Domain 1, Information Security Governance Flashcards

1
Q

PCI-DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OCTAVE

A

Operationally Critical Threat, Asset, and Vulnerability Evaluation.
• Self Directed Risk Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COBIT

A

Control Objectives for Information and related Technology.

• Goals for IT – Stakeholder needs are mapped down to IT related goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COSO

A

Committee Of Sponsoring Organizations.

• Goals for the entire organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ITIL

A

Information Technology Infrastructure Library.

• IT Service Management (ITSM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FRAP

A

Facilitated Risk Analysis Process.
• Analyses one business unit, application or system at a time in a roundtable brainstorm with internal employees. Impact analyzed, threats and risks prioritized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SWOT

A

Strengths, Weaknesses, Opportunities, and Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Gap analysis:

A

Identify the existing process:
• What are we doing?
Identify the existing outcome:
• How well do we do it?
Identify the desired outcome:
• How well do we want to do?
Identify and document the gap:
• What is the difference between now and desired result?
Identify the process to achieve the desired outcome:
• How can we possibly get to the desired result?
Develop the means to fill the gap:
• Build the tool or processes to get the result.
Develop and prioritize Requirements to bridge the gap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OPEX

A

(Operating Expense) is the ongoing cost for running a product, business, or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAPEX

A

(Capital Expenditure) is the money a company spends to buy, maintain, or improve its fixed assets, such as buildings, vehicles, equipment, or land.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

KGI (Key Goal Indicator):

A

Define measures that tell management, after the fact—whether an IT process has achieved its business requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

KPI (Key Performance Indicators):

A

Define measures that determine how well the IT process is performing in enabling the goal to be reached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

KRI (Key Risk Indicators):

A

Metrics that demonstrate the risks that an organization is facing or how risky an activity is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The CIA Triad (AIC)

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data at Rest

A

(Stored data): This is data on disks, tapes, CDs/DVDs, USB sticks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data in Motion

A

(Data being transferred on a network).

17
Q

Data in Use

A

We are actively using the files/data, it can’t be encrypted

18
Q

Mission/business owner

A

Senior executives make the policies that govern our data security.

19
Q

Data/information owner

A

Management level, they assign sensitivity labels and backup frequency.

20
Q

Data custodian

A

These are the technical hands-on employees who do the backups, restores, patches, system configuration. They follow the directions of the data owner.

21
Q

Users

A

These are the users of the data. User awareness must be trained; they need to know what is acceptable and what is not acceptable, and the consequences for not following the policies, procedures and standards.

22
Q

Data controllers and data processors

A
  • Controllers create and manage sensitive data in the organization (HR/Payroll)
  • Processors manage the data for controllers (Outsourced payroll)