Domain 2 - IT Governance & Management Flashcards
Who is responsible for development of IS Security Policy?
Board of Directors
Greatest concern for IS auditor with respect to outsourcing of IT services are?
The concern that outsourced activities are “core” & provide a “differentiated advantage” to the organization. Because this should not be outsourced.
Who is responsible in managing compliance with contract for the outsourced services?
Organization’s IT management
Advantage of a bottom-up approach to development of policies
They are more likely to be derived based on risk assessment results
A comprehensive & effective e-mail policy should address what issues?
1) e-mail structure
2) policy enforcement
3) monitoring
4) retention
What kind of responsibilities LAN administrator should & should not have?
LAN administrator should NOT have application programming responsibilities but MAY HAVE systems programming & end-user responsibilities
From a control perspective, the key element in job descriptions is?
They establish responsibility & accountability for the employee’s actions
Phishing is best mitigated through?
Because a Phishing attack exploits people, the risk is best mitigated through user security “awareness training”
The MOST important security consideration to organization that wants to reduce its IS infrastructure by using servers provided by a Platform as a Service (PaaS) vendor are?
Reviewing the need for encryption of stored & transmitted application data
Who is responsible for IT governance?
Board of directors & senior management
What is the reasons to request & review copy of each vendor’s BCP?
To evaluate the adequacy of the service bureau’s plan & to assist his/ her company in implementing a complementary plan
FIRST step in establishing IS Security Program is?
Adoption of a corporate information security policy statement
Primary method for assuring the integrity of new staff is?
Background screening
Risk Assessment Steps
1) Identify & assess the relative criticality of information assets
2) Identify potential threats to those assets
3) Identify potential vulnerabilities to identified threats
4) Assess the business impact of a threat that takes advantage of an unmitigated vulnerability
Role of Chief Security Officer (CSO)
Periodically reviews & evaluates the security policy