Domain 1 Flashcards
Which control functionality is Lighting out of 6 control functionalities?
Physical Deterrent
Security Policy out of 6 control functionalities
Administrative Preventive
Separation of duties out of 6 control functionalities
Administrative Preventive
job rotation out of 6 control functionalities
Administrative Detective
Information Classification out of 6 control functionalities
Administrative Preventive
Server images out of 6 control functionalities
Technical Corrective
ISO/IEC 27000 ISO/IEC 27001 ISO/IEC 27002 ISO/IEC 27003 ISO/IEC 27004 ISO/IEC 27005 ISO/IEC 27006 ISO/IEC 27007 ISO/IEC 27008 ISO/IEC 27011 ISO/IEC 27014 ISO/IEC 27015 ISO/IEC 27031 ISO/IEC 27032 ISO/IEC 27033 ISO/IEC 27034 ISO/IEC 27035 ISO/IEC 27037 ISO/IEC 27799
Overview and vocabulary ISMS requirements Code of practice for information security management ISMS implementation ISMS measurement Risk management Certification body requirements ISMS auditing Guidance for auditors Telecommunications organizations Information security governance Financial sector Business continuity Cybersecurity Network security Application security Incident management Digital evidence collection and preservation Health organizations
Zachman Architecture Framework
The Zachman Framework is a two-dimensional model that uses six basic commu- nication interrogatives (What, How, Where, Who, When, and Why) intersecting with different perspectives (Executives, Business Managers, System Architects, Engineers, Technicians, and Enterprise-wide) to give a holistic understanding of the enterprise.
The goal of this framework is to be able to look at the same organization from different viewpoints.
The Open Group Architecture Framework (TOGAF),
TOGAF is a framework that can be used to develop the following architecture types: Business architecture Data architecture Applications architecture Technology architecture
create these individual architecture types through the use of its Architecture Development Method (ADM).
DoDAF
The focus of the architecture framework is on command, control, communications, computers, intel- ligence, surveillance, and reconnaissance systems and processes.
It is not only important that these different devices communicate using the same protocol types and interoper- able software components, but also that they use the same data elements.
The Ministry of Defence Architecture Framework (MODAF)
The crux of the framework is to be able to get data in the right format to the right people as soon as possible.
enterprise security architecture
subset of an enterprise architecture and defines the information security strategy that consists of layers of solutions, processes, and procedures.
It is a comprehensive and rigorous method for describing the structure and behavior of all the components that make up a holistic ISMS
main reason to develop an enter- prise security architecture
to ensure that security efforts align with business practices in a standardized and cost-effective manner.
The architecture works at an abstraction level and provides a frame of reference. Besides security, this type of architecture allows organizations to better achieve interoperability, integration, ease of use, standardization, and governance.
Sherwood Applied Business Security Architecture (SABSA)
similar to the Zachman Framework.
Each layer of the framework decreases in abstraction and increases in detail so it builds upon the others and moves from policy to practical implementation of technology and solutions. The idea is to provide a chain of traceability through the contextual, conceptual, logical, physical, component, and operational levels.
Sherwood Applied Business Security Architecture (SABSA)
a framework and methodology for enterprise security architecture and service management.
Since it is a framework, this means it provides a structure for individual architectures to be built from. Since it is a methodology also, this means it provides the processes to follow to build and maintain this architecture. SABSA provides a life-cycle model so that the architecture can be constantly monitored and improved upon over time.
Strategic Alignment
Strategic alignment means the business drivers and the regu- latory and legal requirements are being met by the security enterprise architecture.
difference between an ISMS and an enterprise security architecture
An ISMS outlines the controls that need to be put into place (risk management, vulnerability management, business continuity planning, data protection, auditing, configuration management, physical security, etc.) and provides direction on how those controls should be managed throughout their life cycle.
The enterprise security architecture illustrates how these components are to be integrated into the different layers of the current business environment. The security components of the ISMS have to be interwoven throughout the business environment and not siloed within individual company departments.
Business enablement
Security enables the company to move to this different working model by providing the necessary protection mechanisms.
Process Enhancement
organization that is serious about securing its environment will have to take a close look at many of the business processes that take place on an ongoing basis.
Process reengineering under Process Enablement
When you look at many business processes taking place in all types of organizations, you commonly find a duplication of efforts, manual steps that can be easily automated, or ways to streamline and reduce time and effort that are involved in certain tasks. This is commonly referred to as process reengineering.
Security effectiveness
Security effectiveness deals with metrics, meeting service level agreement (SLA) requirements, achieving return on investment (ROI), meeting set baselines, and providing management with a dashboard or balanced scorecard system.
Enterprise vs. System Architectures
An enterprise architecture addresses the structure of an organization. A system architecture addresses the structure of software and computing components.