Implementing Compliance 7 Flashcards

0
Q

Name some of the physical security control types.

A

Locks to prevent unauthorized access
Logging and visitor access at all entrances open to general public
Identification systems like security cards, proximity reader
Video surveillance from cctv cameras
Security guards
Signs like no trespassing
Bonded personnel to protect org from financial exposure such as cleaning services
Mantrap doors. Or deadman door is a system with a door at each end of a secure chamber. Outer closed before entering the inner door
Physical barriers fencing, barricades, secure resources should not have windows or be visible from the outside
Alarms
Motion detection placed at checkpoints
Protected distribution hardening cables with storing metallic tubing and alarms to detect tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are physical security controls

A

Security measures that restrict, detect, and monitor access to specific areas or assets.
Can control access to building, equipment, server rooms, data centers etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name some environmental exposure that must be considered when evaluating the security of a building

A

Power fluctuations and failures
Water damage and flooding
Fires
Structural damage leading to unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name some environmental controls that can be implemented to help control a facility’s physical environment

A

Heating, ventilation, and air conditioning system HVAC. Monitor for proper running
Hot and cold isle. Controls the temp and humidity within data centers and computer rooms
EMI shielding. Prevent electromagnetic transfer from cables and devices by creating a conductive material productive barrier
Alarm control panel. Should be protected and secured from exposure
Fire prevention. Annual inspections, installing fireproof walls, use fire proof office material
Fire detection. Fire detection system should be connected to a central reporting station.
Fire suppression. Extinguishers and special gases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is environmental monitoring done

A

Regular monitoring is important to properly secure and prevent damage to resources.
Conditions that can threaten security should be monitored regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is safety important

A

Affects both personnel and property
Deter intruders with fencing and cctv
Protect employees with locks and proper lighting at night
Formulate an escape plan or route and perform drills
Text your controls to verify they are up to standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe compliance

A

The practice of ensuring that the requirements of legislation, regulations, industry codes and standards and Organizational standards are met.
Review pertinent law and regulatory documentation
Review policies and other legal documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain legal requirements

A

Organizations must consider overall legal obligations
Work with civil authorities when an incident occurs
Comply with other departmental policies
Observe legal limitations and civil rights
Consider legal issues for different groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Must Observe generally accepted forensic practices when investigating security incidents

A

Evidence collection. Follow correct procedures for collecting evidence

Evidence preservation. Company must properly preserve all gather evidence for a lengthy period of time

Chain of custody. Maintain a complete inventory they shows who handled specific its please and where they have been stored.

Jurisdiction. Who has the right to investigate and prosecute an info technology criminal case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is security policy awareness

A

Ensures all users comply with the guidelines.
Security policy should be accessible
Users trained with regular training sessions and security policy documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is role based training

A

Training based on job roles and organizational responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe personally identifiable information

A

Information used to Identify contact or locate an individual. Can include full name, fingerprints, license plate number, phone numbers, street address, drivers license number etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe Classification of information

A

Depends on the type of business and how data is stored
Classified as hard or soft.
Hard is concrete information. Soft is ideas thoughts and views.
Level is sensitivity
High/medium/low
Restricted/private/public
Confidential/restricted/public

Classification levels
Corporate confidential. Not provided to individuals outside of the enterprise
Personal and confidential. Personal info that needs to be protected
Private. Correspondence should be protected
Trade secret. Corporate intellectual property such as patents and processes
Client confidential. Client personal info protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the three important components they ensure proper employee security education

A

Awareness. Of potential threats to security. An employees role to protect assets and resources

Communication remain open between employees and security professionals

Education. Train employees in security procedures practices, and expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe user security responsibilities

A

Physical security. No ID no entrance to the building. No tailgating. Access in building for job purposes. Follow clean desk policies to secure documents

System Security. Use id and passwords properly and comply with requirements. Confidential files backed up and secured

Device security. Use correct procedures to log off all systems. Wireless communications must be approved. Portable devices secured and stored when not in use

Social networking security. Users aware of threats that target social networking. Follow security guidelines for social websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe validation of effective training

A

Ensure compliance
Increase overall security of the organization
Identify which components have the greatest impact
Establish metric: measuring Impact or behavioral changes due to training, compliance tracking, risk assessments

16
Q

What is a business partner

A

Commercial entity that has a relationship with another separate entity
Can be a supplier, customer, agent, reseller, or vendor of similar products or services.
Formal or informal partnerships
Goes through on-boarding and off-boarding
On-boarding acclimates business partners to the security practices expected follow
At the end of the partnership establish off-boarding process where both parties should agree to terminate any integration.

17
Q

Social media networks and applications security risks

A

Presents risks to an organizations security
Sensitive information posted spreads quickly
Social engineering is a concern.
Adequately train administrators
Privacy considerations as you try to keep sensitive info from being leaked.

18
Q

Describe interoperability agreements

A

SLA. service level agreement. Defines what services are to be provided to the client and what support will be provided.

BPA. business partner agreement. Defines how a partnership between business entities will be conducted about what is expected of each entity

MOU. Memorandum of understanding. Not legally binding. No exchange of money. About achieving the same goal in the agreed upon manner. Not the most secure agreement

ISA. interconnection security agreement. Ensure that the use of inter organizational technology meets a certain security standard. Legally binding. Supports MOU.

19
Q

What is risk awareness

A

Involves being consistently informed about the details of day to day interoperability. Keep employees on the lookout for risks in their own departments
Establish preparation for risk management.

20
Q

Data sharing and backups with business partners

A
Not given total access to the independently owned data. 
Define who owns the data. 
Implement access control. 
Define what is unauthorized sharing
Consider legal ramifications 
Control how shared data is backed up.