Security Policies 5.1 Flashcards

1
Q

High Level Strategy for Security Policies

A
  • Very broad policies
  • Focuses mostly on Data Storage Requirements and Security Event Procedures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Detailed Security Goals

A
  • These policies are focused on more smaller details
  • Ex., Appropriate WiFi usage or requirements for remote access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Primary Focus of Security Policies

A
  • Answers the “What” and “Why”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Security Policies

A
  • A master list of all the policies to maintain the up time and security of a network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Policy

A
  • Can be mandated
  • Detail security procedures.
  • List out the roles and responsibilities involved with security.
  • It is up to organization to enforce these policies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Acceptable Use Policy (AUP)

A
  • Outlines what the organization considers to be appropriate use of its resources.
  • Can protect the organization from any legal liability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Business Continuity Plan (BCP)

A
  • Represents the planning and advanced policy decisions to ensure the con
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Challenge of a BCP

A
  • There must be planning done before the particular issue occurs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disaster Recovery Plan (DRP)

A
  • Defines the data, resources, and steps necessary required to restore critical organizational processes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Disasters

A
  • Natural disasters, such as weather
  • Technology or system failures
  • Human created disasters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Comprehensive Plan for DRP

A
  • Recovery location
  • Data recovery method
  • Application restoration
  • IT team and employee availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of Security Incidents to Consider

A
  • Malware
  • DDoS attacks
  • Theft of confidential information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Incident Response Team

A
  • A specialized group with knowledge in how to address the various incidents.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incident Response Roles - IT Security Management

A
  • Corporate support
  • Obtains the right people and resources to address the incident
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incident Response Roles - Compliance Officer

A
  • Intricate knowledge of compliance rules
  • Makes sure that all the data and systems are compliant with the required mandates.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Incident Response Roles - User Community

A
  • Standard individuals using the system
  • They can see everything that occurred during the security event.
17
Q

Incident Response Roles - Technical Staff

A
  • The ones directly addressing the incident
18
Q

National Institute of Standards and Technology (NIST SP800-61)

A
  • Provides recommended strategies on how to handle security incidents.
  • Informs government and other organizations
19
Q

NIST Incident Response LifeCycle

A
  • Preparation
  • Detection and analysis
  • Containment, eradication, and recovery
  • Post-incident activity
20
Q

Software Development LifeCycle (SDLC)

A
  • Processes and procedures employed to develop software
21
Q

Goal of SDLC

A
  • Move from the idea phase to development of an application
22
Q

Ways to Get From Idea to App

A
  • Customer requirements
  • Keep the process on schedule
  • Stay on budget
23
Q

Waterfall Lifecycle

A
  • A linear lifecycle
  • Designed to be a faster way of developing applications
24
Q

Agile Lifecycle

A
  • A longer and slower paced lifecycle