Governance Flashcards

1
Q

What is defense in depth?

A

Layering of security measures to provide “overlapped” security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference in series and parallel when layering?

A

Parallel leaves gaps that can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is abstraction when securing data?

A

Grouping things together for efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is used when hiding data?

A

Preventing discovery by unauthorized subjects. Can be done by positioning data in containers not accessible by certain subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the definition of encryption?

A

Art or Science of hiding the meaning or intent of an Object from unintended Subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some elements of Privacy.

A

Prevention of unauthorized access to information that is PII.
Freedom from unauthorized access to information deemed personal or confidential.
Freedom from being observed, monitored, or examined without consent/ knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does COBIT stand for?

A

Control Objectives for

Information and Related Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 5 elements of COBIT?

A
  1. Meet stakeholder needs
  2. Covering Enterprise E2E
  3. Apply single, integrated framework
  4. Enable holistic approach & principle.
  5. Separate governance from management.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Due Care?

A

Use of reasonable care to protect interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Due Diligence?

A

The practices required to maintain Due Care.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the CIA Triad?

A

Confidentiality
Integrity
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Confidentiality mean?

A

High level of assurance that objects and/ or resources are restricted from unauthorized Subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can cause a loss of confidentiality?

A

Failure to encrypt transmissions
Failure to properly authenticate Subjects.
Failure of an end user or administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Integrity?

A

The ability to ensure that only authorized Subjects can intentionally modify and Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can be done to ensure integrity?

A

Logging & Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some risks to integrity?

A

Viruses, worms, and back doors.

17
Q

What is the definition of availability?

A

Availability means that authorized Subjects can access an Object in a timely and uninterrupted manner.

18
Q

What are some example of a loss of availability?

A

hardware failure, power loss, or DDOS attack.

19
Q

Name other security concepts (non CIA Triad)

A

Identification - Subject professing identity
Authentication - Validating claimed identity
Authorization - allowing a Subject to access an Object.
Auditing - Holding a Subject accountable.
Accountability - Proof of identity

20
Q

What is non repudiation?

A

Ensures the Subject cannot deny an event or the occurrence of an event.

21
Q

What is essential for accountability?

A

non repudiation

22
Q

What is a security policy?

A

Document(s) that define the scope of security needed by an organization.

23
Q

What should be included in a security policy?

A

Assign responsibilities, define roles, specify audit requirements, and outline enforcement processes.

24
Q

What are some different security “sub” policies?

A

Organizational - Org centric
Issue - lower level areas (networks, servers…)
Regulatory - Legal, statutory
Advisory - What is acceptable and unacceptable.

25
What is a security baseline?
basic level of compliance.
26
What is the ITSEC
``` Information Technology Security Evaluation Criteria ```
27
What is a security procedure?
Step by step guide to implement a security policy.
28
What is the objective of change management?
Ensure that a change does not reduce or compromise security.
29
What are some elements of change control?
* Implement changes in a controlled and monitored fashion. * Formalized testing. * Changes can be reversed * Users are informed of changes in advance. * Effects of changes are analyzed. * Minimize negative effects.
30
What is data classification?
Protection of data based on its sensitivity, secrecy, or confidentiality.
31
What are some criteria used to classify data?
Usefulness, timeliness, value or cost, maturity, lifespan, data disclosure damage, national security.
32
What are the major steps to implement data classification?
1. Identify custodian. 2. Specify evaluation criteria. 3. Classify and label each element 4. Document exceptions 5. Select controls to implement 6. Specify the de-classification process 7. Create an enterprise wide awareness
33
What are the 5 levels of government/ military data classification from highest to lowest.
1. Top Secret 2. Secret 3. Confidential 4. Sensitive but unclassified 5. unclassified
34
What are the levels of commercial data privacy from highest to lowest?
1. Confidential 2. Private 3. Sensitive 4. Public