Information Security Governance Flashcards

1
Q

Core Goals of Security

A

CIA

Availability
Integrity
Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

Weakness or lack of countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat agent

A

Entity that can exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat

A

The danger of a threat agent exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk

A

The probability of a threat agent exploiting a vulnerability and the associated impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control

A

Safeguard that is put in place to reduce risk, also called a countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exposure

A

Presence of a vulnerability, which exposes the organization to a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

Reliable and timely data access to authorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity

A

Accuracy and reliability of the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Necessary level of secrecy is enforced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deterrent Control Function

A

Intended to discourage a potential attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Preventative Control Function

A

Intended to avoid an incident from occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Corrective Control Function

A

Fixes components or systems after an incident has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Recovery Control Function

A

Intended to bring the environment back to regular operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Detective Control Function

A

Helps identify an incident’s activities and potentially an intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compenstating Control Function

A

Controls that provide an alternate measure of control

17
Q

Control Types

A

Administrative, Technical, Physical

18
Q

Defense-In-Depth

A

Implementation of multiple controls so that successful penetration and compromise is more difficult to attain

19
Q

Security through obscurity

A

Assuming that your enemies are not as smart as you are and they cannot figure out something that you feel is very tricky

20
Q

Zachman Architecture Framework

A

One of the first enterprise architecture frameworks that is a 2d mode consisting of what, how, where, who, when, why.

21
Q

The Open Group Architecture Framework (TOGAF)

A

DOD enterprise architecture framework consisting of business, data, applications, and technology descending levels of possible architecture frameworks

22
Q

Department of Defense Architecture Framework (DoDAF)

A

Military framework consisting of command, control, communications, computers, intelligence, surveillance, and reconnaissance categories

23
Q

British Ministry of Defense Architecture Framework (MODAF)

A

A military framework based on DoDAD that focuses on compatible data formats and expedited delivery to those who need it

24
Q

British Ministry of Defense Architecture Framework (MODAF)

A

A military framework based on DoDAD that focuses on compatible data formats and expedited delivery to those who need it

25
Enterprise security architecture
Subset of an enterprise architecture and defines the information security strategy that consists of layers of solutions, processes, and procedures and the way they are linked across an enterprise strategically, tactically, and operationally
26
Enterprise security architecture
Subset of an enterprise architecture and defines the information security strategy that consists of layers of solutions, processes, and procedures and the way they are linked across an enterprise strategically, tactically, and operationally
27
ISMS
Information Security Management System
28
Strategic alignment
Business drivers and regulatory and legal requirements are being met by the security enterprise architecture
29
Business enablement
The core business processes are integrated into the security operating model
30
Process enhancement
We can do stuff better
31
Security effectiveness
Metrics measuring performance
32
CobiT
Control objectives for information and related technology
33
NIST 800-53
Control objectives for government systems
34
COSO IC framework
Committee Of Sponsoring Organizations Internal Control - model for corporate governance; derived COBIT
35
ITIL
Information Technology Infrastructure Library - de facto standard of best practices for IT service management
36
Six Sigma
Process improvement methodology developed by Motorola using statistical methods of measuring operational efficacy by assigning a sigma rating.
37
CMMI
Capability Maturity Model Integration - model defining incremental security improvement developed by Carnegie Mellon
38
Top-down Approach
Implement a security program from top management down. Typically more effective than bottom-up.
39
Bottom-Up Approach
Implement a security program from IT up without buy in from management. Typically less effective than top-down.