Lecture 3 Flashcards

1
Q

What is a policy in the context of vulnerability management?

A

A high-level statement from top management.

It reflects intent and direction

Examples include Acceptable Use Policy (AUP), Email policies, Internet Usage policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of a standard?

A

An acceptable level of quality

Example: ISO 27001.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a procedure.

A

A series of detailed steps to be followed for accomplishing a particular task

Related to Standard Operating Procedures (SOP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a guideline provide?

A

Additional recommendations or suggestions for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the significance of ITSG-33?

A

It’s the Canadian equivalent to NIST 800-53

It is Canada’s Information Technology Security Guidance Publication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does PCI/DSS apply to?

A

Any organization that processes payment cards, such as VISA

It focuses on protecting cardholder data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is GAP Analysis?

A

Finding the gap between an organization’s security systems and those recommended by a framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the NIST Framework Core Functions.

A
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three classes of security controls according to NIST?

A
  • Technical
  • Operational/Administrative
  • Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Guidelines are mandatory to follow.

A

False

Guidelines provide optional guidance based on best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly