Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
User authentication and data encryption represent which category of security controls?
Security policies and awareness training represent which category of security controls?
Non-repudiation can provide proof of data authenticity to third parties. Data authentication can only prove authenticity to intended recipient of data.
Non-repudiation is implemented with digital signatures.
Briefly describe what ISO27001 is about (1 sentence is enough).
ISO27001 = Information Security Management System.
It describes a framework setting up and managing an ISMS, i.e. establishing and operating a security program within an organisation
Briefly describe what ISO27002 is about (1 sentence is enough).
ISO27002 = Code of practice for information security management.
It provides a checklist of security controls that organisations can consider using and implementing.
Select two correct elements
Why the control is critical (specified by 20 CSC).
Effectiveness metrics (specified by 20 CSC).
Which aspect of security governance in PCL is the most fundamental/important?
What is the basis for knowing the effectiveness of a security control?
Which PCL level requires: ”Security culture permeates the organization” ?
Level 5 (Optimizing) is the highest in the COBIT Process Capability Levels.
Risk assessment is the most important aspect of security governance.
Effectiveness metrics are used to determine the effectiveness of controls.
Level 5 (Optimizing) requires: ”Security culture permeates the organization”.
Attacker-Centric threat identification
System-Centric (aka. SW, design or architecture centric) threat identification
Asset-Centric threat identification.
A matrix is used to determine a qualitative level of risk as a function of qualitative levels of likelihood and impact of incident.
EF (Exposure Factor) = 0.2,
ARO (Annualised Rate of
Occurrence) = 0.1.
Give the SLE (Single Loss Expectancy) and the ALE (Annualised Loss Expectancy).
SLE = EUR 200,000
ALE = EUR 20,000
Reduce/mitigate risk (security and mitigation controls)
Share/transfer risk (outsource activity that causes risk, or insure)
Retain risk (understand tolerate potential consequences)
Avoid risk (stop activity that causes risk)
Block size 128 bits.
Key sizes i) 128, ii) 192, iii) 256 bits.
– The design randomness
– The cipher’s key size
– The cipher’s ability to hide statistical patterns in data
– The computation speed
The cipher’s key size
The cipher’s ability to hide statistical patterns in data
– The usage frequency of a key does not influence its cryptoperiod.
– Frequent use of a key requires longer cryptoperiod.
– Frequent use of a key requires shorter cryptoperiod.
Frequent use of a key requires longer cryptoperiod.
– High overhead for changing a key does not influence the cryptoperiod.
– High overhead for changing a key requires longer cryptoperiod.
– High overhead for changing a key requires shorter cryptoperiod.
High overhead for changing a key requires longer cryptoperiod.
– High criticality and sensitivity does not influence the key’s cryptoperiod.
– High criticality and sensitivity requires longer cryptoperiod of the key.
– High criticality and sensitivity requires shorter cryptoperiod of the key.
High criticality and sensitivity of the encrypted messages requires shorter cryptoperiod of the key.
– Fast computation of the encryption algorithm does not influence the key’s cryoptoperiod.
– Fast computation of the encryption algorithm requires longer cryoptoperiod of the key.
– Fast computation of the encryption algorithm requires shorter cryoptoperiod of the key
Fast computation of the encryption algorithm does not influence the key’s
cryoptoperiod.
What is the latest recommended protection period time for a 1024 bit RSA key?
1024 bit RSA key for protection: Not allowed now.
What is the latest recommended processing period time for a 1024 bit RSA key?
1024 bit RSA key for processing: Not allowed now (but legacy use OK).
What is the latest recommended protection period time for a 2048 bit RSA key?
2048 bit RSA key for protection: Until 2030
What is the latest recommended processing period time for a 2048 bit RSA key?
2048 bit RSA key for processing: Until 2030 (only legacy use after that)
What is the latest recommended protection period time for a 3072 bit RSA key?
3072 bit RSA key for protection: After 2030
What is the latest recommended processing period time for a 3072 bit RSA key? (
3072 bit RSA key for processing: After 2030