CISSP (Domain 3 - Information Security Governance and Risk Management) Flashcards

1
Q

4 Item for a Business Model for Information Security

OPPT

A
  • Organization Design/Strategy
  • People
  • Process
  • Technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

6 Interconnections for a Business Model in Information Security
(GCEEHA)

A
  • Governance
  • Culture
  • Enablement & Support
  • Emergence
  • Human Factors
  • Architecture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Corporate Governance

A

Set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, objectives achieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Plan Do Check Act (PDCA)

E/IO/MR/MI

A

Approach to continuous process improvement

  • Establish ISMS
  • Implement/Operate ISMS
  • Monitor/Review ISMS
  • Maintain/Improve ISMS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISO 27001 (Governance)

A

PDCA model to structure the processes, and reflects the principals set out in the OECD guidelines

  • How to implement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO 27002 (Governance)

A

AKA ISO 17799, basic outline of hundreds of potential controls and control mechanisms

  • What should be secured
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 Goals of a Security Model
(long/mid/short)
(STO)

A
  • Long Term: Strategic Goals (supported by med/short term, all PCs on VPN)
  • Mid Term: Tactical Goals (Put in domains, add Firewalls)
  • Short Term: Operational Goals (Patches)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Due Care

A
  • *Do Connect
  • Do the right thing and protect assets
  • Functional Requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Due Diligence

A
  • *Do Detect
  • Senior Management
  • Investigate actual threats and risks (Determine Risk Exposure)
  • Assurance Requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIA Triad

A
  • Confidentiality: Prevent unauthorized disclosure of sensitive information
  • Integrity: Prevent unauthorized modification of systems and information
  • Availability: Prevent disruption of service and productivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality (CIA Triad) - Threats and Solutions

A

Threats:

  • Hackers
  • Malicious Software
  • Social Engineering
  • System Failure/Employee Error

Solutions:

  • Identification
  • AuthN
  • AuthZ
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Integrity (CIA Triad) - Threats and Solutions

A

Threats:

  • Hackers
  • Malicious Software
  • Social Engineering
  • System Failure/Employee Error

Solutions:

  • Least Privilege
  • Separation of Duties (SoD), prevents collusion
  • Rotation of Duties (Mandatory Vacation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Availability (CIA Triad) - Threats and Solutions

A

Threats:

  • Deliberate Attacks
  • System Failure/User Error
  • Natural Disasters

Solutions:
- Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 Reasons Why We Have Security Policies

OSR

A
  • Objective/Goal or Purpose
  • Scope
  • Responsibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Security Policy

A

General statement products by senior management/board/committee to dictate what type of role security plays within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Policy Document Relationship

Drivers/MgmtSS/MgmtSD

A
  • Drivers: Laws, Regulations, Best Practices
    Program or Organizational Policy
  • Managements Security Statement: Program/Organizational Policy
  • Managements Security Directive: Functional Policies (issue and system specific)
    + standards/procedures/baselines/guidelines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NIST SP 800-12: Program Policy

A

Programs security policy driving by Laws/Regulations/Best Practices. Large scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NIST SP 800-12: Issue-Specific Policies

A

Addresses specific security threats management feels need more detailed explanation and attention.

Ex: Acceptable use of resources agreement, e-mail policy where management can read your email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NIST SP 800-12: System-Specific Policies

A

Includes two components: Security Objectives and Operational Security Rules.

Usually only on one system

Ex. Payroll and HR can only modify Payroll system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Regulatory Policy

A

Government ordinance, all who fall under must comply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advisory Policy

A

NOT mandated by law. Company puts in place on self.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Informative Policy

A

Educate who reads the policy.

Ex: No smoking in the aircraft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

4 Functions for Support Policies

SBPG

A
  • Standards
  • Baselines
  • Procedures
  • Guidelines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Standards - Supporting Policies

A
  • Binding

- Common practice all adhere to (RHEL only)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Baselines - Supporting Policies
- Binding - Min level of protection and security - Password length 8 characters
26
Procedures - Supporting Policies
- Binding | - Set of instructions to meet policy
27
Guidelines - Supporting Policies
- non-binding - Recommendation or suggestion to improve the overall quality of a policy - Use ISO/ITIL
28
3 C's of Data Classification
- Cost Value: Identified during risk analysis - Classify: Organize according to sensitivity to loss or disclosure (Priority) - Control: Data segmented into sensitivity levels (Level)
29
4 Commercial Data Classification Types | CPSP
- Confidential - Private - Sensitive - Public
30
4 Military Data Classification Types | TSCU
- Top Secret - Secret - Confidential - Unclassified
31
Difference Between Data Owner and Data Custodian
Data owner directs the data custodian on how to protect the data
32
Data Owners Responsibilities (2 things)
- Level of priority/classification to a resource. (what makes it special) - Define level of protection of asset at the priority
33
Data Custodian Responsibilities (2 things)
- Implement controls that meet the level of protection needed - Maintain the data and monitor
34
``` Risk Management (IAR) (RA/RM/CE) ```
The process of identifying, analyzing, and reducing the risk to an acceptable level. - Risk Assessment - Risk Mitigation - Controls Evaluation
35
Risk Assessment
Identification of companies assets, associated risks, and potential loss the organization could suffer.
36
Asset - Risk Management
Any resource with value to the organization
37
Threat - Risk Management
Potential danger to an asset
38
Threat-Source/Threat-Agent - Risk Management
Anyone/thing that has the potential to cause threat
39
Vulnerability - Risk Management
Flaw or weakness of an asset
40
Risk
Likelihood of a threat agent taking advantage of a vulnerability
41
Exposure
An opportunity for a threat to cause loss (Firewall ports opened)
42
Event/Exploit
Instance of loss experienced
43
Loss
Real or perceived devaluation of an asset
44
Controls (2 types)
- Technical and nontechnical risk mitigation mechanisms (Safeguards/Countermeasures) - Good controls reduce exposure
45
Safeguards
Preventative (proactive, avoid)
46
Countermeasures
Detective and corrective (reactive, respond)
47
4 Steps to Perform Risk Analysis | WC/HB/LR/HR
- What could happen - How bad would it be (loss) - Likelihood to be realized (chance) - How real are they
48
NIST 800-30: Risk Assessment Activities (9 Steps) | SC/TI/VI/CA/L/IA/R/CR/D
- System Characterization (identify systems) - Threat ID - Vulnerability ID - Control Analysis - Likelihood (Will it happen) - Impact Analysis (loss?) - Risks - Control Recommendations - Documentation
49
Quantitative - Risk Approach
Assigning numeric/monetary values to risk ($$$$)
50
Qualitative - Risk Approach
Subjective rating assigned, opinion based,
51
Delphi Method - Risk Approach
People can express their ideas anonymously
52
Annualized Loss Expectancy (ALE)* Tornado damage 50% of facility. Worth 200,000. Once in 10 years
SLE x ARO = ALE Tornado damage 50% of facility. Worth 200,000. Once in 10 years SLE: 200,000 x .50 = 100,000 ARO: 1/10 = .1 (remember x in # of years) 100,000 x .1 = 10,000 in countermeasures
53
Single Loss Expectancy (SLE)*
Asset Value (AV) x Exposure Factor (EF) = SLE
54
Annualized Rate of Occurrence (ARO)*
Value that represents the estimated possibility of a specific threat taking place
55
Exposure Factor (EF)
Percentage of asset loss caused by threat
56
Residual Risk
Risk after countermeasures or safeguards Total Risk - Acceptable Risk = Residual Risk
57
Total Risk
Exposure before control put in place
58
Acceptable Risk
What "C" are ok with
59
Control Gap
Risk between Total Risk and Acceptable risk
60
3 Risk Mitigation Options(RTA)
- Reduce - Transfer - Accept
61
Cost-Benefit Analysis Formula Tornado - 10k Asset - 1k deductible - 2k year policy
Value of the control of the company Tornado - 10k Asset - 1k deductible - 2k year policy ALE Before - ALE After - Annual Cost of Control 10k - 1k - 2k = 7k cost benefit
62
Security Awareness Training
- Employees wont follow them unless they know about them - Employees must know expectations and ramification if not met - Employee recognition award program - Part of due care - Administrative control
63
2 Approaches to Security Management | TD/BU
- Top-Down: Senior management directed (ISC^2) | - Bottom-Up: IT defines