Module 5: L2 Flashcards

1
Q

When implementing IS policy, one must address the concerns of top management. What are 3x concerns they may have?

A
  1. Value info has for the business
  2. How IS contributes to business objectives
  3. How info can be made more secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When implementing IS, perception and commitment of ______ ________ are critical

A

top management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IS begins with top management. They need to identify critical business processes and classify them as critical, important, or routine, like:

A
  1. Star performers
  2. Failure in a process severely impacts the organization
  3. Delays in a process are unacceptable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3x pillars of security?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When doing vulnerability assessments, what are some features considered for each one?

A
  1. Natural origin
  2. Human made origin
  3. Location of action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some components affected by vulnerabilities?

A
  1. Software
  2. Hardware
  3. People
  4. Services
  5. Documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Given organizational structure, one should estimate likelihood of leakage within certain flows:

A
  1. Subordination flow
  2. Info flow
  3. Human factors
  4. IT infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Info leakage rules. Info leakage increases with (3x):

A
  1. Number of subjects with access
  2. Number of transactions
  3. Ability to modify info does not correspond with increasing level of security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 4x forms of human error in IS?

A
  1. Secret info leaked unintentionally or on purpose
  2. Secret info mistakenly forwarded to lower security level
  3. Info sent to wrong person by mistake
  4. Unauthorized person sends data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly