SPP - Reset Flashcards

1
Q

What should an Information Security Policy cover?

A
  • Cover end-to-end security processes across the organization
  • It should be enforceable, practical, regularly updated in response to business needs and evolving threats, and focused on business goals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three levels of security documentation?

A
  • Policies, Standards, Procedures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policies, Standards, Procedures.

A
  • Policies (high level business rule, the WHAT)
    The what? The purpose?
  • Standards (the HOW?)
    The how, who will implement, who is responsible, who will be affected)
  • Procedures-Technical Controls
    Step by step instruction that people will follow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the 3-2-1 rule for backup entail?

A

3 copies, 2 media/medium, 1 copy off site

This rule ensures data redundancy and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristics of Information Security Policies?

A

Should not be optional, should not refer to specific technical platforms, they act as a contract between the organization and stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Characteristics of Security Standards

A

provide the necessary level of detail to make a security policy practical across the entire organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four types of Information Security?

A
  • Application Security
  • Network Security
  • Cloud Security
  • Cryptography

These types address various dimensions of security needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why do companies need to meet information security standards?

A
  • Prevent Cyber Attacks
  • Increased awareness of risk
  • Enhanced reputation
  • Legal trouble/fines

Compliance with standards helps mitigate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two primary Information Security Standards?

A
  • ISO 27001
  • ISO 27002

These standards provide frameworks for managing information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three principles of Information Security?

A
  • Confidentiality - the information is only available to the intended parties
  • Integrity - the information is complete when accessed and/or transferred
  • Availability - the information is immediately available when requested

These principles ensure proper handling of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Characteristics of Security Procedures

A

The procedure would outline a set of steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are key elements of an Information Security Policy?

A
  • Purpose
  • Audience
  • Information Security Objectives
  • Authority and Access Control Policy
  • Data Classification
  • Security Awareness Training
  • Responsibilities and Duties of Employees
  • Encryption policy
  • Data backup policy
  • References to regulations and compliance standards

These elements guide the implementation of the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are best practices for Information Security Management?

A
  • Acceptable use policy (AUP)
  • Access control policy (ACP)
  • Change management policy
  • Incident response (IR) policy
  • Remote access policy
  • Email/communication policy
  • Disaster recovery policy
  • Business continuity plan (BCP)
  • Data classification policy
  • IT operations and administration policy
  • SaaS and cloud policy
  • Identity and access management (IAM) policy
  • Data security policy
  • Privacy Regulations
  • Personal and mobile devices policy

These practices help organizations manage security effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What situations demonstrate the payoff of strong policies, standards, and procedures?

A
  • You experience a breach
  • You have to discipline/dismiss an employee for inappropriate use of technology
  • Vendors demand evidence of your security program
  • A user accidentally gives their credentials to a hacker
  • An entry-level employee makes a bad choice on a firewall setting

These situations highlight the importance of having robust security measures in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What defines Security Culture?

A

Ideas, customs, and social behaviors of a group that influence its security

A strong security culture enhances employee engagement and responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the benefits of a strong Security Culture?

A
  • Increased compliance with protective measures
  • Reduced risk of security incidents
  • Employees identify and report concerns
  • Greater sense of security among employees
  • Enhanced security without large expenditure

A positive culture leads to proactive security behavior.

17
Q

What are the seven dimensions of Security Culture?

A
  • Attitudes
  • Behaviors
  • Cognition
  • Communication
  • Compliance
  • Norms
  • Responsibilities

These dimensions encompass the various aspects that shape an organization’s security culture.

18
Q

What is the general purpose of an information security policy?

A

Establish a general approach to information security

An information security policy serves as a foundational document that guides an organization’s security efforts.

19
Q

What should an information security policy document?

A

Security measures and user access control policies

This documentation is essential for ensuring that all users understand their responsibilities regarding information security.

20
Q

What is a key aim of an information security policy in relation to compromised information assets?

A

Detect and minimize the impact of compromised information assets

Compromised assets include misuse of data, networks, mobile devices, computers, and applications.

21
Q

How does an information security policy protect an organization?

A

Protect the reputation of the organization

A strong security policy helps maintain trust with stakeholders and customers.

22
Q

What legal and regulatory requirements should an information security policy comply with?

A

Legal and regulatory requirements like NIST

Compliance with standards such as NIST ensures that the organization meets industry benchmarks for security.

23
Q

What type of consumer data should an information security policy aim to protect?

A

Consumer’s data, such as credit card numbers

Protecting sensitive consumer information is crucial for maintaining customer trust and legal compliance.

24
Q

What mechanisms should an information security policy provide?

A

Effective mechanisms to respond to complaints and queries related to cyber security risks

This includes addressing concerns about phishing, malware, and ransomware.

25
Q

Fill in the blank: An information security policy should limit access to key information technology assets to those who have an _______.

A

acceptable use

This principle ensures that only authorized users can access sensitive information.

26
Q
  • Cover end-to-end security processes across the organization
  • It should be enforceable, practical, regularly updated in response to business needs and evolving threats, and focused on business goals.
A

Information Security Policy

27
Q
  • Policies, Standards, Procedures.
A

Three levels of security documentation

28
Q

3 copies, 2 media/medium, 1 copy off site

This rule ensures data redundancy and security.

A

3-2-1 rule for backup

29
Q

Should not be optional, should not refer to specific technical platforms, they act as a contract between the organization and stakeholders

A

Characteristics of Information Security Policies

30
Q

provide the necessary level of detail to make a security policy practical across the entire organization

A

Characteristics of Security Standards

31
Q
  • Application Security
  • Network Security
  • Cloud Security
  • Cryptography

These types address various dimensions of security needs.

A

Four types of Information Security

32
Q
  • ISO 27001
  • ISO 27002

These standards provide frameworks for managing information security.

A

Two primary Information Security Standards

33
Q
  • Confidentiality - the information is only available to the intended parties
  • Integrity - the information is complete when accessed and/or transferred
  • Availability - the information is immediately available when requested

These principles ensure proper handling of information.

A

Three principles of Information Security

34
Q

The procedure would outline a set of steps

A

Characteristics of Security Procedures

35
Q
  • Purpose
  • Audience
  • Information Security Objectives
  • Authority and Access Control Policy
  • Data Classification
  • Security Awareness Training
  • Responsibilities and Duties of Employees
  • Encryption policy
  • Data backup policy
  • References to regulations and compliance standards

These elements guide the implementation of the policy.

A

Key elements of an Information Security Policy

36
Q
  • Acceptable use policy (AUP)
  • Access control policy (ACP)
  • Change management policy
  • Incident response (IR) policy
  • Remote access policy
  • Email/communication policy
  • Disaster recovery policy
  • Business continuity plan (BCP)
  • Data classification policy
  • IT operations and administration policy
  • SaaS and cloud policy
  • Identity and access management (IAM) policy
  • Data security policy
  • Privacy Regulations
  • Personal and mobile devices policy

These practices help organizations manage security effectively.

A

Best practices for Information Security Management

37
Q

Ideas, customs, and social behaviors of a group that influence its security

A strong security culture enhances employee engagement and responsibility.

A

Security Culture

38
Q
  • Increased compliance with protective measures
  • Reduced risk of security incidents
  • Employees identify and report concerns
  • Greater sense of security among employees
  • Enhanced security without large expenditure

A positive culture leads to proactive security behavior.

A

Benefits of a strong Security Culture

39
Q
  • Attitudes
  • Behaviors
  • Cognition
  • Communication
  • Compliance
  • Norms
  • Responsibilities

These dimensions encompass the various aspects that shape an organization’s security culture.

A

Seven dimensions of Security Culture