Security Management Practices Flashcards
COSO framework, developed by the Committee of Sponsoring Organizations (COSO) of the Treadway Commission in 1985 was developed to deal with fraudulent financial activities and reporting. The COSO framework is made up of the following components except:
i. Control environment
ii. Risk assessment
iii. Control activities
iv. Information and communication
v. Accreditation
A. iii, iv
B. ii, v
C. i, ii
D. v
D. v
The COSO framework is made up of the following components:
Control Environment, Management’s philosophy and operating style, Company culture as it pertains to ethics and fraud, Risk assessment, Establishment of risk objectives, Ability to manage internal and external change, Control activities, Policies/proceedures/practices put in place to mitigate risk, Information and communication, Structure that ensures
Which category best describes threat modeling?
A. Qualitative approach to risk analysis
B. Value-based approach to risk analysis
C. Quantitative approach to risk analysis
D. None of these
A. Qualtative approach to risk analysis
Since threat modeling is based on perceptions, opinions, judgments, and experiences rather than hard costs and facts-threat modeling is an example of a qualitative approach to risk analysis. Calculating hard costs and facts would be a quantitative or value-based approach.
Which of the following is not a characteristic typically considered important when initially considering security countermeasures?
A. Modular in nature
B. Includes an audit function
C. Reasonably priced
D. Defaults to least privileged
C. Reasonably Priced
While a practical concern, the cost of the countermeasure should not be considered until the
characteristics of the countermeasure needed have
been prioritized.
California 1386, Sarbanes-Oxley, and HIPAA are examples of what kinds of security policy directives? A. Regulatory B. Administrative C. Advisory D. Informative
A. Regulatory
Directives and mandates typically coming from outside the company from the government, legal, or industry authorities are called regulatory policy objectives. Administrative is not one of the three types of policies. Advisory policies address requirements for certain types of behaviors or activities among the workforce. Informative policies address educational awareness.
What is the relationship between policies and standards?
A. Policies detail who should do the work, and standards detail why.
B. Policies detail what should be done, and the standards detail how.
C. Policies describe the security vision, and standards detail what should be done.
D. Policies embody general principles, and standards describe who does the work.
B. Policies detail what should be done, and the standards detail how
Policies clearly articulate what is expected from the workforce, and the standards provide specific rules as to how to accomplish these objectives.
Management establishes a policy that requires that all information technology professionals must have a college degree with a core emphasis on information
technology, and that all system administrators must have a security certification from an accredited program. By doing so, management has established what?
A. A standard
B. A guideline
C. A baseline
D. A regulation
C. A baseline
Management has set the baseline minimum
requirements for employees working in information
technology. Candidates can have higher qualifications,
but no one working in IT and in the area of server
administration can have lower than specified
qualifications.
The operations manager has established the use of uniform checklists for all server maintenance. What has the operations manager done?
A. Established a baseline
B. Established a regulation
C. Established a standard
D. Established a policy
C. Established a Standard
The operations manager has established a
standard, which specifies how hardware will be
maintained. A regulation is a directive usually imposed
from an entity outside the company-such as a mandate
from government, a legal requirement, or an industry
requirement. Policies are usually established by senior
management, rather than line management. The
operations manager may be reacting to a policy
directive that requires uniformity and consistency in
server management. The introduction of the checklists
provided the tools necessary to implement this policy.
Use of the checklists will eventually yield a baseline for
server quality.
The operations manager has established that prior to building a server, the employee must first check the inventory to make sure that all the spare parts needed are available, they must sign out those parts, and follow a checklist, finally signing and dating it when done. What has the operations manager created?
A. A baseline
B. A procedure
C. A standard
D. A policy
B. A proceedure
A procedure is the detailed, step-by-step actions needed to achieve a task. By contrast, a policy is usually set by upper management, and provides
general expectations or objectives that need to be
accomplished. Standards are compulsory rules that
implement policies. They provide uniformity of work
quality and worker behavior by describing how the
work will be accomplished. A baseline, on the other
hand, sets the minimum standard for behavior and
work quality.
Which of the following is not a reason why data should be classified?
A. Classification forces valuation which can be used to determine risk.
B. Classification is required to determine appropriate access controls.
C. Classification can be used to optimize security budget.
D. Classification is required to develop secure systems.
D. Classification is required to develop secure systems
Data classification is not a requirement of secure systems. Systems can be made secure without any regard to the sensitivity of the data they will handle. However, system investment can be optimized if the data classification, representing its underlying value, is known. Systems handling low sensitivity information, for instance, can require fewer or less rigorous security controls than one that handles top secret information. Knowledge of data classification, therefore, can optimize budgets on development projects, putting money where it is most needed.
Which of the following is not a factor in determining the sensitivity of data?
A. Who should be accessing the data
B. The value of the data
C. How the data will be used
D. The level of damage that could be caused should the data be exposed
C. How the data will be used
How the data will be used has no bearing on how sensitive it is. In other words, the data is sensitive not matter how it will be used-even if it is not used at all.
What is the chief security responsibility of a data owner?
A. Determine how the data should be preserved
B. Determine the data classification
C. Determine the data value
D. Determine how the data will be used
B. Determine the data classification
Setting the classification for the data drives all other decisions about the data. Determining how the data will be used and who should use it is within the scope of the data owner, but they are functional, rather than security responsibilities. The owner may participate in determining the value of the data, but since its value is a measure relative to all other corporate data assets, it is not usually something the data owner is solely responsible for. Determining how the data will be preserved falls to the role of the data custodian.
Mary has been tasked with preliminary planning for a security program. Which of the following would not be within her task scope?
A. Articulate security mission objectives
B. Determine roles and responsibilities
C. Establish the security audit function
D. Evaluate risks and benefits
C. Establish the security audit function
Establishing an audit function represents an activity that the security program might initiate. But first, the program must be established.
Besides risk management and risk mitigation, what other factor is used to perform effective risk management?
A. Data valuation
B. Threat and vulnerability assessment
C. Uncertainty analysis
D. Probability factors
C. Uncertainty analysis
Uncertainty analysis lends a dose of reality to risk assessment, which is built mainly on speculation. The risk assessment should be tempered by applying a method that estimates management’s confidence level
in the risk analysis finding and the likelihood of the results remaining valid. Tracking the uncertainty factor
can generate historical data that can be used to refine
risk assessment techniques going forward. Data valuation, threat and vulnerability assessment and
their associated probability factors relate to the risk
analysis part of the risk management activity.
Who does the security auditor report to?
A. Data owners
B. Data custodians
C. External audit organization
D. Senior management
D. Senior management
The security auditor is responsible for reporting to senior management about the effectiveness of security controls and their compliance with security policy objectives.
What are three fundamental principles of security?
A. Accountability, confidentiality, and integrity
B. Confidentiality, integrity, and availability
C. Integrity, availability, and accessibility
D. Confidentiality, availability, and accessibility
B. Confidentiality, integrity, and availability
It is known as CIA or AIC, which stands for confidentiality, integrity, and availability. These three
concepts are also referred to as the CIA or AIC Triangle. The acronym has changed from CIA to AIC per (ISC)2 rewording.
Mary finds that she has “write” privileges to data that she should be able to “read only”. What security principle is Mary able to violate?
A. Confidentiality
B. Accessibility
C. Integrity
D. Availability
C. Integrity
Mary is able to change the data, thereby undermining its intended integrity. Since she had read rights, she is not able to violate confidentiality or availability-the other two main principles. Accessibility is not a term used as one of the primary principles, but it is most closely related to the principle of availability.
Business continuity and disaster recovery fall under which category of security control?
A. Preventive
B. Detective
C. Corrective
D. Compensating
D. Compensating
Business continuity and disaster recovery do not contribute directly to organizational security, but they can serve to compensate for security disasters by reducing the time it takes to respond to a security
incident that interrupts business productivity.
What is the value of layering security responsibility?
A. Spreads accountability across the organization
B. Focuses specific responsibilities on the roles best able to accomplish them
C. Ensures separation of duties and encourages oversight
D. All of these choices
D. All of these choices
Security is an organizational problem. To optimally secure data and systems requires attention from roles that include senior management, data owners and custodians, security management and professional, auditors and users. Each role is accountable for a specific part in ensuring that corporate assets remain secure. Spreading responsibility across several roles ensures separation of duties and also ensures that in coordinating these efforts management will implement appropriate oversight to ensure no aspect of security will be overlooked.
John does systems maintenance for his department and is also responsible for performing the operational security audit once a year. What security management
principle is John violating?
A. Operational integrity
B. Collusion
C. Separation of duties
D. Nondisclosure
C. Separation of duties
Since John was responsible for doing the work on the system, John should not also be the person to assess the quality of the work. This represents a violation of the principle of separation of duties. No worker should be allowed to check his own work. Collusion refers to the extra effort that a dishonest person would have to take to accomplish a malicious task because separation of duties was in place. Operational integrity is a term generally applied to operational processes and doesn’t apply to this case.Nondisclosure is a requirement not to share sensitive information with persons not authorized to receive it.
Which of the following are the correct ISO/IEC series mapping that are used as blueprints for organizations to follow when developing their security program:
i. ISO/IEC 27001 - Code of practice providing good practice advice on ISMS (previously known as ISO 17799, itself based on British Standard BS 7799 Part 1
ii. ISO/IEC 27002 - Based on British Standard BS7799 Part 2, which is establishment, implementation, control, and improvement of the Information Security Management System
iii. ISO/IEC 27004 - Designed to assist the satisfactory implementation of information security based on a risk management approach
iv. ISO/IEC 27005 - A standard for information security management measurements
v. ISO/IEC 27006 - A guide to illustrate how to protect personal health information
vi. ISO/IEC 27799 - A guide to the certification/registration process
A. i, ii, iii
B. iv, v
C. All of them
D. None of them
C. All of them???
The correct mappings are listed below:
• ISO/IEC 27001 - Based on British Standard
BS7799 Part 2, which is establishment, implementation,
control, and improvement of the Information Security
Management System
• ISO/IEC 27002 - Code of practice providing good
practice advice on ISMS (previously known as ISO
17799, itself based on British Standard BS 7799 Part 1
• ISO/IEC 27004 - A standard for information
security management measurements
• ISO/IEC 27005 - Designed to assist the
satisfactory implementation of information security
based on a risk management approach
• ISO/IEC 27006 - A guide to the certification/registration process
• ISO/IEC 27799 - A guide to illustrate how to protect personal health information
June is creating a security awareness program to inform the workforce of a change in
security policy. Which stage of the common development process of security policy is
June in?
A. Initial and evaluation
B. Development
C. Publication
D. Implementation
C. Publication
The common development process of creating a security policy includes initial and
evaluation, development, approval, publication,
implementation, and maintenance.
A hacker has embedded a Trojan horse program on corporate machines that will
trigger on April Fools Day, overwhelming the network with spam messages. What
security principle will this circumstance violate?
O Confidentiality
O Integrity
O Availability
O All of these
c. Availability
When the network is overwhelmed, no one
will be able to access desired information. As data will
be unavailable, the principle being violated is
availability.