Developing the Security Case Flashcards
A technique that you can use to structure a system’s security requirements is called?.
Security Case
What are the factors to consider when constructing a security case?
Who will be using it? What is its purpose? Where will it be used and when? Why is it being used? When will it be used?
What is the function SABSA Contextual Security Architecture?
Security policy making, information classification, risk analysis process, business requirements, collection and specification, organisational and cultural development, etc.
What is the function SABSA Conceptual Security Architecture ?
Programmes for training and awareness, business continuity management, audit and review, process development for registration, authorisation, administration and incident handling, development of standards and procedures, etc.
What is the function SABSA Logical Security Architecture?
Management of security services, security of service
management, negotiation of inter-operable standards for security services, audit trail monitoring and invocation of actions, etc.
What is the of function SABSA Physical Security Architecture?
Cryptographic key management, communication of security parameters between parties, synchronisation between parties, access control list maintenance and distribution of access control entries, back-up management (storing, labelling, indexing, etc.), virus pattern search maintenance, event log file management and archiving, etc.
What is the function SABSA Component Security Architecture?
Products, technology, standards and tools evaluation and selection, project management, implementation
management, operation and administration of individual components, etc.
What is the function SABSA Operational Security Architecture?
Operational continuity of the business systems and
information processing, maintaining the security of
operational business data and information (confidentiality, integrity, availability, auditability and accountability), managing operational risks to minimise operational failures and disruptions, performing specialised security-related operations (user security administration, system security administration, data back-ups, security monitoring, emergency response procedures, etc.), providing operational support for the security-related needs of all users and their applications, maintaining the system integrity and security of all operational platforms and networks (by applying operational security standards and auditing the configuration against these standards), scheduling and executing a timetable of security-related operations.
What is Threat Modelling ?
Threat modelling is the process of analysing potential threats to the proposed system
What is Threat Modelling ISO 27000 ?
Threat as ‘potential cause of an unwanted incident, which may result in harm to a system or organization.
What are the Six classification of Threats according to ISO 27000 ?
Human, Natural, Technical, Physical, Environmental. Operational
What is Risk Management?
Risk management is the process of directing and controlling an organisation with regard to risk (ISO Guide 73:2009)
What is risk management framework?
It is a set of components that provide the foundations and organisational arrangements for designing, implementing, monitoring reviewing and continually improving risk management throughout the organisation (ISO Guide 73:2009
Policy, objectives, mandate and commitment to managing risk, existing and future plans, relationships, accountabilities, resources, processes, activities, are components that must be included what document
Risk Management Framework
What are the five steps to risk identification
- Identify your assets.
- Identify potential or existing threats.
- Identify your existing controls (measure that is modifying risk).
- Identify any vulnerabilities within your controls.
- Identify the consequences that these vulnerabilities could cause.