___________ is a framework for validating internal controls and managing enterprise risks.
COSO
_____________ is heavily focused on financial operations and risk management.
COSO
____________ is a framework and supporting tool set that align business and control requirements with technical issues.
COBIT
______________ is an international governance and controls framework and a widely accepted standard for assessing, governing, and managing IT security and risks.
COBIT
_____________ has produced a vast array of standards supporting a number of different industries and business models.
ISO
The ____________ standards related to information security and IT risk are widely accepted as the leading international standards.
ISO
_____________ is a widely accepted international framework and set of best practices for delivering IT services. It contains a comprehensive list of concepts, practices, and processes for managing IT services.
ITIL
The Federal Information Security Management Act (FISMA) requires federal agencies to follow a common set of security standards. These standards are provided by _________ and are known as the ______________.
NIST
Federal Information Processing Standards (FIPS)
____________ was first developed in 2008 by the SANS Institute, now managed by the Center for Internet Security.
CIS Critical Security Controls for Effective Cyber Defense
The ______________ is a security framework for any organization that accepts, stores, or processes credit cards.
Payment Card Industry Data Security Standard (PCI DSS)
TF: Organizations often combine multiple security policy frameworks to draw upon each of their strengths.
True
The frameworks mentioned in the chapter share three characteristics:
1 - They are risk-based
2 - They speak to the organization’s risk appetite
3 - They deal with operation disruption and losses.
The ______________ domain provides the business view and context for a risk evaluation. This ensures that risk activity aligns with the business goals, objectives, and tolerances. This includes aligning to business strategy. This domain ensures that the full range of opportunities and consequences is considered.
Risk Governance
The ______________ domain ensures that technology risks are identified and presented to leadership in business terms. Formal risks are analyzed, and processes are created to assess impact. This domain also creates a risk repository of all known risks. This further enhances the risk analysis and reporting.
Risk Evaluation
The ______________ domain ensures risks are reduced and remediated in the most cost-effective manner. This domain coordinates risk responses so that the right people are engaged at the right time. This prevents risks from increasing in magnitude. Processes are established to manage risk throughout the enterprise to an acceptable level.
Risk Response
______________ oversight approves the controls and approach by which risk is to be managed.
Governance
___________ oversight executes within the rules set by the governance body.
Management
The _________________ role is the single point of contact responsible for data quality within the enterprise. This person deals with all aspects of information. This person establishes guidance on data handling and works closely with the business to understand how information drives profitability. A business person, as opposed to a technologist, typically fills this role.
head of information management
_____________ are the individuals responsible for ensuring data quality within the business unit. They are the owners of the data. They approve access. They work closely with information management to ensure the business gets maximum value from the data. They define the business requirements for data and create descriptions of what the data is and how it will be used.
Data stewards
_______________ are individuals in IT responsible for maintaining the quality of data. These individuals make decisions on how the data is to be handled given the requirements from the data steward. Whereas the data steward’s primary role is to design and plan, the _______________ primary role is implementation.
Data custodians
_______________ are responsible for executing the policies and procedures such as backup, versioning, uploading, downloading, and database administration.
Data administrators
___________________ have a highly restricted role. They grant access rights and assess threats to the information assurance (IA) program.
Data security administrators
The ______________ helps set priorities, removes roadblocks, secures funding, and acts as a source of authority. The ______________ members are leaders across the organization. This combination ensures buy-in from the business for the information security program.
executive committee, security committee
The ________________ provides important information on the risk appetite of the organization.
operational risk committee