Lesson 4 Flashcards

1
Q

The process of identifying and controlling threats.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risks can stem from: (5)

A

Financial Uncertainties
Legal Liabilities
Technology Issues
Strategic Management Errors
Accidents and Natural Disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process to achieve and maintain appropriate levels of key security services. (integrity, confidentiality, availability, reliability, accountability, authenticity)

A

Security Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The IT Security Management Functions include: (8)

A

⚬ organizational IT security objectives, strategies and policies
⚬ determining organizational IT security requirements
⚬ identifying and analyzing security threats to IT assets
⚬ identifying and analyzing risks
⚬ specifying appropriate safeguards
⚬ monitoring the implementation and operation of safeguards
⚬ developing and implement a security awareness program
⚬ detecting and reacting to incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An ISO 27000 security standard for vocabulary and standard definition.

A

ISO 27000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An ISO 27000 standard for information security specifications.

A

ISO 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An ISO 27000 standard for code of practice and a comprehensive set of security controls.

A

ISO 27002 (ISO 17799)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An ISO 27000 standard for implementation guidance.

A

ISO 27003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An ISO 27000 standard for management measurement.

A

ISO 27004

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An ISO 27000 standard for information security risk management.

A

ISO 27005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An ISO 27000 standard for the management of IT security.

A

ISO 13335

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which phase of the Deming Cycle establishes policy and defines objectives?

A

Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which phase of the Deming Cycle deals with mplementation and operation?

A

Do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which phase of the Deming Cycle assesses, measures, and reports results?

A

Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which phase of the Deming Cycle deals with taking action based on audit reports?

A

Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which organizational context deals with wanted security outcomes?

A

Objectives

17
Q

Which organizational context deals with how to meet objectives?

A

Strategies

18
Q

Which organizational context deals with identifying what needs to be done?

A

Policies

19
Q

IT security must be supported by _______.

A

Senior Management

20
Q

Provide consistent overall supervision; manage processes, handle incidents.

A

IT Security Officer/s

21
Q

Critical component, Assets VS Risks; based on organizational risk profiles.

A

Security Risk Assessment

22
Q

What are the approaches of a security risk assessment? (4)

A

Baseline
Informal
Formal/Detailed
Combined

23
Q

Uses industry-best practices; cheap, has no special consideration; suitable for small organizations.

A

Baseline Approach