledge of the day- to-day business operations to ensure proper guidance, although they have the same influence within the organization as the COO. Although the chief security officer (CSO) is knowledgeable of what is needed, the sponsor for this task should be someone with far-reaching influence across the organization.
Which of the following would be the MOST important goal of an information security governance program?
Review of internal control mechanisms
Effective involvement in business decision making
Total elimination of risk factors
Ensuring trust in data
Ensuring trust in data
The development of trust in the integrity of information among stakeholders should be the primary goal of information security governance. Review of internal control mechanisms relates more to auditing, while the total elimination of risk factors is not practical or possible. Proactive involvement in business decision making implies that security needs dictate business needs when, in fact, just the opposite is true. Involvement in decision making is important only to ensure business data integrity so that data can be trusted.
Relationships among security technologies are BEST defined through which of the following?
Security metrics
Network topology
Security architecture
Process improvement models
Security architecture
Security architecture explains the use and relationships of security mechanisms. Security metrics measure improvement within the security practice but do not explain the use and relationships of security technologies. Process improvement models and network topology diagrams also do not describe the use and relationships of these technologies.
A business unit intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should an information security manager take?
Enforce the existing security standard
Change the standard to permit the deployment
Perform a risk analysis to quantify the risk
Perform research to propose use of a better technology
Perform a risk analysis to quantify the risk
Resolving conflicts of this type should be based on a sound risk analysis of the costs and benefits of allowing or disallowing an exception to the standard. A blanket decision should never be given without conducting such an analysis. Enforcing existing standards is a good practice; however, standards need to be continuously examined in light of new technologies and the risks they present. Standards should not be changed without an appropriate risk assessment.
Acceptable levels of information security risk should be determined by:
legal counsel.
security management.
external auditors.
the steering committee.
the steering committee.
Senior management, represented in the steering committee, has ultimate responsibility for determining what levels of risk the organization is willing to assume. Legal counsel, the external auditors and security management are not in a position to make such a decision.
The PRIMARY goal in developing an information security strategy is to:
- establish security metrics and performance monitoring.
- educate business process owners regarding their duties.
- ensure that legal and regulatory requirements are met
- support the business objectives of the organization.
support the business objectives of the organization.
The business objectives of the organization supersede all other factors. Establishing metrics and measuring performance, meeting legal and regulatory requirements, and educating business process owners are all subordinate to this overall goal.
Senior management commitment and support for information security can BEST be enhanced through:
a formal security policy sponsored by the chief executive officer (CEO).
regular security awareness training for employees.
periodic review of alignment with business management goals.
senior management signoff on the information security strategy.
periodic review of alignment with business management goals.
Ensuring that security activities continue to be aligned and support business goals is critical to obtaining their support. Although having the chief executive officer (CEO) signoff on the security policy and senior management signoff on the security strategy makes for good visibility and demonstrates good tone at the top, it is a one-time discrete event that may be quickly forgotten by senior management. Security awareness training for employees will not have as much effect on senior management commitment.
When identifying legal and regulatory issues affecting information security, which of the following would represent the BEST approach to developing information security policies?
Create separate policies to address each regulation
Develop policies that meet all mandated requirements
Incorporate policy statements provided by regulators
Develop a compliance risk assessment
Develop policies that meet all mandated requirements
It will be much more efficient to craft all relevant requirements into policies than to create separate versions. Using statements provided by regulators will not capture all of the requirements mandated by different regulators. A compliance risk assessment is an important tool to verify that procedures ensure compliance once the policies have been established.
Which of the following MOST commonly falls within the scope of an information security governance steering committee?
Interviewing candidates for information security specialist positions
Developing content for security awareness programs
Prioritizing information security initiatives
Approving access to critical financial systems
Prioritizing information security initiatives
Prioritizing information security initiatives is the only appropriate item. The interviewing of specialists should be performed by the information security manager, while the developing of program content should be performed by the information security staff. Approving access to critical financial systems is the responsibility of individual system data owners.
Which of the following is the MOST important factor when designing information security architecture?
Technical platform interfaces
Scalability of the network
Development methodologies
Stakeholder requirements
Stakeholder requirements
The most important factor for information security is that it advances the interests of the business, as defined by stakeholder requirements. Interoperability and scalability, as well as development methodologies, are all important but are without merit if a technologically-elegant solution is achieved that does not meet the needs of the business.
Which of the following characteristics is MOST important when looking at prospective candidates for the role of chief information security officer (CISO)?
Knowledge of information technology platforms, networks and development methodologies
Ability to understand and map organizational needs to security technologies
Knowledge of the regulatory environment and project management techniques
Ability to manage a diverse group of individuals and resources across an organization
Ability to understand and map organizational needs to security technologies
Information security will be properly aligned with the goals of the business only with the ability to understand and map organizational needs to enable security technologies. All of the other choices are important but secondary to meeting business security needs.
Which of the following are likely to be updated MOST frequently?
Procedures for hardening database servers
Standards for password length and complexity
Policies addressing information security governance
Standards for document retention and destruction
Procedures for hardening database servers
Policies and standards should generally be more static and less subject to frequent change. Procedures on the other hand, especially with regard to the hardening of operating systems, will be subject to constant change; as operating systems change and evolve, the procedures for hardening will have to keep pace.
Who should be responsible for enforcing access rights to application data?
Data owners
Business process owners
The security steering committee
Security administrators
Security administrators
As custodians, security administrators are responsible for enforcing access rights to data. Data owners are responsible for approving these access rights. Business process owners are sometimes the data owners as well, and would not be responsible for enforcement. The security steering committee would not be responsible for enforcement.
The chief information security officer (CISO) should ideally have a direct reporting relationship to the:
head of internal audit.
chief operations officer (COO).
chief technology officer (CTO).
legal counsel.
chief operations officer (COO).
The chief information security officer (CISO) should ideally report to as high a level within the organization as possible. Among the choices given, the chief operations officer (COO) would have not only the appropriate level but also the knowledge of day-to-day operations. The head of internal audit and legal counsel would make good secondary choices, although they would not be as knowledgeable of the operations. Reporting to the chief technology officer (CTO) could become problematic as the CTO’s goals for the infrastructure might, at times, run counter to the goals of information security.
Which of the following is the MOST essential task for a chief information security officer (CISO) to perform?
Update platform-level security settings
Conduct disaster recovery test exercises
Approve access to critical financial systems
Develop an information security strategy paper
Develop an information security strategy paper
Developing a strategy paper on information security would be the most appropriate. Approving access would be the job of the data owner. Updating platform-level security and conducting recovery test exercises would be less essential since these are administrative tasks.
Developing a successful business case for the acquisition of information security software products can BEST be assisted by:
assessing the frequency of incidents.
quantifying the cost of control failures.
calculating return on investment (ROI) projections.
comparing spending against similar organizations.
calculating return on investment (ROI) projections.
Calculating the return on investment (ROI) will most closely align security with the impact on the bottom line. Frequency and cost of incidents are factors that go into determining the impact on the business but, by themselves, are insufficient. Comparing spending against similar organizations can be problematic since similar organizations may have different business goals and appetites for risk.
When an information security manager is developing a strategic plan for information security, the timeline for the plan should be:
aligned with the IT strategic plan.
based on the current rate of technological change.
three-to-five years for both hardware and software.
aligned with the business strategy.
aligned with the business strategy.
Any planning for information security should be properly aligned with the needs of the business. Technology should not come before the needs of the business, nor should planning be done on an artificial timetable that ignores business needs.
Which of the following is the MOST important information to include in a strategic plan for information security?
Information security staffing requirements
Current state and desired future state
IT capital investment requirements
Information security mission statement
Current state and desired future state
It is most important to paint a vision for the future and then draw a road map from the stalling point to the desired future state. Staffing, capital investment and the mission all stem from this foundation.
Information security projects should be prioritized on the basis of:
time required for implementation.
impact on the organization.
total cost for implementation.
mix of resources required.
impact on the organization.
Information security projects should be assessed on the basis of the positive impact that they will have on the organization. Time, cost and resource issues should be subordinate to this objective
Which of the following is the MOST important information to include in an information security standard?
Creation date
Author name
Initial draft approval date
Last review date
Last review date
The last review date confirms the currency of the standard, affirming that management has reviewed the standard to assure that nothing in the environment has changed that would necessitate an update to the standard. The name of the author as well as the creation and draft dates are not that important.
Which of the following would BEST prepare an information security manager for regulatory reviews?
Assign an information security administrator as regulatory liaison
Perform self-assessments using regulatory guidelines and reports
Assess previous regulatory reports with process owners input
Ensure all regulatory inquiries are sanctioned by the legal department
Perform self-assessments using regulatory guidelines and reports
Self-assessments provide the best feedback on readiness and permit identification of items requiring remediation. Directing regulators to a specific person or department, or assessing previous reports, is not as effective. The legal department should review all formal inquiries but this does not help prepare for a regulatory review.
An information security manager at a global organization that is subject to regulation by multiple governmental jurisdictions with differing requirements should:
- bring all locations into conformity with the aggregate requirements of all governmental jurisdictions.
- establish baseline standards for all locations and add supplemental standards as required.
- bring all locations into conformity with a generally accepted set of industry best practices.
- establish a baseline standard incorporating those requirements that all jurisdictions have in common.
establish baseline standards for all locations and add supplemental standards as required.
It is more efficient to establish a baseline standard and then develop additional standards for locations that must meet specific requirements. Seeking a lowest common denominator or just using industry best practices may cause certain locations to fail regulatory compliance. The opposite approach—forcing all locations to be in compliance with the regulations places an undue burden on those locations.
Which of the following BEST describes an information security manager’s role in a multidisciplinary team that will address a new regulatory requirement regarding operational risk?
Ensure that all IT risks are identified
Evaluate the impact of information security risks
Demonstrate that IT mitigating controls are in place
Suggest new IT controls to mitigate operational risk
Evaluate the impact of information security risks
The job of the information security officer on such a team is to assess the risks to the business operation. Ensuring that all IT risks are identified is incorrect because information security is not limited to IT issues. At the time a team is formed to assess risk, it is premature to assume that any demonstration of IT controls will mitigate business operations risk. It is premature at the time of the formation of the team to assume that any suggestion of new IT controls will mitigate business operational risk.
From an information security manager perspective, what is the immediate benefit of clearly defined roles and responsibilities?
Enhanced policy compliance
Improved procedure flows
Segregation of duties
Better accountability
Better accountability
Without well-defined roles and responsibilities, there cannot be accountability. Policy compliance requires adequately defined accountability first and therefore is a byproduct. People can be assigned to execute procedures that are not well designed. Segregation of duties is not automatic, and roles may still include conflicting duties.
An internal audit has identified major weaknesses over IT processing. Which of the following should an information security manager use to BEST convey a sense of urgency to management?
Security metrics reports
Risk assessment reports
Business impact analysis (BIA)
Return on security investment report
Risk assessment reports
Performing a risk assessment will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management. Metrics reports are normally contained within the methodology of the risk assessment to give it credibility and provide an ongoing tool. The business impact analysis (BIA) covers continuity risks only. Return on security investment cannot be determined until a plan is developed based on the BIA.
Reviewing which of the following would BEST ensure that security controls are effective?
Risk assessment policies
Return on security investment
Security metrics
User access rights
Security metrics
Reviewing security metrics provides senior management a snapshot view and trends of an organization’s security posture. Reviewing risk assessment policies would not ensure that the controls are actually working. Reviewing returns on security investments provides business justifications in implementing controls, but does not measure effectiveness of the control itself. Reviewing user access rights is a joint responsibility of the data custodian and the data owner, and does not measure control effectiveness.
Which of the following is responsible for legal and regulatory liability?
Chief security officer (CSO)
Chief legal counsel (CLC)
Board and senior management
Information security steering group
Board and senior management
The board of directors and senior management are ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
While implementing information security governance an organization should FIRST:
adopt security standards.
determine security baselines.
define the security strategy.
establish security policies.
define the security strategy.
The first step in implementing information security governance is to define the security strategy based on which security baselines are determined. Adopting suitable security- standards, performing risk assessment and implementing security policy are steps that follow the definition of the security strategy.