Eksamen 2016 Flashcards
- Write the definition (approximately) of confidentiality according to ISO27001.
Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
- Security controls can be grouped into three main categories.
Padlocks and security guards represent which category of security controls?
User authentication and data encryption represent which category of security controls?
Security policies and awareness training represent which category of security controls?
- Physical security controls (padlocks and security guards).
- Technical security controls (user authentication and data encryption).
- Administrative controls (security policies and awareness training)
- Give one example of a preventive security control.
Give one example of a detective security control.
Give one example of a corrective security control.
- Valid preventive control: encryption, authentication, awareness, padlock.
- Valid detective control: IDS (intrusion detect.sys.) surveillance cameras.
- Valid corrective control: backup of data & software, removal of malware.
- In which aspect is non-repudiation of data origin stronger than data authentication ?
Which control/mechanism is typically used to implement non-repudiation?
Non-repudiation can provide proof of data authenticity to third parties. Data authentication can only prove authenticity to intended recipient of data.
Non-repudiation is implemented with digital signatures.
- Give the name of ISO27001.
Briefly describe what ISO27001 is about (1 sentence is enough).
ISO27001 = Information Security Management System.
It describes a framework setting up and managing an ISMS, i.e. establishing and operating a security program within an organisation
- Give the name of ISO27002.
Briefly describe what ISO27002 is about (1 sentence is enough).
ISO27002 = Code of practice for information security management.
It provides a checklist of security controls that organisations can consider using and implementing.
- 20 CSC (Critical Security Controls) is a framework which describes a set of elements for each of the 20 essential security controls.
Select two correct elements
Why the control is critical (specified by 20 CSC).
Effectiveness metrics (specified by 20 CSC).
- Which is the highest level in COBIT’s PCL (Process Capability Level) model ?
Which aspect of security governance in PCL is the most fundamental/important?
What is the basis for knowing the effectiveness of a security control?
Which PCL level requires: ”Security culture permeates the organization” ?
Level 5 (Optimizing) is the highest in the COBIT Process Capability Levels.
Risk assessment is the most important aspect of security governance.
Effectiveness metrics are used to determine the effectiveness of controls.
Level 5 (Optimizing) requires: ”Security culture permeates the organization”.
- Mention 2 typical approaches to identify relevant threat scenarios.
Attacker-Centric threat identification
System-Centric (aka. SW, design or architecture centric) threat identification
Asset-Centric threat identification.
- Briefly explain the principle for determining risk levels with a qualitative method.
A matrix is used to determine a qualitative level of risk as a function of qualitative levels of likelihood and impact of incident.
- Assume a quantitative risk model, where for a particular risk the following values are set:
AV (Asset Value) = EUR 1,000,000
EF (Exposure Factor) = 0.2,
ARO (Annualised Rate of
Occurrence) = 0.1.
Give the SLE (Single Loss Expectancy) and the ALE (Annualised Loss Expectancy).
SLE = EUR 200,000
ALE = EUR 20,000
- Mention two (of the four) strategies for managing risk.
Reduce/mitigate risk (security and mitigation controls)
Share/transfer risk (outsource activity that causes risk, or insure)
Retain risk (understand tolerate potential consequences)
Avoid risk (stop activity that causes risk)
- What are the block size and possible key sizes in AES ?
Block size 128 bits.
Key sizes i) 128, ii) 192, iii) 256 bits.
- Select two important factors for the cryptographic strength of a cipher.
– The design randomness
– The cipher’s key size
– The cipher’s ability to hide statistical patterns in data
– The computation speed
The cipher’s key size
The cipher’s ability to hide statistical patterns in data
- The cryptoperiod (which my consist of separate protection and processing periods) limits the time a cryptographic key can be used, and mandates the key to be changed. Select the correct statement regarding cryptoperiods.
– The usage frequency of a key does not influence its cryptoperiod.
– Frequent use of a key requires longer cryptoperiod.
– Frequent use of a key requires shorter cryptoperiod.
Frequent use of a key requires longer cryptoperiod.