Chapter 6 - IT Security Policy Frameworks Flashcards

(25 cards)

1
Q

An information security program charter defines four elements:

A

1 - The program’s purpose and mission

2 - The program’s scope within the organization

3 - Assignment of responsibilities for program implementation

4 - Compliance management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three industry-standard policy frameworks that stand out because of their scope and wide acceptance within the security community are:

A

1 - COBIT

2 - ISO/IEC 27000 series

3 - NIST Special Publications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the first step in establishing an information security program?

A - Adoption of an information security policy framework or charter

B - Development and implementation of an information security standards manual

C - Development of a security awareness training program for employees

D - Purchase of security access control software

A

A - Adoption of an information security policy framework or charter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________ are best defined as high-level statements, beliefs, goals, and objectives.

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between risk appetite and risk tolerance?

A - Risk tolerance measures impact and likelihood, whereas risk appetite measures variance from a target goal.

B - Risk appetite measures impact and likelihood, whereas risk tolerance measures variance from a target goal.

C - There is no difference between the two.

A

B - Risk appetite measures impact and likelihood, whereas risk tolerance measures variance from a target goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________________ indicates how specific the policy is regarding resources or rules.

A

Granularity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________________are formal documents that establish:

Uniform criteria that you can evaluate and measure

Methods to accomplish a goal

Repeatable processes and practices for compliance with policies

A

Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An ________________ standard focuses on an area of current relevance and concern to your company.

A

issue-specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The six basic components for issue-specific or baseline standards are:

A

1 - Statement of an issue

2 - Statement of the organization’s position

3 - Statement of applicability

4 - Definition of roles and responsibilities

5 - Compliance

6 - Points of contact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ______________ standard, or ____________ standard, is focused on the secure configuration of a specific system, device, operating system, or application.

A

system-specific, baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _____________ is a written instruction on how to comply with a standard.

A

procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Procedures should be:

A

Clear and unambiguous
Repeatable
Up to date
Tested
Documented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TF: A single standard often requires multiple procedures to support it.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A _______________ is typically one that has not been used for an extended period of time.

A

dormant account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______________ are generally not mandatory—failing to follow them explicitly does not lead to compliance issues. Rather, they assist people in developing procedures or processes with best practices that other people have found useful.

A

Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ___________ establishes and maintains security and risk management programs for information resources

-CISO

-Information resources manager

-Information resources security officer

17
Q

The ____________________ maintains policies and procedures that provide for security and risk management of information resources

-CISO

-Information resources manager

-Information resources security officer

A

Information resources manager

18
Q

The _________________ directs policies and procedures designed to protect information resources, identifies vulnerabilities, and develops security awareness program

-CISO

-Information resources manager

-Information resources security officer

A

Information resources security officer

19
Q

_________________ are responsible for carrying out the program that uses the resources. This does not imply personal ownership. These individuals may be regarded as program managers or delegates for the owner.

A

Owners of information resources

20
Q

_______________ provide technical facilities, data processing, and other support services to owners and users of information resources.

A

Custodians of information resources

21
Q

______________ provide technical support for security of information resources.

A

Technical managers (network and system administrators)

22
Q

________________ conduct periodic risk-based reviews to ensure the effectiveness of information resources security policies and procedures.

A

Internal auditors

23
Q

_______________ are typically in areas such as compliance and operational risk. they ensure that security policies result in operational compliance with risk appetite and regulatory requirements.

A

Control partners

24
Q

_______________ have access to information resources in accordance with the owner-defined controls and access rules

25
To meet information assurance needs, your framework should include policies for the following 5 items:
1 - Automation of security controls, where possible 2 - Implementation of appropriate accounting and other integrity controls 3 - Controls that handle potential conditions that appear when a system is operating 4 - Development of systems that detect and thwart attempts to perform unauthorized activity 5 - Assurance of a level of uptimne of all systems