ITSAC - Module 4 Flashcards

1
Q
  • high-level overview or the org
  • long term plan (5+ years)
  • forward looking
  • each level of division translates plan objectives into more specific objectives
  • executive team (CEO, COO, CFO, CIO)
A

Strategic Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • methods used to achieve the strategy
  • short term plan (1-2 year or less)
  • includes specific goals, budget, resources
  • breaks down strategil goals
  • eg. project plans, resource acquisition, project budgets, project reviews
  • Chief Information Security Officer (CISO) and security managers
A

Tactical Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • plan day to day running
  • controlled via daily/weekly/monthly/annual
  • inclued necessary tasks for all departments, communication, and reporting requirements
A

Operational Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

High-level statements which define roles, responsibilities, and expectations for specific domain areas.
- general
- what to do & not to do in org
- “all company data should be protected from unauthorized access”

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Specific low-level, mandatory controls that help enforce and support policies.
- how to comply to a certain policy

A

Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Recommended controls that help support standards or serve as a reference for when no applicable standard is available.
- not mandatory
- “use password manager”

A

Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Step-by-step instructions to accomplish policies, standards, and guidelines.
- specific
- how to change password

A

Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • isa management-level document, often written by the company’s CIO, detailing the company’s philosophy on security.
  • general policy to a whole
A

1. Enterprise information security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

– is developed by an organization to outline the guidelines that govern the use of individual technologies in that organization.
- specific

A

2. Issue-specific security policies (ISSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • focus on the information security policies of particular systems. For example, policies for customer-facing applications, payroll systems, or data archive systems.
  • identtify security needed
A

3. Systems-specific security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

: An Introduction to Computer Security: The NIST Handbook​

A

SP 800-12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

: Generally Accepted Principles and Practices for Securing Information Technology Systems​

A

SP 800-14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

: Guide for Developing Security Plans for Federal Information Systems​

A

SP 800-18 Rev. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

: Guide for Conducting Risk Assessments​

A

SP 800-30 Rev. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

: Guide for Applying the Risk Management Framework to Federal Information Systems: ASecurity Life Cycle Approach​

A

SP 800-37 Rev. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

: Managing Information Security Risk: Organization, Mission, and Information System View​

17
Q

: Building an Information Technology Security Awareness and Training Program​

18
Q

: Performance Measurement Guide for Information Security​

A

SP 800-55 Rev. 1

19
Q

: Information Security Handbook: A Guide for Managers​

A

SP 800-100