Information Security Governance Flashcards

1
Q

Core Goals of Security

A

CIA

Availability
Integrity
Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

Weakness or lack of countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat agent

A

Entity that can exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat

A

The danger of a threat agent exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk

A

The probability of a threat agent exploiting a vulnerability and the associated impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control

A

Safeguard that is put in place to reduce risk, also called a countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exposure

A

Presence of a vulnerability, which exposes the organization to a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

Reliable and timely data access to authorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity

A

Accuracy and reliability of the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Necessary level of secrecy is enforced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deterrent Control Function

A

Intended to discourage a potential attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Preventative Control Function

A

Intended to avoid an incident from occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Corrective Control Function

A

Fixes components or systems after an incident has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Recovery Control Function

A

Intended to bring the environment back to regular operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Detective Control Function

A

Helps identify an incident’s activities and potentially an intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compenstating Control Function

A

Controls that provide an alternate measure of control

17
Q

Control Types

A

Administrative, Technical, Physical

18
Q

Defense-In-Depth

A

Implementation of multiple controls so that successful penetration and compromise is more difficult to attain

19
Q

Security through obscurity

A

Assuming that your enemies are not as smart as you are and they cannot figure out something that you feel is very tricky

20
Q

Zachman Architecture Framework

A

One of the first enterprise architecture frameworks that is a 2d mode consisting of what, how, where, who, when, why.

21
Q

The Open Group Architecture Framework (TOGAF)

A

DOD enterprise architecture framework consisting of business, data, applications, and technology descending levels of possible architecture frameworks

22
Q

Department of Defense Architecture Framework (DoDAF)

A

Military framework consisting of command, control, communications, computers, intelligence, surveillance, and reconnaissance categories

23
Q

British Ministry of Defense Architecture Framework (MODAF)

A

A military framework based on DoDAD that focuses on compatible data formats and expedited delivery to those who need it

24
Q

British Ministry of Defense Architecture Framework (MODAF)

A

A military framework based on DoDAD that focuses on compatible data formats and expedited delivery to those who need it

25
Q

Enterprise security architecture

A

Subset of an enterprise architecture and defines the information security strategy that consists of layers of solutions, processes, and procedures and the way they are linked across an enterprise strategically, tactically, and operationally

26
Q

Enterprise security architecture

A

Subset of an enterprise architecture and defines the information security strategy that consists of layers of solutions, processes, and procedures and the way they are linked across an enterprise strategically, tactically, and operationally

27
Q

ISMS

A

Information Security Management System

28
Q

Strategic alignment

A

Business drivers and regulatory and legal requirements are being met by the security enterprise architecture

29
Q

Business enablement

A

The core business processes are integrated into the security operating model

30
Q

Process enhancement

A

We can do stuff better

31
Q

Security effectiveness

A

Metrics measuring performance

32
Q

CobiT

A

Control objectives for information and related technology

33
Q

NIST 800-53

A

Control objectives for government systems

34
Q

COSO IC framework

A

Committee Of Sponsoring Organizations Internal Control - model for corporate governance; derived COBIT

35
Q

ITIL

A

Information Technology Infrastructure Library - de facto standard of best practices for IT service management

36
Q

Six Sigma

A

Process improvement methodology developed by Motorola using statistical methods of measuring operational efficacy by assigning a sigma rating.

37
Q

CMMI

A

Capability Maturity Model Integration - model defining incremental security improvement developed by Carnegie Mellon

38
Q

Top-down Approach

A

Implement a security program from top management down. Typically more effective than bottom-up.

39
Q

Bottom-Up Approach

A

Implement a security program from IT up without buy in from management. Typically less effective than top-down.