Sybex Book Flashcards
Know the three objectives of cybersecurity
Confidentiality ensures that unauthorized individuals are not able to gain access to sensitive information. Integrity ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally. Availability ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.
Describe how information security strategies should be aligned with organizational goals and objectives.
As information security managers develop their plans, they should use reliable techniques to assess the current state of the program, such as threat research, SWOT analysis, and gap analysis. They may then identify the initiatives that will move the organization from the current state to its desired state.
Explain how security strategies are influenced by internal and external factors
Security strategies must be aligned with the business, but they must also incorporate other influences. Information security managers must remain abreast of emerging technologies, social media, the business environment, the organization’s risk tolerance, regulatory requirements, third-party considerations, and the threat landscape as they develop, monitor, and revise cybersecurity strategies.
Know why stakeholder commitment and communication are essential to success
As information security leaders roll out new strategies, they must ensure that they have the support of senior leaders and other stakeholders. They may do this by clearly outlining how information security supports the organization’s broader goals and objectives, identifying the business impact of security initiatives, and identifying clear success criteria.
Explain how security controls may be categorized based on their mechanism of action and their intent.
Controls are grouped into the categories of managerial, operational, and technical based on the way that they achieve their objectives. They are divided into the types of preventive, detective, corrective, deterrent, compensating, and physical based on their intended purpose.
Describe the diverse impacts of data breaches on organizations
When an organization suffers a data breach, the resulting data loss often results in both direct and indirect damages. The organization suffers immediate financial repercussions due to the costs associated with the incident response, as well as long-term financial consequences due to reputational damage. This reputational damage may be difficult to quantify, but it may also have a lasting impact. In some cases, organizations may suffer operational damage if they experience availability damages, preventing them from accessing their own information.
Explain why data must be protected in transit, at rest, and in use.
. Attackers may attempt to eavesdrop on network transmissions containing sensitive information. This information is highly vulnerable when in transit unless protected by encryption technology. Attackers also might attempt to breach data stores, stealing data at rest. Encryption serves to protect stored data as well as data in transit. Data is also vulnerable while in use on a system and should be protected during data processing activities.
Know how data loss prevention (DLP) systems block data exfiltration attempts.
DLP technology enforces information handling policies to prevent data loss and theft. DLP systems may function at the host level, using software agents to search systems for the presence of sensitive information. They may also work at the network level, watching for transmissions of unencrypted sensitive information. DLP systems detect sensitive information using pattern-matching technology and/or digital watermarking.
Explain how data minimization reduces risk by reducing the amount of sensitive information that we maintain.
In cases where we cannot simply discard unnecessary information, we can protect information through de-identification and data obfuscation. The tools used to achieve these goals include hashing, tokenization, and masking of sensitive fields.
Matt is updating the organization’s threat assessment process. What category of control is Matt implementing?
- Operational
- Technical
- Corrective
- Managerial
D. Managerial controls are procedural mechanisms that focus on the mechanics of the risk management process. Threat assessment is an example of one of these activities.
Jade’s organization recently suffered a security breach that affected stored credit card data. Jade’s primary concern is the fact that the organization is subject to sanctions for violating the provisions of the Payment Card Industry Data Security Standard. What category of risk is concerning Jade?
- Strategic
- Compliance
- Operational
- Financial
B. The breach of credit card information may cause many different impacts on the organization, including compliance, operational, and financial risks. However, in this scenario, Jade’s primary concern is violating PCI DSS, making the concern a compliance risk.
Chris is responding to a security incident that compromised one of his organization’s web servers. He believes that the attackers defaced one or more pages on the website. What cybersecurity objective did this attack violate?
- Confidentiality
- Nonrepudiation
- Integrity
- Availability
C. The defacement of a website alters content without authorization and is, therefore, a violation of the integrity objective. The attackers may also have breached the confidentiality or availability of the website, but the scenario does not provide us with enough information to draw those conclusions.
Which one of the following elements is most important to gaining the support of senior leaders for cybersecurity initiatives?
- Using plain, understandable language
- Communicating often and in the format desired by the leaders
- Demonstrating the alignment between business objectives and security needs
- Adopting emerging technologies
C. The most important consideration when gaining stakeholder support for security initiatives is demonstrating the alignment between a request and the objectives of the business. While managers should certainly use plain language and communicate in the format desired by leaders, these are secondary considerations. Adopting emerging technologies is not necessary to underscore the importance of security initiatives.
Tonya is concerned about the risk that an attacker will attempt to gain access to her organization’s database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement?
- Preventive
- Detective
- Corrective
- Deterrent
D. Deterrent controls are designed to prevent an attacker from attempting to violate security policies in the first place. Preventive controls would attempt to block an attack that was about to take place. Corrective controls would remediate the issues that arose during an attack.
Which one of the following individuals bears ultimate responsibility for protecting an organization’s data?
- Data steward
- End users
- Data custodian
- Data owner
D. All individuals within an organization have some responsibility for protecting data. However, the data owner is the senior-most leader who bears ultimate responsibility for this protection. The data owner may delegate some authority and/or responsibility to data stewards, data custodians, and end users, but they still bear ultimate responsibility.
Brooke is conducting a SWOT analysis for her organization’s cybersecurity program. She recently learned about a cybersecurity insurance offering that may allow the organization to transfer some financial risk and is considering purchasing a policy. Where would this offering fit in the SWOT analysis?
- Strength
- Weakness
- Opportunity
- Threat
C. The availability of this cybersecurity insurance offering is an external factor that the organization might exploit to better achieve its objectives and, therefore, should be classified as an opportunity. Strengths and weaknesses are internal characteristics of the organization. Threats are external factors that pose a risk to the organization.
Tina is tuning her organization’s intrusion prevention system to prevent false positive alerts. What type of control is Tina implementing?
- Technical control
- Physical control
- Managerial control
- Operational control
A. Technical controls enforce confidentiality, integrity, and availability in the digital space. Examples of technical security controls include firewall rules, access control lists, intrusion prevention systems, and encryption.
Dan is the CISO of an organization and he is spearheading the development of a new security operations center (SOC). He bears responsibility for the success of this initiative. In the RACI matrix entry for this initiative, how would Dan best be labeled?
- R
- A
- C
- I
B. As the ultimate stakeholder for the initiative, Dan is the accountable individual and should be labeled with an “A” in the RACI matrix. Others who are directly contributing to the effort would be labeled as responsible (“R”). Stakeholders who are not directly working on the SOC implementation would be labeled as either consulted (“C”) or informed (“I”), as appropriate.
Tony is reviewing the status of his organization’s defenses against a breach of their file server. He believes that a compromise of the file server could reveal information that would prevent the company from continuing to do business. What term best describes the risk that Tony is considering?
- Strategic
- Reputational
- Financial
- Operational
A. The risk that Tony is contemplating could fit any one of these categories. However, his primary concern is that the company may no longer be able to do business if the risk materializes. This is a strategic risk.
Which one of the following data elements is not commonly associated with identity theft?
- Social Security number
- Driver’s license number
- Frequent flyer number
- Passport number
C. Although it is possible that a frequent flyer account number, or any other account number for that matter, could be used in identity theft, it is far more likely that identity thieves would use core identity documents. These include driver’s licenses, passports, and Social Security numbers.
What term best describes an organization’s desired security state?
- Control objectives
- Security priorities
- Strategic goals
- Best practices
A. As an organization analyzes its risk environment, technical and business leaders determine the level of protection required to preserve the confidentiality, integrity, and availability of their information and systems. They express these requirements by writing the control objectives that the organization wishes to achieve. These control objectives are statements of a desired security state.
Jerry is developing a cybersecurity awareness program for members of his team who have administrative access to sensitive systems. What category best describes the users he is targeting?
- Privileged users
- High-risk users
- End users
- Data owners
A. It may be true that these individuals fit into more than one, or even all, of these categories. However, the key element in the question is that the users have administrative access to systems. Therefore, they are best described as privileged users.
Which one of the following individuals is the least appropriate direct manager of a chief information security officer?
- Chief information officer
- Chief risk officer
- Chief executive officer
- Senior director for identity and access management
D. The CISO should report to a senior-level decision-maker in the organization and not to the leader of another technology function. Therefore, the senior D director for identity and access management is an inappropriate reporting structure. The CIO, CRO, and CEO would all be appropriate supervisors for a CISO.
Greg recently conducted an assessment of his organization’s security controls and discovered a potential gap: the organization does not use full-disk encryption on laptops. What type of control gap exists in this case?
- Detective
- Corrective
- Deterrent
- Preventive
D. The use of full-disk encryption is intended to prevent a security incident from occurring if a device is lost or stolen. Therefore, this is a preventive control gap.
Toni is developing a new goal for her information security program. She has currently written it as “We will acquire and implement a new intrusion prevention system that will reduce successful network intrusions by 50%.” What element of the SMART framework is lacking from this goal?
- Specific
- Measurable
- Achievable
- Relevant
- Time-bound
E. This goal is specific in that it describes the implementation of an IPS. It is also measurable since it states a clear objective of reducing intrusions by 50 percent. We do not have enough information about the organization to determine whether it is achievable or relevant. It is definitely not time-bound because it contains no deadline. Toni could remedy this situation by adding a deliverable date to the goal.
Nolan is writing an after-action report on a security breach that took place in his organization. The attackers stole thousands of customer records from the organization’s database. What cybersecurity principle was most impacted in this breach?
- Availability
- Nonrepudiation
- Confidentiality
- Integrity
C. The disclosure of sensitive information to unauthorized individuals is a violation of the principle of confidentiality.
Which one of the following objectives is not one of the three main objectives that information security professionals must achieve to protect their organizations against cybersecurity threats?
- Integrity
- Nonrepudiation
- Availability
- Confidentiality
B. The three primary objectives of cybersecurity professionals are confidentiality, integrity, and availability.
What is the most appropriate span of control for a cybersecurity leader?
- 2
- 4
- 7
- 12
C. The span of control is the number of employees who directly report to a manager. Most organizations consider 5–10 employees to be an appropriate span of control.
Brian is conducting a maturity assessment of his organization’s cybersecurity team using Capability Maturity Model Integration (CMMI). He notes that the team does use defined processes but that they develop them in a reactive manner for each project they undertake. What level of maturity would best describe this team?
- Defined
- Repeatable
- Initial
- Quantitatively managed
- Managed
E. This is an example of a Managed organization: one that begins to implement organized processes on a per-project basis but is still operating in reactive mode. At the Initial level, the organization has unpredictable processes that are poorly controlled. When an organization achieves Level 3: Defined, it has standard processes that are used organization-wide and are adapted for use within each project. Level 4: Quantitatively Managed organizations build measurement and controls on top of their processes to allow them to quickly identify and remediate deficiencies and address control gaps before issues arise. At the top tier of the CMMI, Level 5: Optimizing organizations use a continuous process improvement approach to adjust and fine-tune the way that they work to achieve peak efficiency and effectiveness.
Governance programs guide and direct security efforts
Information security governance efforts should integrate with other corporate governance programs to support both the business’s goals and its security strategy. Organizations should draw on existing governance frameworks, such as COBIT and the ISO standards, to avoid redundant effort and to align with industry best practices.
Policy frameworks consist of policies, standards, procedures, and guidelines.
Policies are high-level statements of management intent for the information security program. Standards describe the detailed implementation requirements for policies. Procedures offer step-by-step instructions for carrying out security activities. Compliance with policies, standards, and procedures is mandatory. Guidelines offer optional advice that complements other elements of the policy framework.
Organizations often adopt a set of security policies covering different areas of their security programs.
Common policies used in security programs include an information security policy, an acceptable use policy, a data ownership policy, a data retention policy, an account management policy, and a password policy. The specific policies adopted by any organization will depend on that organization’s culture and business needs.
Policy documents should include exception processes.
Exception processes should outline the information required to receive an exception to security policy and the approval authority for each exception. The process should also describe the requirements for compensating controls that mitigate risks associated with approved security policy exceptions.
Organizations face a variety of security compliance requirements.
Merchants and credit card service providers must comply with the Payment Card Industry Data Security Standard (PCI DSS). Organizations handling the personal information of European Union residents must comply with the EU General Data Protection Regulation (GDPR). All organizations should be familiar with the national, territory, and state laws that affect their operations.
Standards frameworks provide an outline for structuring and evaluating cybersecurity programs.
Organizations may choose to base their security programs on a framework, such as the NIST Cybersecurity Framework (CSF) or International Organization for Standardization (ISO) standards. U.S. federal government agencies and contractors should also be familiar with the NIST Risk Management Framework (RMF). These frameworks sometimes include maturity models that allow an organization to assess its progress. Some frameworks also offer certification programs that provide independent assessments of an organization’s progress toward adopting a framework.
Audits and assessments monitor compliance with requirements.
Audits are externally commissioned, formal reviews of the capability of an organization to achieve its control objectives. Assessments are less rigorous reviews of security issues, often performed or commissioned by IT staff. Organizations providing services to other entities may wish to conduct a service organization controls (SOC) audit under SSAE 18.
Joe is authoring a document that explains to system administrators one way in which they might comply with the organization’s requirement to encrypt all laptops. What type of document is Joe writing?
- Policy
- Guideline
- Procedure
- Standard
B. The key term in this scenario is “one way.” This indicates that compliance with the document is not mandatory, so Joe must be authoring a guideline. Policies, standards, and procedures are all mandatory.
Victor is designing an information security governance program for his organization. Which one of the following statements about governance programs is not correct?
- Governance programs should clearly distinguish between governance and management activities.
- Governance programs should be created once and developed in a manner that does not require future changes.
- Security governance programs should be aligned with corporate governance programs.
- Governance programs should cover the enterprise end-to-end.
B. Governance programs should be flexible and dynamic, rather than static. They should adapt to changes in the environment, as needed. They should be tailored to the enterprise’s needs and cover the enterprise end-to-end. They should clearly distinguish between governance and management activities.
What law creates privacy obligations for those who handle the personal information of European Union residents?
- HIPAA
- FERPA
- GDPR
- PCI DSS
C. The General Data Protection Regulation (GDPR) implements privacy requirements for handling the personal information of EU residents. The Health Insurance Portability and Accountability Act (HIPAA) includes security and privacy rules that affect health-care providers, health insurers, and health information clearinghouses. The Family Educational Rights and Privacy Act (FERPA) applies to educational institutions. The Payment Card Industry Data Security Standard (PCI DSS) applies to credit and debit card information.
Which one of the following is not one of the five core security functions defined by the NIST Cybersecurity Framework?
- Identify
- Contain
- Respond
- Recover
B. The five security functions described in the NIST Cybersecurity Framework are identify, protect, detect, respond, and recover.
What ISO standard provides guidance on privacy controls?
- 27002
- 27001
- 27701
- 31000
C. The International Organization for Standardization (ISO) publishes ISO 27701, covering privacy controls. ISO 27001 and 27002 cover cybersecurity, and ISO 31000 covers risk management.
Which one of the following documents must normally be approved by the CEO or a similarly high-level executive?
- Standard
- Procedure
- Guideline
- Policy
D. Policies require approval from the highest level of management, usually the CEO. Other documents may often be approved by other managers, such as the CISO.
Greg would like to create an umbrella agreement that provides the security terms and conditions for all future work that his organization does with a vendor. What type of agreement should Greg use?
- BPA
- MOU
- MSA
- SLA
C. Master service agreements (MSAs) provide an umbrella contract for the work that a vendor does with an organization over an extended period of time. The MSA typically includes detailed security and privacy requirements. Each time the organization enters into a new project with the vendor, they may then create a statement of work (SOW) that contains project-specific details and references the MSA.
What organization is known for creating independent security benchmarks covering hardware and software platforms from many different vendors?
- Microsoft
- Center for Internet Security
- Cloud Security Alliance
- Cisco
B. All of these organizations produce security standards and benchmarks. However, only the Center for Internet Security (CIS) is known for producing independent benchmarks covering a wide variety of software and hardware.
In a publicly traded corporation, who is directly responsible for hiring and firing the chief executive officer?
- Senior executive team
- Shareholders
- Board of directors
- Chief financial officer
C. In the corporate governance model for publicly traded organizations, the shareholders who own the corporation delegate control of the corporation to the elected members of the board of directors. The board is then responsible for selecting the CEO, reviewing the CEO’s performance, and terminating the CEO when necessary.
Which one of the following would not normally be found in an organization’s information security policy?
- Statement of the importance of cybersecurity
- Requirement to use AES-256 encryption
- Delegation of authority
- Designation of responsible executive
B. Security policies do not normally contain prescriptive technical guidance, such as a requirement to use a specific encryption algorithm. This type of detail would normally be found in a security standard.
Darren is working with an independent auditor to produce an audit report that he will share with his customers under NDA to demonstrate that he has appropriate security controls in place. The auditor will not be assessing the effectiveness of those controls. What type of audit report should Darren expect?
- SOC 2 Type 1
- SOC 2 Type 2
- SOC 3 Type 1
- SOC 3 Type 2
A. The fact that the auditor will not be assessing the effectiveness of the controls means that this is a Type 1 report, not a Type 2 report. The fact that it will be shared only under NDA means that it is an SOC 2 assessment.
Danielle is developing a business case to support a proposed investment in her organization’s vulnerability management program. Which of the following components would she not normally include in the business case?
- Cost analysis
- Implementation plan
- Rollback plan
- Strategic context
C. The common elements of a business case include a scope statement, a strategic context, a cost analysis, an evaluation of alternatives, a project plan, and a management plan. Organizations may develop rollback plans for high-risk changes, but those rollback plans are not a standard component of the business case.
What compliance obligation applies to merchants and service providers who work with credit card information?
- FERPA
- SOX
- HIPAA
- PCI DSS
D. The Payment Card Industry Data Security Standard (PCI DSS) provides detailed rules about the storage, processing, and transmission of credit and debit card information. PCI DSS is not a law but rather a contractual obligation that applies to credit card merchants and service providers.
Gwen is developing a new security policy for her organization. Which one of the following statements does not reflect best practices for policy development?
- All stakeholders should agree with the proposed policy.
- The policy should follow normal corporate policy approval processes.
- Policies should match the “tone at the top” from senior business leaders.
- Cybersecurity managers are typically responsible for communicating and implementing approved security policies.
A. Policies should be developed in a manner that obtains input from all relevant stakeholders, but it is not necessary to obtain agreement or approval from all stakeholders. Policies should follow normal corporate policy approval processes and should be written in a manner that fits within the organizational culture and “tone at the top.” Once an information security policy is approved, it commonly falls to the information security manager to communicate and implement the policy.
Kevin is developing the business case for a new information security incident response program. Which one of the following statements is true about the costs associated with this initiative?
- The business case does not need to address costs, since this is done within the budgeting process.
- The business case should only include the one-time costs that are associated with implementing the new initiative.
- The business case should only include the new recurring costs that are created by the initiative.
- The business case should include both one-time and recurring costs associated with the initiative.
D. A complete business case should include all relevant financial and human resources costs for an initiative, including both one-time and recurring costs
Which individual in an organization bears ultimate accountability to the board of directors for achieving the organization’s strategic plan?
- CISO
- CIO
- CFO
- CEO
D. The chief executive officer (CEO) bears ultimate responsibility for the efficiency and effectiveness of the organization in all respects. The chief information officer (CIO), chief information security officer (CISO), and chief financial officer (CFO) are all accountable to the CEO or other senior leader for the areas under their span of control.
The board of directors of Kate’s company recently hired an independent firm to review the state of the organization’s security controls and certify those results to the board. What term best describes this engagement?
- Assessment
- Control review
- Gap analysis
- Audit
D. Any of these terms could reasonably be used to describe this engagement. However, the term audit best describes this effort because of the formal nature of the review and the fact that it was requested by the board.
Which one of the following is not an objective domain in the COBIT framework?
- Secure, Protect, and Defend (SPD)
- Evaluate, Direct, and Monitor (EDM)
- Align, Plan, and Organize (APO)
- Deliver, Service, and Support (DSS)
A. The five COBIT domains are:
Evaluate, Direct, and Monitor (EDM)
Align, Plan, and Organize (APO)
Build, Acquire, and Implement (BAI)
Deliver, Service, and Support (DSS)
Monitor, Evaluate, and Assess (MEA)
Which one of the following is not a common use of the NIST Cybersecurity Framework?
- Describe the current cybersecurity posture of an organization.
- Describe the target future cybersecurity posture of an organization.
- Communicate with stakeholders about cybersecurity risk.
- Create specific technology requirements for an organization.
D. The NIST Cybersecurity Framework is designed to help organizations describe their current cybersecurity posture, describe their target state for cybersecurity, identify and prioritize opportunities for improvement, assess progress, and communicate with stakeholders about risk. It does not create specific technology requirements.
Which one of the following items is not normally included in a request for an exception to security policy?
- Description of a compensating control
- Description of the risks associated with the exception
- Proposed revision to the security policy
- Business justification for the exception
C. Requests for an exception to a security policy would not normally include a proposed revision to the policy. Exceptions are documented variances from the policy because of specific technical and/or business requirements. They do not alter the original policy, which remains in force for systems not covered by the exception.
List the COBIT Principles
Evaluate, Direct, and Monitor (EDM)
Align, Plan, and Organize (APO)
Build, Acquire, and Implement (BAI)
Deliver, Service, and Support (DSS)
Monitor, Evaluate, and Assess (MEA)
COBIT
Evaluate, Direct, and Monitor (EDM)
Evaluate, Direct, and Monitor (EDM) objectives provide for effective IT governance and the selection and monitoring of strategic goals.
COBIT
Align, Plan, and Organize (APO).
Align, Plan, and Organize (APO) objectives describe how the IT function should be organized and how it should structure its work.
COBIT
Build, Acquire, and Implement (BAI)
Build, Acquire, and Implement (BAI) objectives describe how the IT organization should create and acquire new information systems and integrate them into the business.
COBIT
Deliver, Service, and Support (DSS)
Deliver, Service, and Support (DSS) objectives describe how the organization should manage the operational tasks of information technology.
COBIT
Monitor, Evaluate, and Assess (MEA)
Monitor, Evaluate, and Assess (MEA) objectives describe how the organization should measure its effectiveness against performance targets, control objectives, and any external requirements it faces.
What are the NIST five objectives
Describe their current cybersecurity posture.
Describe their target state for cybersecurity.
Identify and prioritize opportunities for improvement within the context of a continuous and repeatable process.
Assess progress toward the target state.
Communicate among internal and external stakeholders about cybersecurity risk.
NIST Cybersecurity Framework implementation tiers
Tier 1
NIST Cybersecurity Framework implementation tiers
Tier 2
NIST Cybersecurity Framework implementation tiers
Tier 3
NIST Cybersecurity Framework implementation tiers
Tier 4
ISO Standards
ISO 27001
ISO 27001 is a standard titled “Information technology—Security techniques—Information security management systems—Requirements.”
ISO Standards
ISO 27002
ISO 27002 goes beyond control objectives and describes the actual controls that an organization may implement to meet cybersecurity objectives.
ISO Standards
ISO 27004
ISO 27004 helps organizations implement a consistent process for the monitoring, measurement, analysis, and evaluation of its information security management function.
ISO Standards
ISO 27701
ISO 27701 contains standard guidance for managing privacy controls.
ISO Standards
ISO 31000
ISO 31000 provides guidelines for risk management programs.
Describ the Following
SOC 1 engagements
SOC 2 engagements
SOC 3 engagements
Type 1 reports
Type 2 reports
SOC 1 engagements assess the organization’s controls that might impact the accuracy of financial reporting.
SOC 2 engagements assess the organization’s controls that affect the security (confidentiality, integrity, and availability) and privacy of information stored in a system. SOC 2 audit results are confidential and are normally only shared outside the organization under an NDA.
SOC 3 engagements also assess the organization’s controls that affect the security (confidentiality, integrity, and availability) and privacy of information stored in a system. However, SOC 3 audit results are intended for public disclosure.
Type 1 reports provide the auditor’s opinion on the description provided by management and the suitability of the design of the controls as of a specific date.
Type 2 reports go further and also provide the auditor’s opinion on the operating effectiveness of the controls—that is, the auditor actually confirms that the controls are functioning properly over a period of time.
SOC 1 engagements
SOC 1 engagements assess the organization’s controls that might impact the accuracy of financial reporting.
SOC 2 engagements
SOC 2 engagements assess the organization’s controls that affect the security (confidentiality, integrity, and availability) and privacy of information stored in a system. SOC 2 audit results are confidential and are normally only shared outside the organization under an NDA.
SOC 3 engagements
SOC 3 engagements also assess the organization’s controls that affect the security (confidentiality, integrity, and availability) and privacy of information stored in a system. However, SOC 3 audit results are intended for public disclosure.
SOC Type 1 reports
Type 1 reports provide the auditor’s opinion on the description provided by management and the suitability of the design of the controls as of a specific date.
SOC Type 2 reports
Type 2 reports go further and also provide the auditor’s opinion on the operating effectiveness of the controls—that is, the auditor actually confirms that the controls are functioning properly over a period of time.
What are the SMART Framwork Characteristics
The goal is specific. It describes clearly what the organization intends to achieve.
The goal is measurable. It includes clear criteria by which the organization can measure success.
The goal is achievable. The organization can realistically achieve the goal within the specified time period.
The goal is relevant. If achieved, the goal will advance the organization’s strategic objectives.
The goal is time-bound. It includes a specific deadline for achievement.
What are the levls of Capability Maturity Model Integration (CMMI)
Level 1: Initial
Level 2: Managed
Level 3: Defined
Level 4: Quantitatively Managed
Level 5: Optimizing
Capability Maturity Model Integration (CMMI)
Level 1
Level 1: Initial, the organization has unpredictable processes that are poorly controlled. This level is characterized by reactive management and a “firefighting” approach.
Capability Maturity Model Integration (CMMI)
Level 2
Level 2: Managed, it begins to implement organized processes on a per-project basis but is still operating in reactive mode.
Capability Maturity Model Integration (CMMI)
Level 3
Level 3: Defined, the organization has standard processes that are used organization wide and are adapted for use within each project. This level marks a shift from reactive to proactive management.
Capability Maturity Model Integration (CMMI)
Level 4
Level 4: Quantitatively Managed organizations build measurement and controls on top of their processes to allow them to quickly identify and remediate deficiencies and address control gaps before issues arise.
Capability Maturity Model Integration (CMMI)
Level 5
Level 5: Optimizing organizations use a continuous process improvement approach to adjust and fine-tune the way that they work to achieve peak efficiency and effectiveness.
What are all the RACI matrix roles
Responsible (R) roles are those who actually carry out the work involved. There must be at least one role assigned as responsible for each responsibility, although there may be more than one.
Accountable (A) roles bear ultimate and final responsibility for achieving the objective. Consider this the “buck stops here” role for the responsibility. Each responsibility in the matrix must have one, and only one, accountable role.
Consulted (C) roles are those who provide input that affects the responsibility because of their subject matter expertise.
Informed (I) roles are those who are provided with regular updates on the status of the effort. They may need this information to complete their work, oversee the organization, or perform other tasks, but the key characteristic is that, unlike consulted roles, informed roles receive updates but do not provide input.
Know how risk identification and assessment helps organizations prioritize cybersecurity efforts.
Cybersecurity analysts try to identify all of the risks facing their organization and then conduct a business impact analysis to assess the potential degree of risk based on the probability that it will occur and the magnitude of the potential effect on the organization. This work allows security professionals to prioritize risks and communicate risk factors to others in the organization.
Know that vendors are a source of external risk.
Organizations should conduct their own systems assessments as part of their risk assessment practices, but they should conduct supply chain assessments as well. Performing vendor due diligence reduces the likelihood that a previously unidentified risk at a vendor will negatively impact the organization. Hardware source authenticity techniques verify that hardware was not tampered with after leaving the vendor’s premises.
Be familiar with the risk management strategies that organizations may adopt.
Risk avoidance strategies change business practices to eliminate a risk. Risk mitigation techniques reduce the probability or magnitude of a risk. Risk transference approaches move some of the risk to a third party. Risk acceptance acknowledges the risk and continues normal business operations despite the presence of the risk.
Understand how disaster recovery planning builds resiliency.
Disaster recovery plans activate when an organization experiences a natural or human-made disaster that disrupts normal operations. The disaster recovery plan helps the organization quickly recover its information and systems and resume normal operations.
Be familiar with the privacy controls that protect personal information.
Organizations handling sensitive personal information should develop privacy programs that protect that information from misuse and unauthorized disclosure. The plan should cover personally identifiable information (PII), protected health information (PHI), financial information, and other records maintained by the organization that might impact personal privacy.
Jen identified a missing patch on a Windows server that might allow an attacker to gain remote control of the system. After consulting with her manager, she applied thepatch. From a risk management perspective, what has she done?
- Removed the threat
- Reduced the threat
- Removed the vulnerability
- Reduced the vulnerability
C. By applying the patch, Jen has removed the vulnerability from her server. This also has the effect of eliminating this particular risk. Jen cannot control the external threat of an attacker attempting to gain access to her server.
You notice a high number of SQL injection attacks against a web application run by your organization, so you install a web application firewall to block many of these attacks before they reach the server. How have you altered the severity of this risk?
- Reduced the magnitude
- Eliminated the vulnerability
- Reduced the probability
- Eliminated the threat
C. Installing a web application firewall reduces the probability that an attack will reach the web server. Vulnerabilities may still exist in the web application, and the threat of an external attack is unchanged. The impact of a successful SQL injection attack is also unchanged by a web application firewall.
Aziz is responsible for the administration of an e-commerce website that generates $100,000 per day in revenue for his firm. The website uses a database that contains sensitive information about the firm’s customers. Aziz is assessing the risk of a denial-of-service attack against the database where the attacker would destroy the data contained within the database. He expects that it would cost approximately $500,000 to reconstruct the database from existing records. After consulting threat intelligence, he believes that there is a 5 percent chance of a successful attack in any given year.
What is the asset value (AV)?
- $5,000
- $100,000
- $500,000
- $600,000
C. The asset at risk in this case is the customer database. Losing control of the database would result in a $500,000 fine, so the asset value (AV) is $500,000.
Aziz is responsible for the administration of an e-commerce website that generates $100,000 per day in revenue for his firm. The website uses a database that contains sensitive information about the firm’s customers. Aziz is assessing the risk of a denial-of-service attack against the database where the attacker would destroy the data contained within the database. He expects that it would cost approximately $500,000 to reconstruct the database from existing records. After consulting threat intelligence, he believes that there is a 5 percent chance of a successful attack in any given year.
What is the exposure factor (EF)?
- 5%
- 20%
- 50%
- 100%
D. The attack would result in the total loss of customer data stored in the database, making the exposure factor (EF) 100 percent.
Aziz is responsible for the administration of an e-commerce website that generates $100,000 per day in revenue for his firm. The website uses a database that contains sensitive information about the firm’s customers. Aziz is assessing the risk of a denial-of-service attack against the database where the attacker would destroy the data contained within the database. He expects that it would cost approximately $500,000 to reconstruct the database from existing records. After consulting threat intelligence, he believes that there is a 5 percent chance of a successful attack in any given year.
What is the single loss expectancy (SLE)?
- $5,000
- $100,000
- $500,000
- $600,000
C. We compute the single loss expectancy (SLE) by multiplying the asset value (AV) ($500,000) and the exposure factor (EF) (100%) to get an SLE of $500,000.
Aziz is responsible for the administration of an e-commerce website that generates $100,000 per day in revenue for his firm. The website uses a database that contains sensitive information about the firm’s customers. Aziz is assessing the risk of a denial-of-service attack against the database where the attacker would destroy the data contained within the database. He expects that it would cost approximately $500,000 to reconstruct the database from existing records. After consulting threat intelligence, he believes that there is a 5 percent chance of a successful attack in any given year.
What is the annualized rate of occurrence (ARO)?
- 0.05
- 0.20
- 2.00
- 5.00
A. Aziz’s threat intelligence research determined that the threat has a 5 percent likelihood of occurrence each year. This is an ARO of 0.05.
Aziz is responsible for the administration of an e-commerce website that generates $100,000 per day in revenue for his firm. The website uses a database that contains sensitive information about the firm’s customers. Aziz is assessing the risk of a denial-of-service attack against the database where the attacker would destroy the data contained within the database. He expects that it would cost approximately $500,000 to reconstruct the database from existing records. After consulting threat intelligence, he believes that there is a 5 percent chance of a successful attack in any given year.
What is the annualized loss expectancy (ALE)?
- $5,000
- $25,000
- $100,000
- $500,000
B. We compute the annualized loss expectancy (ALE) by multiplying the SLE ($500,000) and the ARO (0.05) to get an ALE of $25,000.
Grace recently completed a risk assessment of her organization’s exposure to data breaches and determined that there is a high level of risk related to the loss of sensitive personal information. She is considering a variety of approaches to managing this risk.
Grace’s first idea is to add a web application firewall to protect her organization against SQL injection attacks. What risk management strategy does this approach adopt?
- Risk acceptance
- Risk avoidance
- Risk mitigation
- Risk transference
C. Installing new controls or upgrading existing controls is an effort to reduce the probability or magnitude of a risk. This is an example of a risk mitigation activity.
Grace recently completed a risk assessment of her organization’s exposure to data breaches and determined that there is a high level of risk related to the loss of sensitive personal information. She is considering a variety of approaches to managing this risk.
Grace is considering dropping the customer activities that collect and store sensitive personal information. What risk management strategy would Grace’s approach use?
- Risk acceptance
- Risk avoidance
- Risk mitigation
- Risk transference
B. Changing business processes or activities to eliminate a risk is an example of risk avoidance.
Grace recently completed a risk assessment of her organization’s exposure to data breaches and determined that there is a high level of risk related to the loss of sensitive personal information. She is considering a variety of approaches to managing this risk.
Grace’s company decided to install the web application firewall and continue doing business. They are still worried about other risks to the information that were not addressed by the firewall and are considering purchasing an insurance policy to cover those risks. What strategy does this use?
- Risk acceptance
- Risk avoidance
- Risk mitigation
- Risk transference
D. Insurance policies use a risk transference strategy by shifting some or all of the financial risk from the organization to an insurance company.
Grace recently completed a risk assessment of her organization’s exposure to data breaches and determined that there is a high level of risk related to the loss of sensitive personal information. She is considering a variety of approaches to managing this risk.
In the end, Grace found that the insurance policy was too expensive and opted not to purchase it. She is taking no additional action. What risk management strategy is Grace using in this situation?
- Risk acceptance
- Risk avoidance
- Risk mitigation
- Risk transference
A. When an organization decides to take no further action to address the remaining risk, they are choosing a strategy of risk acceptance.
Under the European Union’s GDPR, what term is assigned to the individual who leads an organization’s privacy efforts?
- Data protection officer
- Data controller
- Data steward
- Data processor
A. Under the General Data Protection Regulation (GDPR), the data protection officer (DPO) is an individual who is assigned the direct responsibility for carrying out an organization’s privacy program.
Helen’s organization maintains medical records on behalf of its customers, who are individual physicians. What term best describes the role of Helen’s organization?
- Data processor
- Data controller
- Data owner
- Data steward
A. In this case, the physicians maintain the data ownership role. They have chosen to outsource data processing to Helen’s organization, making that organization a data processor.
Gene recently conducted an assessment and determined that his organization can be without its main transaction database for a maximum of two hours before unacceptable damage occurs to the business. What metric has Gene identified?
- MTBF
- MTTR
- RTO
- RPO
C. The recovery time objective (RTO) is the amount of time that the organization can tolerate a system being down before it is repaired. That is the metric that Gene has identified in this scenario.
Tina works for a hospital system and manages the system’s patient records. What category of personal information best describes the information that is likely to be found in those records?
- PCI
- PHI
- PFI
- PII
B. This is a tricky question as it is possible to find all of these categories of information in patient records. However, they are most likely to contain protected health information (PHI). PHI could also be described as a subcategory of personally identifiable information (PII), but PHI is a better description. It is also possible that the records might contain payment card information (PCI) or personal financial information (PFI), but that is less likely than PHI.
Asa believes that her organization is taking data collected from customers for technical support and using it for marketing without their permission. What principle is most likely being violated?
- Data minimization
- Data retention
- Purpose limitation
- Data sovereignty
C. Organizations should only use data for the purposes disclosed during the collection of that data. In this case, the organization collected data for technical support purposes and is now using it for marketing purposes. That violates the principle of purpose limitation.
Which one of the following U.S. government classification levels requires the highest degree of security control?
- Secret
- Confidential
- Top Secret
- Unclassified
C. Top Secret is the highest level of classification under the U.S. system and, therefore, requires the highest level of security control.
Which of the following data protection techniques is reversible when conducted properly?
- Tokenization
- Masking
- Hashing
- Shredding
A. Tokenization techniques use a lookup table and are designed to be reversible. Masking and hashing techniques replace the data with values that can’t be reversed back to the original data if performed properly. Shredding, when conducted properly, physically destroys data so that it may not be recovered.
What term is given to an individual or organization who determines the reasons for processing personal information?
- Data steward
- Data controller
- Data processor
- Data custodian
B. Data controllers are the entities who determine the reasons for processing personal information and direct the methods of processing that data. This term is used primarily in European law, and it serves as a substitute for the term data owner to avoid a presumption that anyone who collects data has an ownership interest in that data.
Brian recently conducted a risk mitigation exercise and has determined the level of risk that remains after implementing a series of controls. What term best describes this risk?
- Inherent risk
- Control risk
- Risk appetite
- Residual risk
D. The residual risk is the risk that remains after an organization implements controls designed to mitigate, avoid, and/or transfer the inherent risk.