Security and Risk Management Flashcards
What are the 3 security control types?
Administrative
Physical
Technical (aka Logical)
What are the 6 different functionalities of security controls?
Preventative Detective Corrective Deterrent Recovery Compensating
What does this describe?
A framework made up of many entities: logical, administrative, and physical protection mechanisms; procedures; business processes; and people that all work together to provide a protection level for an environment.
A Security Program
What does ISMS stand for and what is it?
Information Security Management System
It is all the things in a security program within the context of the ISO/IEC 27000 series.
What is ISO/IEC 27001?
The standard for establishment, implementation, control, and improvement of the ISMS. The ISO/IEC 27000 series was derived from BS 7799.
(Organizations can seek an ISO/IEC 27001 certification by an accredited third party.)
What are Enterprise architecture frameworks used for?
To develop architectures for specific stakeholders and present information in views that best suit the stakeholders. (e.g. Zachman Framework)
What is Governance?
Determines what what the organization is going to accomplish.
Ensures that stakeholder needs, conditions and options are evaluated to determine:
- Balanced agree-upon enterprise objectives to be achieved
- Setting direction through prioritization and decision making.
- Monitoring performance and compliance against agreed-upon direction and objectives.
What is Management’s responsibility?
Determines how to accomplish the objectives stated by Governance.
Plans, builds, runs and monitors activities in alignment with the direction set by the governance body to achieve the enterprise objectives.
This framework focuses on GOALS for IT and takes stakeholder needs and maps it down to IT goals.
COBIT
Control Objectives for Information Technology
A team-oriented, self-directed risk management methodology that employs workshops.
OCTAVE
This is a governance model for the organization as a whole used to help prevent fraud.
COSO
Committee of Sponsoring Organizations
What is ISO/IEC 27002?
Provides practical advice for how to implement security controls. (The “how to”)
What framework follows the PDCA?
ISO/IEC 27001
PDCA = Plan, Do, Check, Act
ISO 27005
A standards based approach to RISK MANAGEMENT
Who is ultimately responsible for Security within an organization? What do they do?
SENIOR MANAGEMENT (CEO, CSO, CIO)
- Development and Support of Polices
- Allocation of Resources
- Decision based on Risk
- Prioritization of business processes.
What is the term for the likelihood that a threat will exploit a vulnerability in an asset?
Risk
What is the term for a weakness or lack of safeguard
Vulnerability
What is the term used to describe the instance of a compromise?
Exploit
What is the term for something that mitigates a risk.
Countermeasure
aka control or safegaurd
What is Enterprise Security Architecture.
A subset of enterprise architecture and a way to describer current and future security processes, systems, and sub-units to ensure strategic alignment.
(e.g. SABSA)
What four qualities should Enterprise Security Architecture have?
- Strategic Alignment - Business drivers and regulatory and legal requirements are met
- Business Enablement - Help the business achieve it’s purpose.
- Process Enhancement - Process improvement (aka process engineering.)
- Security Effectiveness - Meeting metrics, and proving effectiveness to management.
What does NIST stand for? What is NIST?
The National Institute of Standards and Technology is a non-regulatory body of the U.S. Department of Commerce.
What is NIST SP 800-53?
Special Publication 800-53 outlines controls that agencies need to put into place to be compliant with the Federal Information Security Management Act of 2002 (FISMA).
What are the 3 NIST SP 800-53 control categories?
Technical
Operational
Management
What is Six Sigma?
A process improvement methodology.
What is CMMI?
Capability Maturity Model Integration developed by Carnegie Mellon University for the U.S. DoD as a way to determine the maturity of an organizations’s processes.
What are the four steps in the security program lifecycle?
- Plan and organize
- Implement
- Operate and Maintain
- Monitor and evaluate
What does this describe?
The functional definitions for the integration of technology into business processes.
A security blueprint
Describe patent
Grants ownership and use of INVENTIONS.