Chapter 5 - Developing the Security Program Flashcards

(31 cards)

1
Q

Information Security Program

A

The entire set of activities, resources, personnel, and technologies used by an organization to manage the rsisks to its information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which variable is most influential in how an organization chooses to structure its InfoSec program?

A

Organizational culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are all the variables that determine how an organization structures its InfoSec program?

A

Organizational culture, size, security, personnel budget, and security capital budget.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is InfoSec security in large organizations different from small organizations?

A

InfoSec departments in large organizations tend to be divided among groups, whereas there are fewer groups (or just one) in smaller organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the functions performed within the InfoSec department as customer service to the organization and its external partners?

A

Risk assessment; Systems testing; Incident response planning; Disaster recovery planning; Performance measurement; Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the functions performed within the InfoSec department as compliance enforcement?

A

Policy; Compliance/audit; Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to Kosutic, what are the three options for placing the CISO and their security group in an organization?

A

1 - In a separate group reporting directly to the CEO/President (most common in large organizations); 2 - Under a divisionor department with no conflict of interest (most common in mid-to-large organizations); 3 - As an additional duty for an existing manager or executive (most common in smaller organizations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the most critical components of an InfoSec program?

A

Personnel and their expectations, roles, responsibilities, and credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Chief Information Officer (CIO)

A

Typically considered the top information technology officer in an organization. The CIO is usually an executive-level position, and frequently the person in this role reports to the CEO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Chief Information Security Officer (CISO)

A

Typically considered the top information security officer in an organization. The CISO is usually not an executive-level position, and frequently the person in this role reports to the CIO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Chief Security Officer (CSO)

A

In some organizations, an alternative title for the CISO; in others, the title is most commonly assigned to the most senior manager or executive responsible for both information and physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Administrator

A

A hybrid position comprising the responsibilities of both a security technician and a security manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Analyst

A

A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the development of a security system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Manager

A

In larger organizations, a manager responsible for some aspect of information security who reports to the CISO; in smaller organizations, this title may be assigned to the only or senior security administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security technician

A

A technical specialist responsible for the implementation and administration of some security-related technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security watchstander

A

An entry-level InfoSec responsible for the routine monitoring and operation of a particular InfoSec technology. Also known as a security staffer.

17
Q

What are the most common paths to an InfoSec career?

A

Military, Law Enforcement, IT, and InfoSec college graduates

18
Q

Security Awareness

A

The portion of the SETA program dedicated to keeping users conscious of key InfoSec issues through the use of newsletters, posters, trinkets, and other methods.

19
Q

Security Education

A

The portion of the SETA program based on formal delivery of knowledge of InfoSec issues and operations, usually through institutions of higher learning

20
Q

Security Education, Training, and Awareness (SETA)

A

A managerial program designed to improve the security of information assets by providing targeted knowledge, skills, and guidance for organizational employees.

21
Q

Security Training

A

The portion of the SETA program focused on providing users with the knowledge, skill, and/or ability to use their assigned resources wisely to avoid creating additional risk to organizational information assets.

22
Q

What are the three ways that SETA seeks to enhance security?

A

1 - By building in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and their information assets; 2 - By developing skills and knowledge so that computer users can perform their jobs while using information assets more securely; 3 - By improving awareness of the need for and methods to protect information assets.

23
Q

What issues must an InfoSec educational program address?

A

1 - The InfoSec educational components required of all InfoSec professionals; 2 - The general education requirements that all IT professionals must have; 3 - General foundational knowledge that all business professionals must understand.

24
Q

Project Management

A

The process of identifying and controlling the resources applied to a project as well as measuring progress and adjusting the process as progress is made toward the goal.

25
Scope Creep
The expansion of the quantity or quality of project deliverables from the original project plan.
26
What are the project management knowledge areas?
Communications, Cost, HR, Integration, Procurement, Quality, Risk, Scope, Stakeholder, and Time.
27
Critical Path Method (CPM)
A diagramming technique, similar to PERT, designed to identify the sequence of tasks that make up the shortest elapsed time needed to complete a project.
28
Gantt Chart
A diagramming technique named for its developer, Henry Gantt, which lists activities on the vertical axis of a bar chart and provides a simple timeline on the horizontal axis.
29
Program Evaluation and Review Technique (PERT)
A diagramming technique developed in the late 1950s that involves specifying activities and their sequence and duration.
30
Projectitis
A situation in project planning in which the project manager spends more time documenting project tasks, collecting performing measurements, recording project task information, and updating project completion forecasts in the project management software than accomplishing meaningful project work.
31
Work Breakdown Structure (WBS)
A list of the tasks to be accomplished in the project; the WBS provides details for the work to be accomplished, the skill sets or even specific individuals to perform the tasks, the start and end dates for the task, the estimated resources required, and the dependencies between and among tasks.