Information Security Governance Flashcards

1
Q

Security governance is supported by the documents

A

ISO/ICE 17799 (ISO 27002), British Standard 77 99 (ISO 27001), ISACA CobiT, NIST SP 800-55, 800-26, 800-12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Governance is the process by …

A

governments are selected, held accountable, monitored, and replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Corporate governance is …

A

a set of relationships among the organization’s management, board, stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Corporate governance provides …

A

objectives, means, and ability to monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An effective security governance has four components:

A

1) Establish the responsibilities for each group of management and employees, 2) establish practical security policies and procedures backed by the authority, 3) ability to capture and provide meaningful information on program effectiveness, and 4) periodic analysis of the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maturity level 1 of security program

A

Control objectives have been documented in a policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Maturity level 2 of security program

A

Security control processes have been documented in procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Maturity level 3 of security program

A

Supporting procedures have been implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Maturity level 4 of security program

A

Policies, procedures, and controls are tested and reviewed to ensure continued adequacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maturity level 5 of security program

A

Procedures and controls are fully integrated into the culture of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The information strategy must address three key concepts …

A

Identification, authentication, and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authorization shall follow two key elements …

A

Need to know and least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Effective security strategy requires at a minimum of five key elements …

A

Policies, procedures, authentication, authorization, and recovery plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An effective information security strategy requires four types of controls …

A

preventive, detective, containment, and recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Business Continuity Planning, BCP, is a corporate requirement and must be integrated with

A

the IT Disaster Recovery Plan (DRP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Business Continuity Plan (BCP) Purpose

A

Provide procedures for sustaining essential business operations while recovering from a significant disruption.

17
Q

Business Recovery (Resumption) Plan (BRP) Purpose

A

Provide procedures for recovering business operations immediately following a disaster.

18
Q

Continuity of Operations Plan (COOP) Purpose

A

Provide procedures and capabilities to sustain an organization’s essential, strategic functions at an alternate site for up to 30 days.

19
Q

Crisis Communications Plan (CCP) Purpose

A

Provide procedures for disseminating status reports to personnel and the public.

20
Q

Cyber Incident Response Plan (CIRP) Purpose

A

Provide strategies to detect, respond to, and limit the consequences of malicious cyber incidents.

21
Q

Disaster Recovery Plan (DRP) Purpose

A

Provide detailed procedures to facilitate recovery of capabilities at an alternate site.

22
Q

Emergency Response Plan (ERP) Purpose

A

Provide coordinated procedures for minimizing loss of life or injury and protecting property damage in response to a physical threat.

23
Q

Contingency Plans - which one of the scopes is IT-related?

A

BCP, CIRP, DRP, and ERP.

24
Q

The cyber incident response plans include …

A

the normal day-to-day activities and when they have a need for recovery you need to have procedures in place to do them in a structured and formatted manner and not ad hoc.

25
Q

The emergency response plan stabilizes …

A

the environment and ensures the safety of the employees.

26
Q

The SLA should include things such as …

A

the time that it’s going to be run, from what period to what period; you’ll talk about recovery requirements, backup requirements, and when it has to be up.

27
Q

Due diligence is the process of …

A

systematically evaluating information to identify risks and issues relating to a proposed transaction.

28
Q

Roles and Responsibilities of a Senior Management …

A

is charged with the ultimate responsibility for
meeting business objectives or mission requirements. Senior management must ensure that necessary resources are effectively applied to develop the capabilities to meet the mission requirement.

29
Q

Roles and Responsibilities of a Chief Information Security Officer (CISO) …

A

The CISO is responsible for the organization’s planning, budgeting, and performance including its information security components.

30
Q

Roles and Responsibilities of an Information Owner …

A

for ensuring that proper controls are in place to address integrity, confidentiality, and availability of the information resources of which they are assigned ownership.

31
Q

Roles and Responsibilities of a Business Manager …

A

for making cost-benefit decisions essential to ensure accomplishment of organization mission objectives. Their involvement in the risk management process enables the selection of business-oriented controls.

32
Q

Roles and Responsibilities of an Information Security Officer …

A

The security program manager is responsible for the organization’s security programs, including risk management.

33
Q

37

A

37