Developing the Security Case Flashcards

1
Q

A technique that you can use to structure a system’s security requirements is called?.

A

Security Case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the factors to consider when constructing a security case?

A
 Who will be using it?
 What is its purpose?
 Where will it be used and when?
 Why is it being used?
 When will it be used?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function SABSA Contextual Security Architecture?

A

Security policy making, information classification, risk analysis process, business requirements, collection and specification, organisational and cultural development, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function SABSA Conceptual Security Architecture ?

A

Programmes for training and awareness, business continuity management, audit and review, process development for registration, authorisation, administration and incident handling, development of standards and procedures, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function SABSA Logical Security Architecture?

A

Management of security services, security of service
management, negotiation of inter-operable standards for security services, audit trail monitoring and invocation of actions, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the of function SABSA Physical Security Architecture?

A

Cryptographic key management, communication of security parameters between parties, synchronisation between parties, access control list maintenance and distribution of access control entries, back-up management (storing, labelling, indexing, etc.), virus pattern search maintenance, event log file management and archiving, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the function SABSA Component Security Architecture?

A

Products, technology, standards and tools evaluation and selection, project management, implementation
management, operation and administration of individual components, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function SABSA Operational Security Architecture?

A

Operational continuity of the business systems and
information processing, maintaining the security of
operational business data and information (confidentiality, integrity, availability, auditability and accountability), managing operational risks to minimise operational failures and disruptions, performing specialised security-related operations (user security administration, system security administration, data back-ups, security monitoring, emergency response procedures, etc.), providing operational support for the security-related needs of all users and their applications, maintaining the system integrity and security of all operational platforms and networks (by applying operational security standards and auditing the configuration against these standards), scheduling and executing a timetable of security-related operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Threat Modelling ?

A

Threat modelling is the process of analysing potential threats to the proposed system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Threat Modelling ISO 27000 ?

A

Threat as ‘potential cause of an unwanted incident, which may result in harm to a system or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Six classification of Threats according to ISO 27000 ?

A

Human, Natural, Technical, Physical, Environmental. Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Risk Management?

A

Risk management is the process of directing and controlling an organisation with regard to risk (ISO Guide 73:2009)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is risk management framework?

A

It is a set of components that provide the foundations and organisational arrangements for designing, implementing, monitoring reviewing and continually improving risk management throughout the organisation (ISO Guide 73:2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Policy, objectives, mandate and commitment to managing risk, existing and future plans, relationships, accountabilities, resources, processes, activities, are components that must be included what document

A

Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the five steps to risk identification

A
  1. Identify your assets.
  2. Identify potential or existing threats.
  3. Identify your existing controls (measure that is modifying risk).
  4. Identify any vulnerabilities within your controls.
  5. Identify the consequences that these vulnerabilities could cause.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the methodologies that you can use to analyse risks?

A

Qualitative (subjective), Semi-quantitative (subjective),

Quantitative (objective), Single Loss Expectancy (SLE) and Annualised Loss Expectancy (ALE)

17
Q

What is Qualitative (subjective)

A

Uses simple scales (e.g. high, medium, low) to describe the magnitude of a potential consequence and its likelihood

18
Q

What is Semi-quantitative (subjective)

A

uses a simplified numeric scale (e.g. 0.01 to
1.00) to describe the magnitude of a potential consequence and its
likelihood

19
Q

What is Quantitative (objective)

A

Uses ‘realistic’ numerical values to describe the

magnitude of a potential consequence and its likelihood

20
Q

What are the three ways to treat risk

A

 Modify (mitigate or change some circumstance)
 Avoid (do not use this system or action)
 Share (with others – insurance, external parties)

21
Q

What are the constraints of risk treatment

A

Technical limitations, operational limitations, legal problems, financial constraints, staffing requirements and training requirements

22
Q

Physical, Technical and Procedural are the types of control for

A

Operational Controls for Risk Management