IT Governance Flashcards

1
Q

3 Types of Governance Models

A
  1. Centralized
  2. Decentralized
  3. Hybrid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Due Diligence

A

Pre-emptive measure made to avoid harm to other persons or their property
Leads to due care
Examples: employee background checks, credit checks, risk assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Due Care

A

Used to describe the care a “reasonable person” would exercise under given circumstances
Individual’s or organization’s legal duty
Lack of due care = negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Security Policies

A
  1. Organizational or Program Policy
  2. Functional, Issue Specific Policies
  3. System Specific Policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organizational or Program Policy

A

Addresses goals of confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Functional, Issue Specific Policies

A

Addresses areas of particular security concern requiring clarification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System Specific Policies

A

Areas where it is desired to have clearer direction or greater control for a specific technical or operational area may have more detailed policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Standards

A

Specific requirements for systems in an organization
Requires consistency across the organization
Hardware and software security mechanisms needed in controlling security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Policies

A

Define what organizations need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Baselines

A

Describes how to best implement the security configuration or standard of a software or environment to ensure that it is consistent throughout the organization
Specific rules describing how to implement the best security controls in support of policy and standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Procedures

A

Step-by-step instructions to support compliance with the policies and standards (best way to implement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Guidelines

A

Optional recommendations that can be used to enable individuals to make judgments with respect to security actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Policy Best Practices

A
  1. Clearly defined process for policy initiation, creation, review, approval,
    distribution and communication
  2. Do not be too specific in policy statements
  3. Use forceful, directive wording
  4. Policies must be technology independent
  5. Provide references to supporting documentation
  6. Conduct management review and sign-off
  7. Employees should explicitly acknowledge policies
  8. Define policy exception rules
  9. Review incidents and adjust policies as needed
  10. Periodically review policies
  11. Develop sanctions for non-compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Directive Controls

A
  1. Information security policies
  2. Procedures
  3. Standards
  4. Baselines
  5. Guidelines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Factors that Drive Frequency of Monitoring

A
  1. Organizational mission/business functions, and their ability to use monitoring results to facilitate greater situational awareness
  2. Anticipated frequency of changes in organizational information systems and operating environments
  3. Potential impact of risk if not properly addressed
  4. Degree to which the threat space is changing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Automated Monitoring

A

Usually faster, more efficient, more cost-effective, and less prone to human error

17
Q

Security Roles

A
  1. End User
  2. Executive Management
  3. Information Systems Security Professional
  4. Data Owner
  5. Data Custodian
18
Q

End User

A

Responsiblefor protecting information assets on a daily basis through adherence to the security policies that have been communicated

19
Q

Executive Management

A

Maintainsthe overall responsibility for protection of the information assets

20
Q

Information Systems Security Professional

A

Coordinate drafting of security policies, standards and supporting guidelines, procedures, and baselines

21
Q

Data Owner

A

Responsible for an information asset

22
Q

Data Custodian

A

Takes care of the information on behalf of the owner

23
Q

Risk Monitoring Strategy

A
  1. Monitoring Compliance
  2. Monitoring Effectiveness
  3. Monitoring Changes
  4. Automated Versus Manual Monitoring
  5. Frequency of Monitoring