Security Management - Standards Flashcards
What is Risk Managament about?
- Risk identification(easy)
- Risk assessment (easy)
- Risk treatment (hard)
- Risk mitigationplan
- Implementation
- Review and evaluation
What is ISMS?
Information Security Management System
What is ISMS about?
- systematic approach to managing sensitive company information so that it remains secure
- Includes people, processes, documents, and IT systems by applying a risk management process
what is ISO 27002:2013?
Guidelines for organisational information security standards and management practices
Name a few groups of ISO 27002:2013
Information security policies
- Organisation of information security
- Human resource security
- Asset management
- Access control
- Cryptography
- Physical and environmental security
- Operations security
- Communications security
- Systems acquisition, development and maintenance
- Supplier relationships
- Information security incident management
- Information security aspects of business continuity management
- Compliance
Name some of the elementary threats listed in the BSI base protection
- Fire, water, local events/catastrophes
- Loss of service by supplier (e.g. power, connectivity)
- Electromagnetic emanation, wiretapping, espionage
- Theft, destruction, loss of devices
what should be considered if a employee joins/leaves the organisation
- Background checks (prediction of future behaviour based on past)
- Access management (configuration of access rights matching to current tasks/position)
How can you prevent that adversaries access facilities, resources or information stored on physical media?
- restrict access to buildings, rooms, equipment(guards, locks, escorts, surveillance)
- Restriction of movement of equipment, storage media(locks, trackers)
What is CVE?
CVE Common Vulnerabilities and Exposures
list of identifiers and descriptions for discovered vulnerabilities
decribe the process of a CVE entry assignment
- Discovery of potential vulnerability or exposure
- Assignmentof CVE ID by numberingauthority
- Description
- References - Posting of CVE entryto list by primary numbering authority