ISC R1 Flashcards

1
Q

Framework Implementation Tier: cybersecurity risk gauging

Tier 1

A

Tier 1 (partial) - not integrated, not formalized, ad-hoc (need based), reactive manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Framework Implementation Tier: Gauging Cybersecurity Risk

Tier 2

A

Tier 2 (Risk-informed): approved by management but not org-wide policy. Has established risk management practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Framework Implementation Tier 3:

A

Tier 3 (Repeatable): risk management practices are consistently implemented. Adapt based on lesson learned and predictive indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Framework Implementation Tier 4:

A

Tier 4 (Adaptive): adapt its lessons based on lessons learned and predictive indicators from previous and current cybersecurity activities. RM is part of org culture, evolves, continuous awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COBIT 2019 Core Model: Governance Objectives:

A

EDM (Evaluate, Direct and Monitor) = ensuring business delivery, governance framework setting, risk optimization, resource optimization, shareholder engagement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three Principles of Governance Framework (COBIT):

A
  • Based on Conceptual Model
  • Open and Flexible
  • Aligned to Major Standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Most widely used enterprise IT Governance Standards

A

COBIT 2019 Framework (Control Objectives for Information and Related Technologies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

COBIT Management Objectives: APO

A

APO (Align, Plan and Organize)

  • Managed data - most significant
  • guidance on IT infrastructure, innovation, budgeting Human resources, vendors, quality, security and managing risk.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

COBIT Management Objective: BAI

A

BAI (Build, Acquire, Implement)

  • guidance on requirement definitions
  • identifying solutions
  • managing capacity,
  • dealing with organizational IT change, managing knowledge, administering assets and managing configurations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

COBIT Management Objective: DSS

A

DSS (Deliver, Service and Support)

  • addresses security, delivery and support services
  • manage operations, service request, manage problems, continuity, security services, business process controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

COBIT Management Objective: MEA

A

MEA (Monitor, Evaluate and Assess)

  • technology conformance to performance targets
  • manage performance and conformance monitoring, manage system internal controls, compliance, assurance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIS Control 12 : securely managing the network, ensuring network components updated, establishing and maintaining a secure network

A

CIS Control: Network Infrastructure Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open Systems Interconnection (OSI)

A

How protocols work and how well networking devices work with each other - has 7 layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI Layer 1

A

Physical - after decapsulation happens, converts message sent from data link layer, transmitted to other physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OSI Layer 2:

A

Data Link Layer - data packets are formatted for transmission. Determined by Ethernet. Adds Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OSI Layer 3

A

Network Layer - adds routing or address header or footers to the data. IP addresses. Detect errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OSI Layer 4

A

Transport Layer - supports and controls communication between devices. Setting the rules, validating integrity, data can be transmitted, data has been lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OSI Layer 5

A

Session Layer - allows sessions between communicating devices to be established and maintained. Have dialogue with others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OSI Layer 6

A

Presentation Layer - transforms data into a format others can interpret. Encryption occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OSI Layer 7

A

Application Layer - serves as interface between application and the network protocol. Does not represent actual application being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CSP Deployment Model that provides entire virtual data center of resources. Company is responsible for keeping the environment consistently up and running, CSP is responsible for physical management of infrastructure. Org more control, CSP less control.

A

IaaS (Infrastructure-as-a-Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CSP Deployment Model that provides proprietary tools to fulfill a specific business purpose. Run on CSP’s hosted infrastructure. CSP is responsible for keeping the application uptime at acceptable level. CSP more control, Org less control.

A

Business PaaS (Plaftorm-as-a-Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSP Deployment Model that provides business application or software that org use to perform specific functions or processes. Customers purchase through licensing. Access through internet - upgrades.

A

Software-as-a-Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cloud Risk

A
  • Rate of competitor adoption
  • Being in the same risk ecosystem as CSP and other tenants
  • Transparency
  • Reliability and Performance
  • Lack of application portability
  • Security and compliance
  • Cyber attacks
  • Data leakage
  • IT Org change
  • CSP long-term viability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
COSO ERM Framework - help company understand to which it wants to outsource technology options
Internal Environment
26
COSO ERM - how outsourcing can hinder or reach its objectives.
Objective-setting
27
COSO ERM where management must understand how CSP identify a problem, more complex or easier.
Event Identification
28
COSO ERM - risk of its cloud strategy, risk profile, likelihood of impact of all risks.
Risk Assessment
29
COSO ERM - to avoid risk, reduce its likelihood, share the risk by transferring a portion.
Risk Response
30
COSO ERM - how traditional controls, detective, preventative, automated and manual - modified in cloud environment.
Control Activities
31
COSO ERM - operating in cloud will affect timeliness, availability and dissemination of information.
Information and Communication
32
COSO ERM - should modify to accommodate new complexities introduced by adopting a cloud solution.
Monitoring
33
Pick Ticket - list provided to warehouse for inventory, items and quantities picked and packaged, sent to shipping = what transaction cycle?
Revenue Cycle
34
Business Improvement Process = Adapting one system and loading to another system
Robotic Process Automation
35
Business Improvement Process - consolidating similar functions from different departments/geographic locations - promote efficiencies.
Shared Services
36
Business Improvement Process - hiring a third-party org to process a function within the organization - potentially cut costs, employees to be repurposed, fill job vacancies.
Outsourcing
37
Difference between AIS and ERP
ERP - integrating multiple departments for a smooth flow of business process. Shipping data, data is less intensive and there is a central repository. AIS - accounting and financial system, stores financial data AIS is part of ERP.
38
Type of test in controls that shows an error when transaction amount exceeded the original.
Reasonableness Test
39
CIS Control 1 : actively track and manage all IT assets connected to a company’s IT Infrastructure physically or virtually within a cloud environment.
Inventory and Control of Enterprise Assets
40
CIS Control 2 : provides recommendations for orgs to track and manage all software applications so that only authorized software is installed on company devices.
Inventory and Control of Software Assets
41
CIS Control 3 : develop ways to securely manage the entire life cycle of their data, from the initial identification and classification data to its disposal.
Data Protection
42
CIS Control 4 : Establish and maintain secure baseline configurations for their enterprise assets, including network devices, mobile and portable end-user devices, non-computing assets such as IOT.
Secure Configuration of Enterprise Assets and Software
43
CIS Control 5 : outlines best practices for companies to MANAGE credentials and AUTHORIZATION for user accounts, privilege user accounts and service accounts.
Account Management
44
CIS Control 6 : specifying the type of ACCESS that user accounts should have. Organization’s users should only have the necessary privileges required for their job roles.
Access Control Management
45
CIS Control 7: CONTINUOUSLY identifying and tracking VULNERABILITIES within its infrastructure so that it can remediate and eliminate weak points or windows of opportunity for bad actors.
Continuous Vulnerability Management
46
CIS Control 8 : establishes and enterprise LOG management process so that organizations can be alerted and recover from an attack in real time or near real time using log collection and analytic feature.
Audit Log Management
47
CIS Control 9 : provides recommendations on how to detect and protect against cybercrime attempted through EMAIL or the INTERNET by directly engaging employees.
Email and Web Browser Protections
48
CIS Control 10 : assists companies in preventing installation and propagation of MALWARE onto company assets and its network.
Malware Defenses
49
CIS Control 11 : establishes DATA backup, testing and RESTORATION processes that allow organizations to effectively RECOVER company assets to a pre-incident state.
Data Recovery
50
CIS Control 13 : establishes processes for MONITORING and DEFENDING a company’s NETWORK infrastructure against internal and external security threats.
Network Monitoring and Defense
51
CIS Control 14: guides organization in establishing a SECURITY AWARENESS AND TRAINING PROGRAM to reduce cybersecurity risk.
Security Awareness and Skill Training
52
CIS Control 15 : helps organization develop processes to evaluate THIRD-PARTY SERVICE providers that have access to sensitive data or that are responsible for managing some or all of company’s IT functions.
Service Provider Management
53
CIS Control 16 : establishes safeguards that manage the entire LIFE CYCLE OF SOFTWARE that is acquired, hosted, or developed in-house to detect, deter and resolve cybersecurity weaknesses before they are exploited.
Application Software Security
54
CIS Control 17 : provides recommendations necessary to establish and incident response management program to detect, RESPOND and PREPARE for potential cybersecurity attacks.
Incident Response Management
55
CIS Control 18 : Helps organization TEST the soPhistication of their cybersecurity defense system in place by simulating actual attacks in an effort to find and exploit weaknesses.
Penetration Testing
56
A design factor under COBIT that drives innovation for business but is not required for critical business operations.
Turnaround
57
A design factor under COBIT that is not critical for operating a business or maintaining continuity
Support
58
A design factor under COBIT that will have an immediate impact for the business but is not required for critical business operations.
Factory
59
A design factor under COBIT that is crucial for both innovation and business operations.
Strategic
60
A Benefit of cloud service provider
Distributed/reduced redundancy among many data centers, having cloud storage reduce the likelihood that data is lost in an attack or disaster.
61
CSP’s often serve multiple cloud customers at ONCE, and use COMMON resource and technology (shared), referred as…
Multi-tenant
62
COSO ISP Component: sets company tone and reinforces the importance of having oversight of ERM. Related to behavior and values.
Governance and Culture
63
COSO ISP Component: company risk’s appetite should be aligned with its strategy and business objectives. During strategic planning process.
Strategy and Objective Setting
64
COSO ISP Component: reviewing company’s performance over time and making revisions of functions needed.
Review and Revisions
65
COSO ISP Component: recommends continual process to be in place that support sharing both internal and external information throughout the organization.
Information Communication and Reporting
66
Process Improvement where business processes use computer programs to perform repetitive tasks.
Business Process Automation
67
Process improvement : seeking out redundant services, combining them and sharing to a group of organizations. (Different countries/locations)
Shared Services
68
Process Improvement: Contracting Services to an external provider
Outsourcing
69
Relate to outsourcing of services to an external part in a different country.
Offshore operations
70
Use of programs to perform repetitive tasks that do not require human labor, such as extracting information from a user interface and inputting that data into a form.
Robotic Process Automation
71
Involves technology developed and used to encode, decode, and interpret human languages so that the technology can perform tasks. Text documents / speeches
Natural Language Processing (NLP) Software
72
Involve an input layer, a hidden layer, and an output layer - modeled after neurons that facilitate the function of human or animal memory.
Neural Networks
73
Purging Data means…
Permanently removing data from storage systems
74
Change management methodology characterized by different teams of employees working on separate tasks in sequence. * pre-written authoritative agreement Plan - analyze - design - develop - test - deploy - maintain
Waterfall Method
75
Challenges of Waterfall Method
*Requires great deal of time to complete *benefits of new system are not realized until completion *no customer input and change can be difficult to manage *employees may be idle before beginning or after completing
76
Change management methodology that offers more flexibility, characterized by cross-functional teams, each dedicated to particular functions or improvements of a system drawn from a prioritized list of customers remaining needs for the system.
Agile Method
77
Characteristics of Agile Method
*Team works linearly * Different teams working on different phases simultaneously * Works on shorter deadlines to encourage efficiency, communication critical. *Stakeholder feedback, consistent communication
78
Alternative site: - off site - with connection - no equipment in place - 1-3 days operations - cheapest
Cold Site
79
Alternative site: - off-site - with/without connection - Yes/No equipment in place - 0-3 days operations - moderately expensive
Warm site
80
Alternative site: - off-site - with connection in place - with equipment in place - Immediately - Most expensive
Hot Site
81
Steps in BIA (Business Impact Analysis)
1. Establish the BIA Approach - executives, time frames, methodologies 2. Identify Critical Resources - interviews with key personnel and documentation review 3. Define Disruption Impacts - qualitative/quantitative effects maybe natural or human-inflicted threats 4. Estimate Losses - ARO, ALE, SLE 5. Establish Recovery Priorities - MTTR, RPO, RTO 6. Create the BIA Report - completed at department level, company wide BIA 7. Implement BIA Recommendations - evaluating report and implementing preventative and corrective actions to remediate risks
82
ARO (Annual Rate of Occurrence) Formula
Number of Occurrences / relevant years
83
Damage in terms of Dollars, expressed as percentage of asset’s value
Exposure Factor
84
SLE (Single Loss Expectancy)
Cost of Individual Loss = EF x value of asset
85
ALE (Annualized Loss Expectancy)
Cost of specific loss in a given year = SLE x ARO
86
System backup: exact copy of entire database - time-consuming so weekly, least-time consuming in restoration
Full Backup
87
System backup: copying only the data that changed since last backup. Slowest of all three backups. Initial creation is fast.
Incremental backup
88
System backup: copies all changes made since last backup. Takes longer than incremental. Restoration is simpler. Recovery is slower than full but faster than incremental.
Differential Backup
89
Amount of time that services are operational, expressed in hours or days.
AST (Agreed Service Time)
90
Amount of time system or application is not functional.
Downtime (DT)
91
MTBF (Mean Time Between Failures)
Total Operational Time / Number of Failures
92
MTTR (Mean Time to Repair)
Total downtime / Number of Failures
93
Four Benefits of Relational Database
1. Completeness 2. No Redundancy 3. Business Rules Enforcement 4. Communication and Integration of Business Processes
94
In designing a database, it refers to normalization that eliminates any attributes that DEPEND on both the primary key and other non-key attributes.
3NF (Third Normal Form)