IT Security Management Flashcards

1
Q

IT security management

A

formal process to develop/maintain appropriate sec levels for org assets preserving CIAAA and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Plan-Do-Check-Act Process Model

A

ISO 31000 Risk Management Principles and guidelines
Plan -> establish sec policy, obj, processes, procedures; risk assessment; risk treatment plan
Do -> implement risk treatment plan
Check -> monitor and maintain risk treatment plan
Act -> Maintain and improve info sec risk management process; response to incidents review or changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Org Context and Security Policies

A

Identify org assets/information with its role and importance
what needs to be managed/provided by IT; consequences if failure in security

Organizational Security policy is generated -> objectives and strategies and the process used to achieve them

IT security office -> responsibility org’s IT security
oversight of process, liaison with mgmt, maintenance of policies, coordination of incidents, mgmt of sec awareness programs and training

IT project security officer -> sec policies at project level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security risk assessment

A

Every org asset is examined, and every possible risk is evaluated
if risk is too great -> remedial controls are deployed to reduce the risk

Baseline -> uses industry level practices. it can be too strict or too permissive
Informal -> using internal experts or consultants; it provides better context but can be skewed or incomplete
Detailed -> formal approach number of stages, identify assets threats and vulnerabilities, likelihood of risk and consequences
cost in time, resources and expertise
Combined -> baseline+informal+detailed
baseline + high-level risk assessment on systems + informal risk assessment on key systems and finally performing detailed risk analysis on those systems (ISO 13335)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Detailed Security Analysis

A

Risk Index = Max Info Sensitivity - Min User Clearance
process: prepare for assessment; conduct risk analysis; communicate results and maintain assessment
establish how vulnerable the industry is when seen against the context
risk appetite -> level of risk the org views as acceptable
who conducts the assessment

asset identification -> asset is anything that needs to be protected
Threat -> potential for a threat source to exploit a vulnerability which may compromise its security
vulnerability -> flaw or weakness in asset’s design
risk -> potential for loss possibility that a threat exploits a vulnerability and magnitude of harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Detailed Security Analysis - Threat identification

A

who or what could cause harm to an asset
how could it occur

threat source/agent -> human or human-made, accidental or deliberate

motivation -> why they target, how motivated
capability -> level of skill
resources -> time, money resources
probability of attack -> how likely and often
deterrence -> consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detailed Security Analysis - Vulnerability Identification

A

Identify flaws or weaknesses in the org’s systems

analyze risks
risk = probability that threat occurs x cost to org

provide guidance to mgmt as to which risks exist and how to appropriately respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Detailed Security Analysis - Risk Consequences

A

Risk consequence levels
insignificant, minor, moderate, major, catastrophic, doomsday

level of risk assign to each threat

risk register -> document all possible risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detailed Security Analysis - Strategies to reduce risk

A

Risk acceptance -> accept greater risk level than normal business
Risk avoidance -> remove activity to remove risk
Risk transfer -> share responsibility with third party
Reduce consequence -> modify structure/use to reduce impact
Reduce likelihood -> implement controls to lower attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly