Domain 5 Flashcards
Security Policy
Sets overall vision and goals for Information Security. Defines Why behind security measures. General statements. Policies are major input to standards
Security Standards
Translate the Policy into specific technical requirements and best practices. What and When for security goals. Mandatory
Security Procedure
Provide detailed instructions on how to implement standards. Defines How
Security Guidelines
Offer additional recommendations and best practices that can be adopted to further enhance security. They are not mandatory. Least specific.
Acceptable Use Policy (AUP)
Allowed/Appropriate Uses of the organisations IT resources
Information Security Policy
Sets overall direction for information security
Business Continuity Policy
Defines organisations overall strategy for business continuity
Disaster Recover Policy
Focuses on recover from disasters
Incident Response Policy
Sets high-level direction for how organisations will identify, contain, eradicate and recover from security incidents
Software Development Lifecycle (SDLC)
Guidance that Software development teams must follow in creating software
FIPS 140-2/3
Mandatory standard for protection of sensitive data within federal systems
Board
Highest level of authority
Committees
Subgroups that focus on specific areas or tasks, reporting to the Board
Government Entities
Eg NIST - These entities issue security regulations, standards and Best practices that organisations must comply
Centralized
Decisions are managed by central security team
Decentralized
Delegates security decisions and controls to some extent to business units and departments
Data Owner
Legal rights and complete control over a single piece of data. Member of senior Management. Can delegate day-to-day activities. Cannot delegate total responsibility
Data Custodian
Responsible for safe custody, transport, and storage of data. IT Department
Data Processor
Legal person, public authority, agency or other body which processes personal data solely on behalf of data controller
Data Controller
Person or entity that controls that controls processing of the data
Data Subject
Person who can be identified
Data Steward
Data’s context and meaning are understood and business rules governing the data usage are known and followed
Risk Identification
Process of identifying the threats and vulnerabilities that exist in operating environment
Risk Assessment
Process of Identifying, analysing, evaluating and prioritizing potential risks
Ad hoc Risk Assessment
One time assessments in response to a specific event
Recurring Risk Assessment
Assessments conducted periodically
One-Time Risk Assessment
One time assessment - In response to security incident or management request
Continuous Risk Assessment
Automated such as recurring system scan integrated into daily operations
Quantitative Risk Analysis
Assigns dollar Value to evaluate effectiveness of countermeasures
Qualitative Risk Analysis
Scoring System to rank effectiveness of countermeasures. Low/Medium/high
Impact
Potential consequences or negative effects that could occur if the risk materializes
Asset Value
Monetary value of the asset
Exposure Factor (EF)
Percentage of loss if a specific asset were violated by a realised risk
Single Loss Expectancy (SLE)
Cost associated with a single realized risk against a specific asset.
SLE == Asset Value X Exposure Factor (%)