Information Assurance 1 Flashcards

1
Q

is the overarching approach for identifying, understanding, and managing risk through an organization’s use of information and information systems.

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is to protect and defend the information and
information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation.

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FUNDAMENTAL CONCEPTS IN PROTECTING
ORGANIZATIONS’ INFORMATION ASSETS

A
  1. INFORMATION ASSURANCE
  2. INFORMATION SECURITY
  3. INFORMATION PROTECTION
  4. CYBERSECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a subdomain of information assurance. Focused on CIA triad, Confidentiality, Integrity, Availability

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • is best viewed as a subset of information security.
  • It is often defined in terms of protecting the confidentiality and integrity of information through a variety of means such as policy, standards, physical controls, technical controls, monitoring, and information classification or categorization
A

INFORMATION PROTECTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

used to describe the measures taken to protect electronic information systems against unauthorized access or attack, protection
of networks and electronic information systems and focuses on the vulnerabilities and threats of an information system at the tactical
level.

A

CYBERSECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is to ensure the permanent inviolability of our national territory and its effective control by the Government and the State.

A

2011-2016 National Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Laws in force relating to cyber information security

A
  1. 2011-2016 National Security Policy
  2. R.A. 8792 (E-commerce act)
  3. R.A. 9775 (Anti-Child Pornography Act of 2009)
  4. R.A. 9995 (Anti-Photo and Video Voyeurism Act of 2009
  5. R.A. 10173 (Data Privacy Act of 2012)
  6. R.A. 10175 (Cybercrime Prevention Act of 20120
  7. M.O. 37, s2001 (Providing for the Fourteen Pillars of Policy and Action of the Government Against Terrorism – critical infrastructure is defined in this document and requires the preparation of a comprehensive security plan [1][a] above)
  8. E.O. 810, s2009 (Institutionalizing the Certification Scheme for Digital Signature)
  9. A.O. 39, s2013 (Government Web hosting Service of DOST ICT Office
  10. PNS ISO/IEC 270001:2005 (Information technology — Security techniques — Information security management systems – Requirements)
  11. PNS ISO/IEC 27002:2005 (Information technology — Security techniques — Code of practice for information security management)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • recognizes use of electronic commercial and non-commercial transactions and electronic signature
  • legal recognition to electronic data messages, electronic documents and electronic signatures
A

R.A. 8792 (E-commerce act)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

protects the victims who are made to believe that they are performing sexual acts in private

A

R.A. 9995 (Anti-Photo and Video Voyeurism Act of 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

aims to protect personal data in information and communications systems both in the government and the private sector

A

R.A. 10173 (Data Privacy Act of 2012)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“Child” refers to a person below eighteen (18) years of age or over but is unable to fully take care of, or protect, himself/herself from abuse, neglect, cruelty, exploitation or discrimination because of a physical or mental disability or condition.

A

R.A. 9775 (Anti-Child Pornography Act of 2009)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

completely address crimes committed against and by means of computer system

A

R.A. 10175 (Cybercrime Prevention Act of 20120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PROVIDING FOR THE FOURTEEN PILLARS OF POLICY AND ACTION OF THE GOVERNMENT AGAINST TERRORISM

A

Memorandum Order No. 37, s. 2001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

```

MANDATING GOVERNMENT AGENCIES TO MIGRATE TO THE GOVERNMENT WEB HOSTING SERVICE (GWHS) OF THE DEPARTMENT OF SCIENCE AND TECHNOLOGY-INFORMATION AND COMMUNICATIONS TECHNOLOGY OFFICE (DOST-ICTO)

A

Administrative Order No. 39, s. 2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Executive Order No. 810, s. 2009

A

INSTITUTIONALIZING THE CERTIFICATION SCHEME FOR DIGITAL SIGNATURES AND DIRECTING THE APPLICATION OF DIGITAL SIGNATURES IN E-GOVERNMENT SERVICES

14
Q

specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization’s overall business risks.

A

ISO/IEC 27001:2005

15
Q

PNS ISO/IEC 27002:2005

A

(Information technology — Security techniques — Code of practice for information security management)

16
Q

5 Pillars of Information Assurance

A
  1. Integrity
  2. Availability
  3. Confidentiality
  4. Authentication
  5. Non repudiation
17
Q

involves assurance that all information systems are protected and not tampered with.

A

Integrity

18
Q

involves ensuring those who have access to information, are who they say they are.

A

Authentication

19
Q

simply means those who need access to information, are allowed to access it

A

Availability

20
Q

involves the confidentiality of information, meaning only those with authorization may view certain data.

A

Confidentiality

21
Q

final pillar simply means someone with access to your organization’s information system cannot deny having completed an action within the system.

A

Non Repudiation

22
Q

Implications from Lack of IA

A
  1. Penalties from a Legal/Regulatory Authorities
  2. Loss of Information Assets
  3. Operational Losses and Operational Risk Management
  4. Customer Loss
  5. Loss of Image and Reputation
23
Q

development and implementation of
policies and procedures to aid in performing the ongoingmaintenance necessary to keep an information assurance process operating properly to protect assets and people
from threats.

A

Due care

24
Q

reasonable investigation, research, and understanding of the risks an organization faces before committing to a particular course of actio

A

Due diligence

25
Q

Strategies of
Information System

A
  1. Comprehensive
  2. Independent
  3. Legal and Regulatory Requirements
  4. Living Document
  5. Long Life Span
  6. Customizable and Pragmatic
  7. Risk-based Approach
  8. Organizationally Significant
  9. Strategic, Tactical, and Operational
  10. Concise, Well-Structured, and extensible
26
Q

SIX CHARACTERISTICS-OF A
DEFENSE-IN-DEPTH STRATEGY

A
  1. Self-organizing
  2. Adapting to unpredictable situations
  3. Evolving in concert with an ever-changing environment
  4. Reactively resilient
  5. Proactively innovative
  6. Harmonious with system purpose
27
Q

Information Asset Life Cycle

A
  1. Create
  2. Process
  3. Use/Transmit/Store
  4. Retain
  5. Dispose
27
Q
  • demonstrates the process of managing security throughout the life cycle
  • includes implementation of continuous improvement process to attain an effective information management system
A

PLAN-DO-CHECK-ACT MODEL

28
Q

Boyd’s OODA Loop

A

Observe
Orient
Decide
Act

28
Q

Boyd’s OODA

A
  • Observe. Gather raw information about the situation at hand. Be as accurate and thorough as possible.
  • Orient. This step is designed to weed out bias and includes areas such as genetic heritage, cultural tradition, and previous experiences.
  • Decide. Based on the output of the orientation, a decision is made to act.
  • Act. The action is performed
29
Q

US millitary targeting doctrine describes the kill chain as find, track, target, engage, and assess (FT2TEA)

A

THE KILL CHAIN

30
Q

PROFESSIONAL CERTIFICATIONS

A
  1. The International Information System Security Certification Consortium (ISC)2
  2. The Computing Technology Industry Association (CompTIA)
  3. Information System Audit and Control Association (ISACA)
  4. Information System Security Association (ISSA)
  5. SysAdmin, Audit, Network and Security (SANS)
  6. Disaster Recovery Institute, International (DRII)
  7. Business Continuity Institute (BCI)