CISM Prep Flashcards
What an effective governance program will use
Balanced scorecard, metrics, and other means to monitor these or other key processes.
Information security governance
A set of activities that are established so that management has a clear understanding of the state of the organization’s security programs, its current risks, and its direct activities
Issues that Information security can create
business and people issues
Goal of the security program
To continue to contribute toward fulfillment of the security strategy, which itself will continue to align to the business and business objective.
IT’s role in a successful information security governance
An effective IT governance is required. Without IT governance, information security governance will not be able to reach its full potential
Downward vision flow information security governance
1- Business vision to 2- Business strategy ; to 3- Business Objective ; to 4- IT security Strategy ; to 5- IT security strategy; to 6- Security Policy; to 7- Security standards ; to 8- Security process ; to 9-Security Metrics
Purpose of security governance
To align the organization’s security program with the business program with the needs of the business.
Security Policy
Should at minimum reflect directly the mission, objectives, and goals of the organization.
Standards
Help to drive a consistent approach to solving business challenges
Processes
Formalized descriptions of repeated business activities that include instructions to applicable personnel.
Two keys results of an effective security governance program
• Increased trust Customers, suppliers, and partners trust the organization to a greater degree when they see that security is managed effectively. • Improved reputation The business community, including customers, investors, and regulators, will hold the organization in regard.
When does governance begin
With the establishment of top-level strategic objectives that are translated into actions, policies, procedures, and other activities
Term information security governance
It refers to collection of top-down activities intended to control the security organization to ensure information security supports the business.
Ojectives
Desired capabilities or end states, ideally expressed in archivable, measurable terms.
Strategy
Plan to achieve one or more objectives
What should be considered when building out governance structure.
CIA ( Confidentiality Integrity Availability )and the type of info used by the business
What are the functions and roles inside a typical Cybersecurity Organization?
Eng Ops, Incident Response, Policy Compliance
What is the goal of information security and
the goal of information security is to protect the confidentiality, integrity, and availability of an organization’s information and information assets. The goal of cybersecurity is to protect the confidentiality, integrity, and availability of an organization’s digital resources.
Information security, properly defined, is responsible for the security
What are Information Security Risks?
Information Security Risks
Security incidents occur when an organization experiences an adverse impact to the confidentiality, integrity, and/or availability of information or information systems. These incidents may occur as the result of malicious activity (such as an attacker targeting the organization and stealing sensitive information); accidental activity (such as an employee leaving an unencrypted laptop in the back of a rideshare); or natural activity (such as an earthquake destroying a data center).
the DAD Triad is?
This model explains the three important threats to cybersecurity efforts: disclosure, alteration, and denial. Each of these three threats maps directly to one of the main goals of cybersecurity:
Disclosure
Disclosure is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss. Disclosure is a violation of the principle of confidentiality. Attackers who gain access to sensitive information and remove it from the organization are said to be performing data exfiltration. Disclosure may also occur accidentally, such as when an administrator misconfigures access controls or an employee loses a device.
Alteration
Alteration is the unauthorized modification of information and is a violation of the principle of integrity. Attackers may seek to modify records contained in a system for financial gain, such as adding fraudulent transactions to a financial account. Alteration may occur as the result of natural activity, such as a power surge causing a “bit flip” that modifies stored data. Accidental alteration is also a possibility, if users unintentionally modify information stored in a critical system as the result of a typo or other unintended activity.
Denial
Denial is the disruption of an authorized user’s legitimate access to information. Denial events violate the principle of availability. This availability loss may be intentional, such as when an attacker launches a distributed denial-of-service (DDoS) attack against a website. Denial may also occur as the result of accidental activity, such as the failure of a critical server, or as the result of natural activity, such as a natural disaster impacting a communications circuit.