Security Governance (Lecture 3) Flashcards

1
Q

Describe what security management concepts and principles are

A

Important elements in security policy and solution deployment

Define basic parameters needed for a secure environment

Define the goals and objectives of policy designers and system implementers to achieve to create a secure solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are protection mechanisms

A

Common in security control

Mechanisms include multiple layers (levels of access)

Abstraction

Hiding data

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is layering?

A

Also known as defence in depth

Multiple security controls in series (Firewall, ACL’s, VLAN’s)

Needs to be in a series to perform one after the other in linear fashion. This allows for data to be scanned and evaluated by each security control and if one control measure fails then it does not render the whole system ineffective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is abstraction?

A

Puts similar elements into groups, classes or. roles that are assigned security controls, restrictions or permissions as a collective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is abstraction used for?

A

Used for efficiency

Used to define what types of data an object can contain, what functions can be performed on or by the object

Simplifies security by enabling you to assign controls to a group of objects collected by type or function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Data Hiding?

A

Preventing data from being accessed by a subject by positioning the data in a logical storage compartment that is not accessible by the subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List some examples of Data Hiding

A

Keeping a database from being accessed by unauthorised users

Restricting users at a lower classification level from accessing data at a higher classification level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is encryption?

A

A system of hiding the meaning or intent of a communication from unintended recipients

Takes many forms and can be applied to every type of electronic communication (text, audio, video)

Encryption especially important in the transmission of data between systems

Various strengths, each designed for specific use or purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Security Governance

A

It is the collection of practices related to supporting, defining and directing the security efforts of an organisation

Closely related to Corporate governance and IT governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the stages of Top Down Responsibility Plan

A

Year
Strategic Plan
Tactical Plans
Operational Plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Strategic Plan?

A

A long term plan that is fairly stable. It defines the organisations security purpose

Helps understand security function and align its goals, mission and objectives of the organisation

Useful for around 5 years if maintained and updated annually

Vision of future discussed within and includes risk assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a tactical Plan?

A

Midterm plan developed to provide more details on accomplishing the goals set in strategic plan

Can be ad-hoc based on unpredicted events

Useful for around 1 year and often prescribes and schedules the tasks necessary to accomplish organisational goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Operational Plan?

A

Short term plan, highly detailed plan based on strategic and tactical plans

Useful for a short time

Must be updated frequently

Must include details on how the implementation processes are in compliance with the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you maintain security when changes are needed?

A

Systematically manage change

Involves extensive planning, testing, logging, auditing and monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Change Control/Management require?

A

Implement changes in a monitored and orderly manner

formalised testing process to verify changes produce expected results

All changes can be reversed (Backout/rollback plans)

Users informed of changes beforehand to prevent loss of productivity

Effects of change analysed

Negative impact minimised

Changes reviewed and approved by Change Approval Board (CAB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly