Section 5 Flashcards

1
Q

What crucial step should an organization take before attempting to assess its information security risks, according to ISO 27005?

A

The organization should gather information concerning the internal and external context, its interested parties, and their requirements. This step is essential before any attempt is made to assess information security risks or any other risks that can affect the intended outcome of the Information Security Management System (ISMS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is responsible for setting and regularly reviewing the Risk Appetite?

A

Risk Appetite should be set and regularly reviewed by top management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What crucial step should an organization take to reliably identify risks?

A

The organization should gather information concerning the internal and external context, its interested parties, and their requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a SWOT analysis

A

SWOT analysis is used to conduct a
thorough analysis of an organization’s strengths, weaknesses, opportunities, and threats. The analysis is done with the aim of determining where the organization should invest its resources (take advantage of opportunities, reduce weakness, face threats, etc.).

Strengths and weaknesses seek to assess the internal issues, while opportunities and threats are used to assess the external issues of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In SWOT analysis, how are strengths, weaknesses, opportunities, and threats typically categorized in terms of assessing organizational issues?

A

Strengths and weaknesses seek to assess the internal issues, while opportunities and threats are used to assess the external issues of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a PEST analysis allow organizations to analyze?

A

A PEST analysis allows organizations to analyze market forces and opportunities in the areas of political, economic, social, and technological factors. Some authors include additional categories such as environmental and legal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Porter’s Five Forces analysis examine?

A

Porter’s Five Forces analysis examines the competitiveness level of an organization by assessing five factors within an industry: the intensity of rivalry among competitors, the bargaining power of customers, the threat of potential entrants in the market, the bargaining power of suppliers, and the threats of alternative products or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

why is it important for an organization to consider interested parties that are opposed to its objectives in risk management?

A

The organization should consider all internal and external risk sources, including interested parties opposed to its objectives. Understanding these parties is highly relevant because it allows the organization to anticipate conflicts with its objectives. For example, an attacker desires weak security levels, so the organization, in response, implements strong security measures to mitigate this risk and ensure the interests of the ISMS are protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When analyzing the internal context of an organization, what structures should be identified?

A

The structures comprising various bodies and relations within the organization, including hierarchical and functional structures. This involves identifying segregation of duties, responsibilities, authorities, and communication, as well as functions outsourced to subcontractors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two main types of organizational structure outlined by ISO 27005?

A

The divisional structure, where each division is under the authority of a division director responsible for strategic, administrative, and operational decisions within that unit.

The functional structure, where functional authority is exercised over proceedings, including planning and decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three levels distinguished within an organization’s structure, as per ISO 27005?

A

The strategic level, responsible for policies and strategies.
The steering level, responsible for the coordination and management of activities.
The operational level, responsible for operations and support activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is it important for the risk manager to understand the organization’s activities and the type of products and services it offers?

A

Understanding the organization’s activities and offerings is crucial as they significantly impact its business model and may expose it to special risks such as information security risks, liabilities, and fines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the significance of the term “interested parties” in ISO/IEC 27005, and how are they defined in the context of information security risk management?

A

In ISO/IEC 27005, interested parties encompass both internal and external stakeholders with interests in the process of information security risk management. The information security risk management team must initially identify all interested parties and their concerns about risk management. Subsequently, the team should define the expected roles, responsibilities, and levels of participation for these parties in the project, ensuring consensus during the planning stage of their involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the importance of defining the scope and boundaries related to the information security risk management process, according to ISO/IEC 27005?

A

The organization must define the scope and boundaries to ensure that all relevant assets are considered in the risk management program. Defining boundaries helps identify and protect against risks that may arise through these boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can the scope of the information security risk management process be defined in ISO/IEC 27005?

A

The scope can be defined in terms of:

Organizational units (e.g., department, office, project, branch)
Business processes (e.g., sales management, procurement, hiring process)
Location (e.g., headquarters, server room)
Assets (e.g., customer file, database, payroll, trademark)
Technologies (e.g., server, application, network, wireless internet)

17
Q

How do less experienced organizations typically approach the introduction of the risk management process, as described in ISO/IEC 27005?

A

Less experienced organizations often start with a limited scope and gradually extend it as the information security risk management team gains more experience and understanding.

18
Q

What types of risk management methods are commonly used for information security risk management, and what approach do they typically employ regarding residual risk?

A

Operational risk management methods are typically utilized for information security risk management. These methods can employ any appropriate approach regarding the use of residual risk. The most commonly used approaches for information security risk management assess the likelihood and consequence of risks using current risk.

19
Q

Why is the planning stage considered crucial in ensuring the participation and support of interested parties throughout the risk assessment process, according to ISO/IEC 27005?

A

The planning stage is essential because it ensures the participation and support of interested parties throughout the risk assessment process. Validating the project plan by internal interested parties such as employees, owners, shareholders, and managers is crucial. Their active participation is required for the proper functioning of the project. Additionally, their support is vital as the results of the risk assessment can affect the budget of some of them.