Security Risk and Management Flashcards
What are the three pillars of Information Security? (Information Security Triad)
Confidentiality, Integrity and Availability (C.I.A)
Can you define Confidentiality?
Property that information is not made available or disclosed to unauthorised individuals, entities or processes.
Can you define Integrity?
Property of accuracy and completeness.
Can you define Availability?
Property of being accessible and usable upon demand by an authorised entity.
What is an ISMS?
Information Security Management System
What does PDCA stand for?
Plan, Do, Check, Act.
What does IAAA stand for?
Identification, Authentication, Authorisation (Permissions) Auditing.
Define due care.
The care that are reasonable person would use in order to approach a problem or a concern. Under any given certain circumstances, what are the actions I would engage in, in order to deal with the concern of a problem.
List five qualities a Control Framework must be?
- Consistent - In approach and application.
- Measurable - To determine progress and set goals.
- Standardised - Results can be compared within & between organisations.
- Comprehensive - Should cover minimum requirements and be extensible.
- Modular - Allow changes to be easily incorporated.
List five qualities a Control Framework must be?
- Consistent - In approach and application.
- Measurable - To determine progress and set goals.
- Standardised - Results can be compared within & between organisations.
- Comprehensive - Should cover minimum requirements and be extensible.
- Modular - Allow changes to be easily incorporated.
Name an example of an ISMS?
ISO270001
What does an ISMS consist of?
Policies, Procedures, Guidelines, and Associated Resources and Activities, in the pursuit of protecting its assets.
What are missing words?
An ISMS is a systematic approach for establishing, _________, __________, ___________, ____________, __________ and ___________ an organisation’s information security to achieve business objectives.
implementing, operating, monitoring, reviewing, maintaining and improving
Explain the difference between “due care” and “due diligence’.
Due Care
- Conduct that a reasonable and prudent person will exercise in a particular situation.
Due Dilidence
- Similar to due care but usually pre-emptive
- The processes undertaken to ensure that a course of action is prudent and within risk appetite before committing to the action
- Will lead to due care being observed
Give some exmaples of due diligence?
- Background checks for employees
- Credit checks of business partners
- Information system security assessments
- Risk assessments of physical security systems
- Penetration tests
- Contingency testing of backup systems
- Checking the availability of company IP on the internet
What does GRC stand for?
Governance, Risk Management and Compliance.
What is COBIT and who is the entity that maintains it?
COBIT is a governance framework managed by ISACA.
Risk Management is the systematic process used to identify, ________, _________, remedy and _________ risk.
analyse, evaluate, monitor
As a result of risk management, what options does the organisation have to deal with risk?
The result of the risk management processes that an organisation will either mitigate, transfer, accept or avoid a particular risk.
Define a computer crime?
The use of a computer to take or alter data, or to gain unlawful use of computers or services.
- The threat can be from internal or external sources
Examples include:
- Sale of IP or personal information
- Malware or Ransomware
- Fraud
- Hacking - attacking CIA of systems
Provide a definition of a ‘patent’?
A patent is a legally enforceable right to exclude others from practising the invention for some length of time - usually 20 years.
- Must make the invention public during the patent process.
Provide a definition of a ‘trademark’?
A trademark is a recognisable sign, design or expression which identifies products or services.
What is copyright?
A copyright covers the expression of ideas rather than the ideas themselves and usually protects artistic property such as writing, recordings, databases and computer programs.
- Usually protected for life of the author, plus 50-100 years.
What is a trade secret?
A trade secret usually refers to the proprietary business or technical information, processes, designs, practices, etc., that are confidential and critical to the business.
- The Coca-Cola formula
Does copyright grant the creator territorial or international copyright?
Territorial
Briefly, explain the Wassenaar Arrangement?
The Wassenaar Arrangement was established to contribute to regional and international security and stability by transparency and greater responsibility in transfers of conventional arms and dual-use goods and technologies.
What are the risks to Trans-Border Data Flow? List a few.
- Personally identifiable information such as ID cards, driving license, enhanced passport, etc., leave data trails that may create risks in countries unless there is adequate data protection.
- There are major concerns about the security and misuse of information which has been transferred to countries whose laws do not offer the same level of data protection.
- Rapidly increasing trans-border data flows are creating new and complex challenges for security professionals and organisations responsible for overseeing privacy and data protection laws.
- Technologies and applications (search engines, RFID, VoIP, etc) generate huge amounts of data and create data trails that can survive long after the transaction or conversation has taken place.
Which of the following describes an “incident”?
a. A breach for which it was confirmed that data was actually disclosed to an unauthorised party.
b. A security event that compromises the integrity, confidentiality, or availability of an information asset.
c. An incident that results in the disclosure or potential exposure of data.
Answer: b
A security event that compromises the integrity, confidentiality, or availability of an information asset.
Which of the following describes a “breach”?
a. A breach for which it was confirmed that data was actually disclosed to an unauthorised party.
b. A security event that compromises the integrity, confidentiality, or availability of an information asset.
c. An incident that results in the disclosure or potential exposure of data.
Answer: c
An incident that results in the disclosure or potential exposure of data.
Which of the following describes “data disclosure”?
a. A breach for which it was confirmed that data was actually disclosed to an unauthorised party.
b. A security event that compromises the integrity, confidentiality, or availability of an information asset.
c. An incident that results in the disclosure or potential exposure of data.
Answer: a
A breach for which it was confirmed that data was actually disclosed to an unauthorised party.
Can you list any of the four Code of Ethics Canons?
- Protect society, the common good, necessary public trust and confidence and the Infrastructure.
- Act honourably, honestly, justly, responsibly and legally.
- Provide diligent and compentent service to principals.
- Advance and protect the profession.
Which of the four Code of Ethics Canons does the following description best fit?
“Tell the truth; make all stakeholders aware of your actions on a timely basis. Observe all contracts and agreements, expressed or implied.”
Answer: Act honourably, honestly, justly, responsibly and legally.