Week 1 Flashcards

1
Q

What is Information Security Management (ISM)?

A

It defines and manages controls to protect the confidentiality, integrity, and availability (CIA) of assets from threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key standards in the ISO 27000 series?

A

-ISO 27001 (ISMS requirements)
-ISO 27002 (security controls guidance)
-ISO 27005 (incident management).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Information Security Management System (ISMS)?

A

A business risk-based system that manages information security through policies, procedures, and controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three core elements of the CIA triad in ISM?

A

Confidentiality, Integrity, Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define the term “Asset” in information security.

A

Anything valuable to an organization, such as information, infrastructure, or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a threat?

A

A potential cause of an incident that may harm the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a vulnerability?

A

A weakness that can be exploited by a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four risk treatment options?

A

-Eliminate (avoid)
-Reduce (mitigate)
-Transfer
-Accept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are “Authentication” and “Authorization”?

A

-Authentication verifies identity
-Authorization grants permission to access resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of an audit in ISM?

A

To evaluate compliance with security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of ISO 27001?

A

Asset-focused, risk-driven, and process-oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of ISO 27001?

A

To establish, implement, maintain, and improve an ISMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What types of information should be protected under ISO 27001?

A

Printed, electronic, verbal, visual, web-based, and intangible (e.g., expertise).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the process approach in ISO 27001?

A

Security management is a continuous cycle that adapts to emerging threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some sources of security requirements?

A

Business needs, organizational factors, legal/regulatory compliance, stakeholder expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four related ISO standards and their focus?

A

SO 27001: ISMS requirements
ISO 27002: Security controls
ISO 27004: Performance measurement
ISO 27005: Risk management

17
Q

What does ISO 27002 provide?

A

A list of 114 security controls across 14 clauses with implementation guidelines.

18
Q

Give an example of ISO 27002 Clause 9 – Access Control.

A

9.1.1 Access Control Policy: Define/enforce policies;
9.1.2: Restrict access to authorized users.

19
Q

What is ISO 27004 about?

A

Measuring the effectiveness of ISMS through performance indicators like log analysis, incident stats, and audit results.

20
Q

What are key cybersecurity metrics used in ISO 27004?

A

-Unpatched devices, intrusion attempts
-Mean Time to Detect (MTTD)
-Mean Time to Contain (MTTC)
-Days to Patch.

21
Q

What is the focus of ISO 27005?

A

Asset-driven security risk management through preparation, identification, analysis, evaluation, and treatment.

22
Q

Name one criticism of ISO 27001.

A

It’s sometimes used as a checkbox exercise for certification rather than genuine security improvement.