GRC CHAPTER 1 & 2 WEEK 1 Flashcards

1
Q

What is the purpose of Appendix III to OMB Circular No. A-130?

A

Establishes a minimum set of controls for Federal automated information security programs

Assigns Federal agency responsibilities for the security of automated information and links agency automated information security programs with agency management control systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ‘Application’ in the context of information resources.

A

Use of information resources to satisfy a specific set of user requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a ‘General Support System’?

A

An interconnected set of information resources under the same direct management control sharing common functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What distinguishes a ‘Major Application’?

A

Requires special attention to security due to risk and magnitude of harm from loss, misuse, or unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the basic requirements for deploying risk-based IT systems.

A
  • System Risk
  • Potential Impact
  • Security Control
  • Data Classification
  • Adequate Security
  • System Development Life Cycle (SDLC)
  • Risk Management
  • Relevant Standards & Regulations
  • Roles & Responsibilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an ‘Asset’ in information security?

A

People, property, and information that we are trying to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define ‘Threat’ in the context of information security.

A

Anything that can exploit a vulnerability and obtain, damage, or destroy an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does ‘Vulnerability’ refer to?

A

Weaknesses or gaps in a security program that can be exploited by threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define ‘Likelihood’ in information security.

A

Probability that a potential vulnerability may be exploited in the associated threat environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ‘Risk’ in information security?

A

Potential for loss, damage, or destruction of an asset due to a threat exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Risk Formula?

A

R = V + A + T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Risk is the intersection of assets, threats, and vulnerabilities.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: A _______ is a weakness or gap in our protection efforts.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the definition of Impact in InfoSec?

A

The magnitude of harm from unauthorized disclosure, modification, destruction of information, or loss of system availability.

Impact is governed by potential mission impacts and produces a relative value for affected IT assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the basic requirements for Risk-Based IT Systems?

A
  • Adequate Security & Risk
  • Security Objectives
  • Potential Impact
  • Security Controls
  • Data Classification

These requirements ensure a comprehensive approach to information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does Adequate Security mean?

A

Security commensurate with the risk and magnitude of harm from loss, misuse, or unauthorized access to information.

This is defined in OMB A130 Appendix III.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How is Risk defined in InfoSec?

A

A measure of the extent to which an entity is threatened by a potential circumstance or event, based on likelihood and adverse impacts.

Risk assessment is crucial for determining security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three main Security Objectives?

A
  • Confidentiality
  • Integrity
  • Availability

These objectives are essential for maintaining the security of information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does Confidentiality prevent?

A

The unauthorized disclosure of information.

Loss of confidentiality occurs when information is disclosed to unauthorized individuals or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the definition of Integrity in InfoSec?

A

Prevents the unauthorized modification or destruction of information.

Loss of integrity is characterized by unauthorized changes to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does Availability ensure?

A

Timely and reliable access to and use of information.

Loss of availability refers to the disruption of access to information or information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three levels of Potential Impact in case of a security breach?

A
  • Low
  • Moderate
  • High

Each level indicates the severity of the adverse effects on operations, assets, or individuals.

24
Q

What characterizes a Low level of impact?

A

Limited adverse effect on organizational operations, assets, or individuals.

Minor harm to individuals may occur.

25
Q

What characterizes a Moderate level of impact?

A

Serious adverse effect on organizational operations, assets, or individuals without loss of life.

Significant impact but no serious injuries.

26
Q

What characterizes a High level of impact?

A

Severe or catastrophic adverse effect on operations, assets, or individuals, including loss of life.

Major consequences may arise from such incidents.

27
Q

What are Security Controls?

A

Safeguards or countermeasures to avoid, counteract, or minimize security risks.

They can be classified by the timing of their occurrence relative to a security incident.

28
Q

What are Preventive controls?

A

Controls intended to prevent an incident from occurring.

Example: locking out unauthorized intruders.

29
Q

What are Detective controls?

A

Controls intended to identify and characterize an incident in progress.

Example: sounding an alarm to alert security personnel.

30
Q

What are Corrective controls?

A

Controls intended to limit the extent of damage caused by an incident.

Example: recovering the organization to normal operations as quickly as possible.

31
Q

What are Deterrent controls?

A

Controls that discourage security violations.

Example: presence of security cameras may deter theft.

32
Q

What are Compensating controls?

A

Controls intended to reduce risk due to existing or potential control weaknesses.

Often used in real-world situations where a control is missing.

33
Q

What is Data Classification?

A

The process of assigning a level of sensitivity to data.

This determines the extent to which data needs to be controlled or secured.

34
Q

What are typical sensitivity levels in Data Classification?

A
  • Top Secret
  • Secret (Highly Confidential)
  • Confidential (Proprietary)
  • Internal Use Only
  • Public

Sensitivity levels indicate the data’s value and required security measures.

35
Q

What are the five phases of the System Development Lifecycle (SDLC)?

A
  • Initiation
  • Development/Acquisition
  • Implementation
  • Operation and Maintenance
  • Disposition/Disposal

These phases outline the process for integrating security into system development.

36
Q

What is the purpose of the Initiation phase in the SDLC?

A

Need and Purpose (Business Case)

This phase identifies the necessity and objectives for the system.

37
Q

What tasks are involved in the Development/Acquisition phase of the SDLC?

A

Design, Purchased, and Developed

This phase focuses on creating or acquiring the system.

38
Q

What occurs during the Implementation phase of the SDLC?

A

Testing, Accept, and Install

This phase ensures the system is tested and accepted before full deployment.

39
Q

What is the focus of the Operation and Maintenance phase in the SDLC?

A

Operate, Modify, and Maintain

This phase involves ongoing operation and updates to the system.

40
Q

What does the Disposition/Disposal phase in the SDLC entail?

A

System or Parts Termination

This phase deals with the proper termination or disposal of the system or its components.

41
Q

What are the benefits of integrating security into the SDLC?

A
  • Early identification and mitigation of issues
  • Lower cost of control implementation
  • Maximize security program ROI
  • Awareness of potential challenges
  • Mandatory security requirements
  • Identification of common and inherited items
  • Shared security services
  • Reuse of security strategies and tools
  • Facilitation of executive decision making
  • Comprehensive, timely risk management

These benefits enhance the overall security posture of the organization.

42
Q

What is the NIST Risk Management Framework (RMF)?

A

A framework that promotes ongoing authorization and risk management through continuous monitoring processes.

It integrates security with Enterprise Architecture and SDLC.

43
Q

What are the RMF-Based Characteristics?

A
  • Near real-time risk management and ongoing authorization
  • Use of automated support tools for decision making
  • Integrates security with Enterprise Architecture and SDLC
  • Equal emphasis on phases of the RMF
  • Links risk management to all organization levels
  • Establishes Responsibility and Accountability

These characteristics ensure a comprehensive approach to risk management.

44
Q

What is the purpose of Tiers of Risk Management in NIST SP 800-39?

A

To implement multi-tier organization-wide risk management.

This approach is tightly coupled to Enterprise Architecture and Information Security Architecture.

45
Q

What does Tier 1 of the Organization-wide Risk Management address?

A

Risk from the organizational perspective.

It develops a comprehensive governance structure and enterprise-wide risk management strategy.

46
Q

What does Tier 2 of the Organization-wide Risk Management focus on?

A

Risk from a mission and business process perspective.

It is guided by risk management decisions taken at Tier 1.

47
Q

What is the focus of Tier 3 in the Organization-wide Risk Management?

A

Risk from an information system perspective.

It is guided by risk management decisions taken at Tier 2.

48
Q

What are the steps in the NIST Risk Management Framework?

A
  • Step 0: Prepare
  • Step 1: Categorize Information Systems
  • Step 2: Select Security Controls
  • Step 3: Implement Security Controls
  • Step 4: Assess Security Controls
  • Step 5: Authorize Information Systems
  • Step 6: Monitor Security Controls

These steps outline the entire RMF process.

49
Q

What is the purpose of Step 0 in the NIST RMF?

A

Preparing for the RMF process.

This step sets the groundwork for effective risk management.

50
Q

What does Step 1 of the NIST RMF involve?

A

Categorizing the system and identifying security objectives.

This step helps determine the necessary security controls based on the system’s categorization.

51
Q

What is accomplished in Step 2 of the NIST RMF?

A

Select a baseline of security controls based on Security Categorization.

This baseline is tailored and supplemented based on a risk assessment.

52
Q

What is the goal of Step 3 in the NIST RMF?

A

Implement and describe how the controls are used within the system.

This step ensures that security measures are operational.

53
Q

What is assessed in Step 4 of the NIST RMF?

A

The extent to which security controls are implemented correctly, operating as intended, and producing the desired outcome.

This assessment is crucial for understanding the effectiveness of the security measures.

54
Q

What does Step 5 in the NIST RMF involve?

A

Authorize the system based on the determination of acceptable risk to the organization.

This step is critical for formal approval of the system’s operation.

55
Q

What is monitored in Step 6 of the NIST RMF?

A

System controls assessing effectiveness, documenting changes, and reporting the security posture to officials.

Continuous monitoring is essential for maintaining security compliance.