Larry Greenblatt Kung Fu Magic Flashcards

1
Q

What are the new 8 domains in CISSP?

A

1) Security and Risk Management,
2) Asset Security,
3) Security Engineering,
4) Communications and Network Security,
5) Identity and Access Management,
6) Security Operations,
7) Security Assessment and testing,
8) Software Development Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 CMMI levels?

A

0) Non-existent,
1) Initial,
2) Repeatable
3) Defined
4) Quantitatively
5) Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the SDLCs?

A

1) Project Initiation
2) Functional Requirements
3) System Design
4) Develop/Acquire
5) Installation/Implement
6) Operation
7) Retirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the Incident Response Life Cycle phases.

A

Preparation, Detection and analysis, Containment Eradication and Recovery, and Post-Incident Activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a gap analysis work?

A

Figure out where we need to be, figure out where we are, and then close the gap between those two positions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ISO 27001

A

Requirements for Information Security Management Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ISO/IEC 15498 ?

A

The evaluation criteria for IT security. Called the “Common Criteria”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three goals of Info Sec Governance and risk managemetn?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three processes of Info Sec Governance and Risk management?

A

prevention, detection, and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the OECD (Organization for Economic Development)) help standardize?

A

International information exchange standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SO/IEC 27001:2005 covers what?

A

11 control categories. Controls can be audited against Outlines a management responsibility for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The information security officer is the quarterback of an company’s information security team.

A

They stay on top of security trends, identify weaknesses, communicate threats to higher levels, and coordinate between multiple departments to assess and improve an organizations security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the 1st maturity level of CMMI?

A

Initial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the last maturity level of CMMI?

A

Optimized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do policies dictate?

A

Policies dictate the “what”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most important feature of procedures?

A

That it works when followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What’s a baseline?

A

a reference point for unacceptable risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who is ultimately responsible for data loss/issues?

A

Who is ultimately responsible for data loss/issues?

19
Q

RACI is what?

A

Describes roles and responsibilities in a system and change request: Responsible (the doer), Accountable (who gets the blame), Consult, and Inform.

20
Q

What is the the first phase of the NIST SDLC focused on?

A

Initiation - and the first step is a sensitivity assessment - how important is this data?

21
Q

What are the phases of the NIST SDLC?

A

Initiate, Develop/acquisition, Implementation, Operation maintenance, disposal.

22
Q

What is certification?

A

A document providing proof of something.

23
Q

How is accreditation different from certification?

A

Accreditation provides authorization - certification is the stamp.

24
Q

What is ISO/IEC 27001 Section 4.2 related to?

A

Establishing and maintaining the ISMS. (Establish, implement, monitor, maintain)

25
Q

What is due diligence?

A

Thinking before you act.

26
Q

What is due care?

A

Taking action! Not securing data could be criminal.

27
Q

What does the delphi technique involve?

A

Getting a group of people together to analyze a problem - a QUALitative method. Requ

28
Q

Impact is

A

Amount of Loss

29
Q

Likely hood is

A

frequency of threat

30
Q

exploit is

A

incident of actual loss event

31
Q

controls are

A

safeguards/measures/countermeasures to reduce exposure/likelihood/impact.

32
Q

What are the different types of threats?

A

1)Man-made (accidental or intentional), 2) natural, or 3) technical

33
Q

What does SP800-100 discuss?

A

Risk assessment.

34
Q

What are the three control categories?

A

reventative, detective, and responsive.

35
Q

What is residual risk?

A

The remaining risk after risk controls have been applied.

36
Q

What is the single loss expectancy?

A

asset value * exposure factor

37
Q

What is annualized loss expectancy?

A

SLE * Annualized rate of occurrence.

38
Q

What is residual risk?

A

Risk * control gap.

39
Q

What are the different ways we can handle risk?

A

Avoid, Reduce, transfer, accept, or reject.

40
Q

What does section five of ISO/IEC 27001 discuss?

A

Management responsibilities for the information management system.

41
Q

What does section 6 of 27001 require?

A

That an internal audit of control objectives, controls, etc.. occurs.

42
Q

What does section 7 of 27001 discuss

A

The management review of findings.

43
Q

What does the PCI security standards council attempt to secure?

A

Credit card transactions. Specifically, the council is setup to prevent fraud.