Requirements Flashcards

1
Q

Data Classification - Impact Analysis NIST FIPS 199

A

Provides a framework for classifying data based on impacts across the three standard dimensions: confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Classification - Impact Analysis NIST SP 800 - 18

A

Provides a framework for classifying data based on impacts across the three standard dimensions: confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Classification - Impact Analysis - First Step

A

Identify High, Medium, Low impact data. Maybe based on impacts to people, customers or financial loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO 2700X Series

A

This series defines the relevant vocabulary, a code of practice, management system implementation guidance, metrics, and risk management principles.
- More than 20 standards in place.
- Is what ISO 900X is for Quality.
- Broad in scope, it is designed to be applicable to all shapes and sizes of organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISO/ IEC 15408 Common Criteria

A

A framework where security functional and assurance requirements can be specified in precise terms, allowing vendors to implement and/ or make claims about the security attributes of their products.
- Target of Evaluation
- Protection Profiles: set of security requirements for OS, firewalls etc.
- Evaluation Assurance Level : 7 levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO/ IEC 9126: Software Engineering – Product Quality

A

This four-part standard addresses some of the critical issues that adversely affect the outcome of a software development project.

  • defines six quality characteristics that can be used to measure the quality of software: Functionality, Reliability, Usability, Efficiency Maintainability and Portability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO/ IEC/ IEEE 12207: Systems and Software Engineering – Software Life Cycle Processes

A

Establishes a set of processes covering the lifecycle of the software. Each process has a defined set of activities, tasks, and outcomes associated with it. It acts to provide a common structure so all parties associated with the software development effort can communicate through a common vocabulary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ISO/ IEC 33001: 2015 Information Technology – Process Assessment

A

Process assessment is also known as SPICE. Updated to Software Process Improvement and Capability Determination.
- used for process capability determination and process improvement efforts related to software development.
- Six levels 0 to 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Federal Information Security Management Act (FISMA)

A

Federal Information Security Management Act of 2002 (FISMA) is a federal law that requires each federal agency to implement an agency-wide information security program.
NIST developed Risk Management Framework detailed in NIST SP 800-39

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Federal Information Processing Standards (FIPS)

A

Are mandatory sets of requirements on federal agencies and specific contractors.
Developed by NIST.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FIPS 140 Series

A

Security Requirements for cryptographic modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FIPS 186-3

A

Digital Signature Standard (DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FIPS 190-4

A

Secure Hash Standard (SHS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FIPS 197

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FIPS 200

A

Minimum security requirements for Federal Information and Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAFECode

A

SAFECode is dedicated to communicating best practices that have been used successfully by member firms.
- industry backed org.

17
Q

NIST SP 800-39

A

Risk Management Framework as six steps guidelines.
1. Categorize Security systems
2. Select Security Controls
3. Implement Security Controls
4. Assess Security Controls
5. Authorize Information Systems
6. Monitor Security Controls

18
Q

NIST SP 800 152

A

A profile for US Federal cryptographic key management system

19
Q

NIST SP 800 107

A

Recommendations for Applications using approved hash algorithms

20
Q

NIST SP 800 100

A

Information Security Handbook, a guide for managers

21
Q

NIST SP 800 63

A

Digital Identity Guidelines

22
Q

NIST SP 800 53

A

Security and privacy controls for Information systems and organizations.

23
Q

NIST SP 800 30

A

Guide for conducting risk assessments

24
Q

Sarbanes-Oxley Act of 2002

A

The information systems used for financial accounting must have some form of security control over integrity so that all may have confidence in the numbers being reported by the system.
- Was a reaction to several major accounting and corporate scandals, costing investors billions and shaking public confidence in the stock markets.

25
Q

The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act

A

contains elements designed to protect consumers’ personal financial information (PFI).
The three primary rules worth noting are
1. The Financial Privacy Rule, which governs the collection and disclosure of PFI, including companies that are nonfinancial in nature 2. The Safeguards Rule, which applies to financial institutions and covers the design, implementation, and maintenance of safeguards deployed to protect PFI
3. The Pretexting Protections, which addresses the use of pretexting (falsely pretending) to obtain PFI

26
Q

HIPAA and HITECH

A

Healthcare Insurance Portability and Accountability Act (HIPAA) deals with personal health information (PHI).
The Health Information Technology for Economic and Clinical Health Act (HITECH Act) is part of the American Recovery and Reinvestment Act of 2009 (ARRA) and is designed to enhance privacy provisions of electronic personal health information records.

27
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

Details the contractual requirements for members that accept and process bank cards. Includes requirements for security management, policies and procedures, network architecture, software design, and other critical protective measures for all systems associated with the processing and storing of cardholder data.

Payment Application (PA) DSS standard is a set of requirements used by software vendors to validate that a payment application is compliant with the requirements associated with PCI DSS. when creating applications designed to handle cardholder data, compliance with PA DSS signals that the software is properly designed.

PIN Transaction Security (PTS): security aspects associated with the Card PIN are governed by the PTS standard.

28
Q

Privacy-Enhancing Technologies

A

Include small application programs called cookie cutters that are designed to prevent the transfer of cookies between browsers and web servers.

29
Q

Requirements Traceability Matrix (RTM)

A

a grid that assists the development team in tracking and managing requirements and implementation details.
Consists of: Requirement ID, Requirement Description, Requirement Source, Test objectives, Validation Methods, Use cases.

30
Q

Misuse cases can help in

A
  • Can be used to help document the types of nonfunctional or quality requirements, such as reliability, resiliency, maintainability, testability, and so on.
  • Usability is one of the hallmarks of use cases and has a role in misuse cases as well.
  • can examine a system from an attacker’s point of view, whether the attacker is an inside threat or an outside one.
31
Q

NIST SP 800 60

A

Data classification: Guide for Mapping Types of Information and Information Systems to Security Categories

32
Q

ISO 27001

A

implementing an information classification system

33
Q
A