Security Management - Standards Flashcards
What is Risk Management about?
1) Risk identification(easy)
2) Risk assessment (easy)
3) Risk treatment (hard)
4) Risk mitigation plan
5) Implementation
6) Review and evaluation
What is ISMS?
Information Security Management System
What is ISMS about?
It is a systematic approach to managing sensitive company information so that it remains secure that Includes people, processes, documents, and IT systems by applying a risk management process.
What is ISO 27002:2013?
Guidelines for organizational information security standards and management practices.
Name a few groups of ISO 27002:2013
1) Information security policies
2) Organization of information security
3) Human resource security
4) Asset management
5) Access control
6) Cryptography
7) Physical and environmental security
8) Operations security
9) Communications security
10) Systems acquisition, development and maintenance
11) Supplier relationships
12) Information security incident management
13) Information security aspects of business continuity management
14) Compliance
Name some of the elementary threats listed in the BSI base protection
- Fire, water, local events/catastrophes
- Loss of service by supplier (e.g. power, connectivity)
- Electromagnetic emanation, wiretapping, espionage
- Theft, destruction, loss of devices
What should be considered if a employee joins/leaves the organization?
1) Background checks (prediction of future behaviour based on past)
2) Access management (configuration of access rights matching to current tasks/position)
How can you prevent that adversaries access facilities, resources or information stored on physical media?
1) restrict access to buildings, rooms, equipment(guards, locks, escorts, surveillance)
2) Restriction of movement of equipment, storage media(locks, trackers)
What is CVE?
CVE Common Vulnerabilities and Exposures
This is a list of identifiers and descriptions for discovered vulnerabilities
Decribe the process of a CVE entry assignment.
- ) Discovery of potential vulnerability or exposure
2) Assignment of CVE ID by numbering authority
- Description
- References
3) Posting of CVE entry t o list by primary numbering authority