Security and Risk Management Domain Flashcards
What is a condition of (ISC)2 certification
Fully commit to the code of ethics
Protect society, the common good, necessary public trust and confidence and the infrastructure
First canon of ISC2 Code of Ethics
Act honorably, honestly, justly, responsibly and legally
Second canon of ISC2 Code of Ethics
Provide diligent and competent service to principals
Third canon of ISC2 Code of Ethics
Advance and protect the profession
Fourth canon of ISC2 Code of Ethics
Who can make a complaint to ISC
Only an injured party
Code of Ethics: any member of public can complain
Canon I & II
Code of Ethics: employer/contractor can complain
Canon III
Code of Ethics: certified professional can complain
Canon IV
Who reviews Ethics Complaints
ISC2 Ethics Committee
How is complaint submitted
Sworn affidavit that specifies respondent, behavior, canon breached, standing of complainant and any corroborating evidence
Who decides on discipline of members
ISC2 Board of Directors
Perform duties in accordance with existing laws, exercising the highest moral principles
C3 Unified Principles - Integrity
Perform all duties in a fair manner and without prejudice
C3 Unified Principles - Objectivity
Perform services diligently and with professionalism
C3 Unified Principles - Professional Competence and Due Care
Respect and safeguard information and exercise due care to prevent improper disclosure
C3 Unified Principles - Confidentiality
Clarifies an organization’s mission, values, and principles, linking them with standards of conduct
Organizational Code of Conduct
Number of mandatory canons in ISC2 Code of Ethics
`Four canons
Body that investigates and opines on ISC2 Code of Ethics Complaints
ISC2 Ethics Committee
Body that makes final decision regarding ISC2 Code of Ethics complaings
ISC2 Board of Directors
Extreme action that can be taken against ISC2 member
Decertification
What are the fundamental information security principles
Confidentiality, Integrity, Availability CIA
Assurance that information is not disclosed to unauthorized persons, processes, or devices
Confidentiality
Protection from unintentional, unauthorized, or accidental changes
Ìntegrity
Information is known to be good and that the information can be trusted as being complete, consistent and accurate
Data integrity
A system will work as intended
System integrity
Information, systems and supporting infrastructure are operating and acccessible when needed
Availability
The process of tracing actions to the source
Accountability
The property of bein genuine and able to be verified iand trusted
Authenticity
Protection against an individual falsely denying having performed a particular action
Non-repudiation
Measure of condidence that intended security controls are effective in their application
Assurance
Expands traditional application of information security by recognizing that we can no longer look at protecting an organization in isolation
Cybersecurity
Process by which an organization protects information, people and infrastructure
Cybersecurity
Broad primary outcome
Goal
Approach taken to achieve a goal
Strategy
Measurable step(s)_ taken to achieve a strategy
Objective
A tool used in support of an objective
Tactic
Align departmental strategies with business strategies to support organizational goals
Departmental Alignment
Mitigate risk to an acceptable level
Risk Management
Optimize investments in support of business objectives
Value Delivery
Efficient and effective use of resources
Resource Management
Achieve operational synergies and efficiencies
Process Integration
Ensure customer and stakeholder satisfaction
Satisfaction
Enhance organizaitonal reputation with stakeholders and the broader community
Reputation Enhancement
Reduce the likelihood of successful litigation by adhering to the principle of due care
Reduced Liability
Cybersecurity prerequisites for leadership, trust and commitment
Leadership, trust and commitment:
- Embraced throughout and embedded within an organization
- Cybersecurity professionals have access to C-suite and Board of Directors
- Included and recognized in organizational metrics and key performance indicators (KPIs)
Management metrics used to inform decision making
Key Performance Indicators
System by which organizations are directed and controlled
Corporate governance
State of security responsibility of leadership
- Determine and articulate the organization’s desired state of security
- Provide the strategic direction, resources, funding, and support to ensure that the desired state of security can be achieved and sustained
- Maintain responsibility and accountability through oversight
What is in the governance ecosystem
- Board of Directors
- Executive Management
- Organizational Roles
- Functional Roles
Sets the tone and direction
Board of Directors / Trustees
Board of Directors responsibilities
Oversight and authorization
Fiduciary, legal and regulatory responsibilities
Standard of due care and due diligence
Standard of care that a prudent person would have exercised under the same or similar conditions
Due care
Investigation o a business or person before entering a contract and during the lifetime of the relationship
Due diligence
The first three duties of the board
- Promoting effective governance
- Determining organizational risk tolerance
- Contributing to and authorizing strategic plans
Executive Management responsibilities
- Strategic alignment
- Risk management
- Value delivery
- Performance measurement
- Resource management
- Process assurance
Have authority to interpret the strategic direction and are held accountable for the success or failure of their area
Information Security Management
Who should Information Security Management report to?
As high up ni the organization as possible to maintain visibility, limit distortion, and minimize conflict
ISM responsibilities
- Being a subject matter expert and cybersecurity champion
- Managing the cybersecurity program
- Communicating with executive management
- Coordinating the budget for cybersecurity activities
- Ensuring the development and upkeep of governance documents.
Responsible for developing, implementing, and administering all aspects of an organization’s privacy program
Privacy Officer
Responsible for identifying applicable statutory, regulatory and contractual requirements, as well as ensuring compliance thereof
Compliance Officer
Responsible for ensuring that appropriate physical security procedures have been established and physical security devices installed, commensurate with the identified risk exposures
Physical Security Officer
Responsible for ensuring that management has established a framework of specific internal controls commensurate with risk, regulation, and Board directives
Internal Audit
Documenting roles and responsibilities in policies, job descriptions, employee manuals and supported by agreements
Codification
The term used to describe the responsibility of leadership to determine, articulate, authorize and fund the desired state of cybersecurity
Security Governance
The outcome when cybersecurity decision making is tied to organizational objectives
Strategic Alignment
This group has fiduciary responsibility
Board of Directors
Legal term applied to the standard of care exercised by a prudent person
Due care
Logical structure intended to document and organize processes
Framework
International Cybersecurity Framework
ISO 27000 family.
ISO 27001 Information Security Management Systems
ISO 27002 Code of Practice for Information Security Controls
ISO 27005 Information Security Risk Management
ISO 27014 Information Security, Cybersecurity and Privacy Protection
US Framework for Cybersecurity
NIST Cybersecurity Framework (CSF)
Non-profit dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment
Cloud Security Alliance
Framework of cloud-specific security controls mapped to leading standards
Cloud Controls Matrix (CCM)
Helps an organization identify their cybersecurity capabilities and initiatives and compare those efforts to peers or competitors of the same sector or size
Information Security Benchmarks
Creates consensus-based best practices for the secure configuration of a target system
Center for Internet Security (CIS)
https://www.cisecurity.org
A logical structure to document and organize processes
Framework
This US framework consists of standards, guidelines and practices to promote the protection of critical infrastructure
NIST Cybersecurity Framework (CSF)
This framework of cloud-specific security controls is mapped to leading standards, best practices and regulations
CSA Cloud Controls Matrix (CCM)
Non-profit organization that publishes the “Top 10” web
OWASP
Acting in accordance with applicable rules, laws, policies and/or obligations
Compliance
The power or right of a legal or political agency to exercise its authority over a person, subject matter, or territory
Jurisdiction
What is important for jurisdiction in relation to cybersecurity
- Location of data and systems (processing, transmission, storage)
- Type of data
- Residence of data owners
- Residence of data subjects
Security and privacy of consumer financial records
Gramm-Leach-Bliley Act (GLBA)
Security and privacy of patient medical records for covered entities and business associates (BA)
HIPAA & HITECH
security and privacy of student educational records
Family Educational Rights and Privacy Act (FERPA)
security and privacy related to the online collection and use of data for minors under 13
Children’s Online Privacy Protection Act (COPPA)
requires federal agencies, U.S. federal agencies, to implement a program to provide security for their information and their information systems, including those provided by or managed by another agency on their behalf
Federal Information Security Management Act (FISMA)
first privacy regulation at the state level in the United States
California Consumer Privacy Act (CCPA)
Privacy regulation of the EU
General Data Protection Reglation (GDPR)
Contractual obligation for any entity that accepts, processes, transmits, or stores payment cardholder data
Payment Card Industry Data Security Standard (PCI DSS)
Power or right of a legal or politial agency to exercise its authority over a person, subject matter, or territory
Jurisdiction
US regulation that requires safeguarding consumer financial data
Gramm-Leach-Bliley Act (GLBA)
Right of an individual to control the use of their personal information
Privacy
PII
Personally Identifiable Information
PHI
Personal Health Information
OECD Privacy Principles
- Collection Limitation: Collection limitation says that collection of personal data should be obtained by lawful and fair means.
- Data Quality: personal data should be relevant for the purposes being collected
- Purpose Specification: the purpose for which personal data is collected should be specified not later than at the time of data collection.
- Use Limitation: personal data should not be disclosed, made available or otherwise used for purposes other than specified except with the consent of the data subject or by the authority of law
- Security Safeguard: personal data must be protected
Cybersecurity programs should support and compliment organizational goals
Strategic Alignment
Role of this position is primarily oversight and fiduciary
Board of Directors (or equivalent)
The reasonable care taken before entering into and during the lifetime of a contract or agreement
Due diligence
Identifies building and facility risks and mitigation
Physical security officer
Manages the information security program
Information Security Officer
Role responsible for Managing and monitoring of protection mechanisms
Custodian
Assesses the control environment
Internal Audit
Regulation for patients
HIPAA
Regulation for Federal Agencies
FISMA
Regulation for Financial services customers
GLBA
Regulation for EU citizens
GDPR
Regulation for minors
COPPA
The second three duties of the board
- Allocating funds
- Approving policies and significant projects
- Ensuring appropriate monitoring
The last three duties of the board
- Ensuring compliance with laws, regulations and contracts
- Reviewing audit and examination results
- Honoring the legal constructs of due diligence and due care
Resource intended to help an organization identify their cybersecurity capabilities and compare those efforst to peers or competitors of the same sector or size
Benchmark
Broad term given to criminal activity that involves the Internet, a computer network a computer system, or a digital device
Cybercrime
Incident in which legally protected or private data has been potentially viewed, stolen (exfiltrated) or used by an individual unauthorized to do so
Data breach
Consulting legal counsel
- There is a possibility that legally or contractually protected information has been exposed
Responsibility for damages that result from a security compromise in your business
Downstream Liability
Describes a wide variety of property created by musicians, authors, artists, designers, programmers, and inventors
Intellectual Property
gives its owner the legal right to exclude others from making, using or selling an invention for aperiod of time in exchange for publishing a public disclosure of the invention
Patent
intended to protect recognizable names, icons, shape, color, sound or any combination used to represent a brand, product, service or company
Trademark
intended to allow the creator of certain types of original works to benefit from being credited and compensated for their work
Copyright
refer to proprietary business and technical information, processes, designs, or practices that are confidential and to a business
Trade Secrets
Criteria for trade secret
- Commercially valuable
- Be known only to a limited group of persons
- Be subject to reasonable steps taken by the owner of the information to keep it secret, including the use of confidentiality agreements for business partners and employees
Copyrighted software that is available at no cost for unlimited usage. The developer retains all rights to the program and controls distribution
Freeware
copyrighted software that’s available at no cost for unlimited usage and users are encouraged to share the software to promote larger distribution and maybe add-on sales
Shareware
copyright holder grants users the rights to use, to study, to change, and to distribute the software to anyone for any purpose
Open Source
copyrighted software that a company designs and develops to sell or license, and the company retains all rights to the program and controls distribution
Commrecial Software
contract between the owner and the end user that governs the use of intellectual property, in this case software licensing
End User License Agreement (EULA)
unauthorized copying or distribution of copyrighted software
software piracy
law that makes it illegal to create products that circumvent copyright protections
Digital Millenium Copyright Act (DMCA)
the flow of data between countries inclusive of processing, storage and transmission
Transborder or cross-border data flow
EAR
Export Administration Regulations
Legally enforceable software use agreement
EULA
US law that makes it illegal to create products that circumvent copyright protections
DMCA
Proprietary business and technical information that can be legally protected
Trade Secret
Formal inquiry or systematic study
Investigation
Investigation pursued by the regulatory agency of a jurisdiction
Regulatory Investigation
Maximum fine under GDPR
4% of annual revenue
Investigation aligned with violation of contractual standards
Industry investigation
Order that suspends the modification, deletion and/or destruction of records and media
Legal Hold
any process in which electronic data is sought, located, secured and searched with the intent of using it as evidence in a civil or criminal legal case
eDiscovery
Individual who is knowledgeable about the facts of the case through direct participation or observations
Factual witness
Person who has knowledge beyond that of an ordinary lay person enabling him/her to give testimony regarding an issue that requires expertise to understand
Expert witness. Experts can give an opinion
The basis of this type of investigation is a dispute between parties
Civil investigation
The burden of proof for this type of investigation is ‘beyond a reasonable doubt’
Criminal investigation
Process of seeking electronic data for use in a civil or criminal legal case
eDiscovery
This type of trial witness can proffer an opinion
Expert witness