Overig uit slides Flashcards

1
Q

What is an Audit?

A

“Auditing is the systematic process of objectively obtaining and evaluating evidence regarding assertions about economic activities and events to ascertain the degree of correspondence between the assertions and established criteria, and communicate the results to interested users”

“audit is testing to a norm”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rule-based vs principle-based

A

Rule-based: “the speed limit is 120 km/h”

Principle-based: “drive responsibly when it is snowing”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 types of control measures

A
  • Preventative measures: make risk (nearly) impossible to occur
  • Detective measures: make sure no risks go unnoticed
  • Corrective measures: when detected, react appropriately (respond and recover)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

There are three kinds of IT audits:

A
  • Design: system is adequate for its purpose
  • Implementation: design is effectively implemented and operational; procedures are known and used.
  • Operating effectiveness: system is effectively operational, for full duration of period
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PDCA in risk management

A
  • Company sets objectives (plan)
  • Company executes business processes (do)
  • Process outcomes are recorded (KPIs) and compared to norms reflecting the objectives (check)
  • In case of deviation, introduce control measures (act)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 4 problems of key management

A
  • key distribution: make sure only authorized people have key
  • secrecy: how to keep keys secret
  • useability: how to make sure people do not forget (e.g. key phrases)
  • storage: on a special device (smart card), stored encrypted. …?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 reasons to protect data

A
  • Privacy: Right to be let alone
  • protect citizens: limit the power of states or companies
  • autonomy: right to shape one’s own life
  • control: right to correct mistakes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 6 enterprise information security key questions?

(guest lecture)

A
  1. How secure do we want to be?
  2. Which risks do we want to mitigate?
  3. Which risks to accept?
  4. how secure are we anyway?
  5. Are we as secure as we want to be?
  6. How much money to spend on information security?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name and explain the 7 main steps of the guest lecture

A

1. Criticality of business activities: Create an overview of the activities and business assets that need protection, and determine the level of criticality of those assets

2. Operational conditions: Describe the policy and conditions that need to be filled in for the business activities to continue without interruption

3. Risk analysis and risk appetite: Create an overview of the initial business risks and determine the risk appetite of the organization.

4. Enterprise security requirements: Define the business security requirements, the level of protection required for the business assets, based upon the risk appetite of the organization

5. Security architecture: Define security architecture, describing the controls and measures requirement to comply to the enterprise security requirements.

6. Gap and risk analysis: Determine this discrepancies between the requires situation as described in the security architecture and the actual situation. Determine the risks caused by these discrepancies.

7. Management of remaining risks: Decide how to handle the remaining risks. Three main choices: accept, repair, insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

4 types of hacker actors

A

Nation state

Hacktivists

Organized Crime

Insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 parts of cyber kill chain

A

Preparation

intrusion

controlled breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly