ISO Flashcards

1
Q

ISO family

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IOS faimly 2 27007-onwards

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IOS 27001 family 3 27015-onwards

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO 27001 family 4 27023

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IOS family5

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IOS family 6

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PIM controls

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Interested parties

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asset 8

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

example compliance policy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A18.2.3 Tech Complinace Review

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A18.2.2 Compliance with Sec & Standards

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A18.2.1 Independent Review of info Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A.18.1.4 Privacy & Protect of personally ID info

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A18.1.3 Protection of Records

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A.18.1.2 Intellectual Property rights

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A.18 Compliance (2)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A.18 Compliance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Key in InfoSec Continuinty

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A17.1.3 Verify review & Evaluate INfo Sec Continuity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PDCA

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Threat, Risk , Vulnerability

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Sec Measures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Incident cycle

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Incident cycle T,R,V

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

C,i,A & Correctness

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

owner of asset

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

worm, Spyware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ISMS CSF

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ISMS CSF 3.6 reflect

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

wheel

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Annex A IS Ctrl Cat

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Project Progression

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A18 Compliance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A18 Compliance breakdown

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A18.2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ISMS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A.12 Ops Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A.12 Ops Sec p2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A12.2. Ops Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A12.4 Ops Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A12.5,6,7 Ops Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A13 Comms Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A13.2 Comms Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A14 Sys Acquisition Dev & Maintence

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A14.2 Sys Acq ,dev, Maintence

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A14.2. X Sys Acq, Dev, Main

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A.15 Supplier Relationships

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A16 IS inc Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A16.1 IS Inc Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A16. IS Inc mgmt Lifecycle

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A17 IS Aspect of BC mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A10 Cyprto

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A11 Physical & Env Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A11.1 Phy & Env Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A11.2.3- Phy Env Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A8 Asset Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A.8.1.2- Asset Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A.8.2 Asset Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A.8.3 Asset Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

ISC Access Ctrl A9

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A.9 Access Ctrl

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A.9 Access Ctrl

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A.9.4 Access Ctrl

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A.94..4 & 5. Access Ctrl

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A.& HR Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A7.1 HR Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A7.2 HR Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A7.3 HR Sec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

HR Sec A7 example

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A.& HR Answer

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

8.1 Ops

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

8.1 Ops outsource

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

8.1 Ops

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Supply Chain Rish Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Id supply Chain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

ID supply Chain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Common failing in Deployment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Ops steps for Effective Deployment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

risk Assessment 8.2 & risk treatment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Annex A ref cntrl Obj & contrl

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

A.6 Org of IS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

A6.1.4&5 Org of IS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

A6.2. Org of IS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

ISC Org of IS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

6.1 Planning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

IS Obj 6.2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

IS Obj 6.2 part 2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

measuring effectiveness

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

ISMS obj & Measurement

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Link Sec to Bus Obj

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Risk Treatment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Risk Assessement Ex- Impact Scale

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Clause 6 Planning 6.1

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Risk Decision

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Options for Risk Decision

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Risk Treatment - Risk Acceptance Criteria

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

ctrl

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

ex ctrl PPP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Risk & countermeasure- Likeihood impact

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

ISMS Risk Treatmemt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Compare ctrl to annex A

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

SOA detail security design

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

SOA Ex

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

SOA Manual- Procedure - Forms -records

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

ctrl listing handout

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Risk Mgmt spreadsheet

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Risk Assessment tool

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Risk Mgmt Summary

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Risk Mgmt Summary

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Cont Improvement

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

clause 6.2 Planning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

6.1.2 assess IS risk

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

IS risk Ass 6.1.2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Conduct Risk Ass 2 appraoch

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Detail of Risk mgmt- High level- Detais

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

ISO27005 Risk Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Risk Assessmet - ID risk

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Risk Scenarios- componets

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

NIST Risk Mgmt framework

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Info Assurance Standard

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Octava

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Asset-based risk mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Asset-based risk - treatment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Risk Asset ex

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Risk Assessment Ex Y

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Risk Assessment Ex Y

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

determining impact Value

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Risk Criteria

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

stage 1 intent audit

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

stage 2 implementation Audit

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Audit Obj

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

if NC found

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

most common problem at Audit - Risk Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Most common Problem at Audit- Misc

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

ISMS should not stop evolving in prep for Audit

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Clause 9- Performance Eval

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

perofrmance eval 9 - orgs and focus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

data collection tech

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Mgmt Process - Maturity framework

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

performance eval- understanding and acceptance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

performance eval- reporting on Polcy Deployment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

perforamance eval- reporting on polciy deployment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

clause 9- performance Eval 9.1,2,3

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

IS Standard- auditing apps

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Monitoring and mgmt internal audit 1st party

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

auditing mgmt Sys Obj

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

monitoring & mgmt - conducting interal Audits

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

performance eval- After internal Audit

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

mgmt review 9.3

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

mgmt review 9.3 part 2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

clause 4 - context

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

clause 4.1

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

4.2 interesting parties

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

e.g interested party

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

4.3 determine scope

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

scope

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

trust boundaries on the cloud

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

context & leadership

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

clause 5 - leadership

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

clause 5 - leadership

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

selling IS & ISO 27001

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

selling IS & ISO part 2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

5.1 Leadership

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

5.1 Leadership part 2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q
  1. Policy
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

ISC IS Policy A5

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

ISC IS Polices A5 eg

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

IS Policies A5 - Obj

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

5.3 Roles and Responsibilities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Info Mgmt

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

confidentiality

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Integrity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Integrity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

available measure eg.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Parkerian hexad

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

threat & threat agent

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

human threats

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

non human threats

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Risk

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

threat & risk

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

vulneraability

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Exposure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

threat & threat agent

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

human threats 2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Risk analysis

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

risk strategies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

countermeasures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

categories of countermeasures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

countermeasure - prevention

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

countermeasure - reduction

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

countermeasure- detection

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

countermeasure - repression

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

countermeasure- acceptance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

due care

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

sec measures - chart

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

ISMS PDCA

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

ISMS framework

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

sec policy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

sec policy contents

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

obj & the content of sec org

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

ISMS framework domains

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

IS roles

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

obj chart of Sec org

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

logical access ctrl

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

user responsibilities

A
207
Q

crytography

A
208
Q

symmetrical system

A
209
Q

asymmetrical system

A
210
Q

PKI

A
211
Q

1 way encrypt

A
212
Q

how to report inc

A
213
Q

sec inc eg.

A
214
Q

incident cycle

A
215
Q

Escalation - Fun - hierarchical

A
216
Q

ISO 27001 sec Processes

A
217
Q

Importance of Measures

A
218
Q

structing measures

A
219
Q

NIST ctrl types

A
220
Q

relationship between risk and measure

A
221
Q

Obj of classification

A
222
Q

effectsa of classfication

A
223
Q

Phy risk

A
224
Q

phy sec measure

A
225
Q

phy rings

A
226
Q

phy protection rings

A
227
Q

the building

A
228
Q

working space

A
229
Q

phy obj

A
230
Q

tech measures

A
231
Q

ops ctrl

A
232
Q

change measure

A
233
Q

technical risk

A
234
Q

phishing

A
235
Q

spam

A
236
Q

measuring against malware

A
237
Q

virus- worm - trojan, hoax

A
238
Q

spyware botnet

A
239
Q

access mgmt principles

A
240
Q

IAA concepts

A
241
Q

BCM

A
242
Q

DRP

A
243
Q

redundancy options

A
244
Q

org measures

A
245
Q

dangers & risks

A
246
Q

compliance

A
247
Q

compliance eg

A
248
Q

compliance eg

A
249
Q

ISO 27001 cert

A
250
Q

mgmt commitment

A
251
Q

mgmt commitment 2

A
252
Q

clause 7 -support

A
253
Q

resoures 7.1

A
254
Q

competence 7.2

A
255
Q

awareness 7.3

A
256
Q

project resources- e learning

A
257
Q

competence, awareness and comms

A
258
Q

competence 7.2 part 2

A
259
Q

awareness 7.3

A
260
Q

comms 7.4

A
261
Q

comms -typical concerns

A
262
Q

is info sec for u ?

A
263
Q

awareness & comms

A
264
Q

awareness & comms

A
265
Q

clause 6 planning

A
266
Q

actions to addrs risk & Opps general 6.1.1

A
267
Q

action to addres risk 6.1.1

A
268
Q

implementation approach

A
269
Q

implementation approach project

A
270
Q

implementation approach part 3

A
271
Q

implement BSC

A
272
Q

Implement BSC part 2

A
273
Q

risk to ms achieving its obj

A
274
Q

mgmt sys framework - docs

A
275
Q

creating an ISMS

A
276
Q

docs required

A
277
Q

doc required - stakeholders

A
278
Q

mgmt sys docs

A
279
Q

mgmg sys docs

A
280
Q

Mgmg sys Docs policy-> records

A
281
Q

integrating mgmt sys req

A
282
Q

tailoring to the org

A
283
Q

mgmt sys format

A
284
Q

mgmt sys format

A
285
Q

doc info requirements

A
286
Q

process roles

A
287
Q

drafting docs

A
288
Q

mgmt sys docs -publication

A
289
Q

mgmt sys docs summary

A
290
Q

mgmt sys framework - Improve

A
291
Q

clause 10 - improvement

A
292
Q

continual improvement

A
293
Q

cont improve 2

A
294
Q

CSI method

A
295
Q

what is improvement

A
296
Q

improve actions

A
297
Q

comms graph

A
298
Q

project framework

A
299
Q

process approach Cobit

A
300
Q

process approach cobit 5 model

A
301
Q

alternative process model

A
302
Q

interested parties- baseline

A
303
Q

interested parties- main drivers

A
304
Q

proj method IS stance

A
305
Q

proj progression

A
306
Q

proj review- key milestones

A
307
Q

proj who des what?

A
308
Q

implementation

A
309
Q

A mgmt sys

A
310
Q

ISMS =

A
311
Q

Impplenting sec ctrl

A
312
Q

in, Confidentiality

A
313
Q

integrity- Available-

A
314
Q

threat

A
315
Q

risk assessment - term

A
316
Q

27001 areas

A
317
Q

chart

A
318
Q

breakdown area

A
319
Q

risk assessment chart

A
320
Q

A15 Supplier relationship

A
321
Q

standards

A
322
Q

family

A
323
Q

PID

A
324
Q

selling IS to Sr mgmt

A
325
Q

supplier assurance

A
326
Q

org needs part 1

A
327
Q

org needs part 2

A
328
Q

solution

A
329
Q

standard & scheme

A
330
Q

benefits

A
331
Q

summary- intitiation

A
332
Q

structure of standard

A
333
Q

clause 4-10

A
334
Q

annex A ref ctrl

A
335
Q

shall

A
336
Q

shall be ..

A
337
Q

est scope

A
338
Q

guidance for scope

A
339
Q

AWS Annex eg.

A
340
Q

risk assessment

A
341
Q

risk assessment

A
342
Q

mandatory docs

A
343
Q

mandatory recs 2

A
344
Q

SOA sample spreadsheet

A
345
Q

map of cert

A
346
Q

map of cert 2

A
347
Q

the audit

A
348
Q

right to appeal

A
349
Q

non- conformity

A
350
Q

minor non- conformity

A
351
Q

opportunity for improvement

A
352
Q

noteworthy effort

A
353
Q

observations

A
354
Q

stage 1 audit

A
355
Q

stage audit 2

A
356
Q

A17.1.2 Implement IS cont.

A
357
Q

A17.1.1 Plan IS cont.

A
358
Q

A17 IS Aspect of BC Mgmt

A
359
Q

Inc mgmt Policy eg.

A
360
Q

A16.1.7 collect evidance

A
361
Q

A16.1.6 Learning from IS Inc

A
362
Q

A16.1.6 Learning from IS inc 2

A
363
Q

A16.1.5 response to IS Inc

A
364
Q

eg of IS mgmt Policy

A
365
Q

A16.1.4 Assessment of Decision of IS events

A
366
Q

A16.1.3 reporting IS weakness

A
367
Q

A16.1.2 reporting IS events

A
368
Q

A16.1.1 Responsibility & procedures

A
369
Q

A16 IS inc mgmt

A
370
Q

A16 IS inc Mgmt

A
371
Q

A15.2.2 Mgmt Changes to Suppliers

A
372
Q

A15.1.3 I &CT Suppliers

A
373
Q

A15.1.2 Addrs sec with supplier

A
374
Q

Eg of supplier relationship policy

A
375
Q

A15.1.1 IS policy for suppleir relationships

A
376
Q

A15.1.1 IS Policy for Supplier

A
377
Q

A14.3.1 Protection of test data

A
378
Q

A14.2.9 Sys acceptance testing

A
379
Q

A14.2.8 Sys sec testing

A
380
Q

A14.2.7 Outsource Dev

A
381
Q

A14.26 secure Dev Env

A
382
Q

A14.2.5 Sec Sys eng principles

A
383
Q

A14.2.4 Restriction on changes to Software

A
384
Q

A14.2.4 Tech review of Apps after Operation platform changes

A
385
Q

A14.2.2 Sys Change Ctrl procedures 2

A
386
Q

A14.2.2 Sys change ctrl procedures

A
387
Q

A142.1 Secure dev policy

A
388
Q

A141.3 protecting app service Trans

A
389
Q

A14.1.2 Securing apps services on Public network

A
390
Q

A14.1. IS req Analysis & specs

A
391
Q

A14 Sys Acquisition Dev

A
392
Q

A14.2. X Sys Acqisition

A
393
Q

map of cert survilance

A
394
Q

frequency of surveilance audits

A
395
Q

surveilance audit sample

A
396
Q

map of cert- re- cert

A
397
Q

recert of audit plan

A
398
Q

transition audit

A
399
Q

tool spectrum

A
400
Q

file share

A
401
Q

template & toolkits

A
402
Q

DMS

A
403
Q

risk mgmt & governance sys

A
404
Q

3rd party support

A
405
Q

A5.1

A
406
Q

6.1 Internal org

A
407
Q

6.2

A
408
Q

7.1

A
409
Q

7.2

A
410
Q

7.3

A
411
Q

8.1

A
412
Q

8.2

A
413
Q

8.3

A
414
Q

9.1

A
415
Q

9.2 user access mgmt

A
416
Q

9.3

A
417
Q

9.4

A
418
Q

10.1 crypto

A
419
Q

11.1 secure area

A
420
Q

12

A
421
Q

13 NW sec Mgmt

A
422
Q
  1. Sec req of IS
A
423
Q

15.1 IS in supplier

A
424
Q

16.1 Mgm IS inc

A
425
Q

17 IS cont

A
426
Q

A14. sYs Acq

A
427
Q

A13.2.4 Confidentiality or NDA

A
428
Q

A13.2.2 Agreement of I transfer

A
429
Q

A13.2.1 Info Transfer policy

A
430
Q

A13.1.3 Segregation of Network

A
431
Q

A13.1.2 Sec of Network Services

A
432
Q

A13.1.1 Nw ctrl

A
433
Q

A.13 Comms Sec 2

A
434
Q

A13 Comm sec

A
435
Q

Risk Treatment Plan

A
436
Q

gap analysis

A
437
Q

draft of SOA

A
438
Q

Risk Ass 2 docs

A
439
Q

residual Risk

A
440
Q

27005 constraints

A
441
Q

approach

A
442
Q

CIA

A
443
Q

CIA

A
444
Q

tech Vulnerablities

A
445
Q

18.1

A
446
Q

Asset based risk ass

A
447
Q

implement ISMS answers

A
448
Q

answer

A
449
Q

comparisiosn event- assets

A
450
Q

iS

A
451
Q

ansers

A
452
Q

vul

A
453
Q

threat CIA

A
454
Q

asset owners

A
455
Q

8.2

A
456
Q

risk asse

A
457
Q

key of ISMS

A
458
Q

training team

A
459
Q

sys & In Asset Owners

A
460
Q

tech/fun personnel

A
461
Q

IT Sec practitioners

A
462
Q

Info Sec officer

A
463
Q

Bus & Fun mger

A
464
Q

bus mgmr

A
465
Q

risk Owners

A
466
Q

Sr exec Mgr

A
467
Q

CIO

A
468
Q

risk ass process

A
469
Q

risk treatment

A
470
Q

risk mgmrt ATV

A
471
Q

A13 Comms Sec

A
472
Q

A12.7.1 IS Audit Ctrl

A
473
Q

A12.7 Restriction of Software

A
474
Q

A12.6.1 Mgmt of Tech vul

A
475
Q

A12.5.1 Install of SW on OS

A
476
Q

A12.4.4 Clock sync

A
477
Q

eg of Admin of Ops & log policy

A
478
Q

eg of Protection of log In Policy

A
479
Q

A12.4.2 Protection of Log INfo

A
480
Q

event of logging eg ploicy

A
481
Q

A12.4.1 Event logging

A
482
Q

eg backup policy

A
483
Q

A12.31 Info Backup

A
484
Q

eg of ctrl against Malware policy

A
485
Q

A12.2.1 ctrl against malware

A
486
Q

A12.2.1 ctrl magainst malware

A
487
Q

eg of polcy of seperation of Env

A
488
Q

A121.4 seperation of Dev,testing

A
489
Q

A11. Phy & env

A
490
Q

Cap mgmg Polc Eg

A
491
Q

A12.1.3 cap mgmt

A
492
Q

A12.1.2 Ch mmgtr

A
493
Q

eg of Doc operat mgmt proc

A
494
Q

A12.1.1 Doc op proc

A
495
Q

eg of Doc op mgmt procedure

A
496
Q

A12 Op sec

A
497
Q

A12 Ops sec

A
498
Q

A12 Ops sec

A
499
Q

A12 Ops sec

A
500
Q

A11.2.9 clean desk

A
501
Q

A11.2.8 Unattend user equipment

A
502
Q

1.2.7 secure disposal of devices

A
503
Q

A11.2.6 sec of devices and asset off prem

A
504
Q

IS sec manual

A
505
Q

5.3.

A
506
Q

IS policy

A
507
Q

A sec breach

A
508
Q

addressing risk and opport 6.1.1

A
509
Q

5 steps for risk mgm process 6.1

A
510
Q

risk treatment plan

A
511
Q

writing the risk meth

A
512
Q

A11.2.5 removal of assets

A
513
Q
A