Lecture 4 Flashcards

(20 cards)

1
Q

What is the overarching mission of ISO/IEC JTC 1, and how does it facilitate ICT standardization globally?

A

ISO/IEC JTC 1 develops and integrates global ICT standards by bringing experts together to create interoperable frameworks across diverse technologies, supporting both business and consumer applications through a unified standardization environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why was Subcommittee 27 (SC27) formed, and what is its core scope?

A

SC27, established in 1989, focuses on developing standards for information security, cybersecurity, and privacy protection, encompassing methods, techniques, and guidelines to protect information and ICT assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does ISO/IEC 27001 differ from other standards in the 27000 family?

A

ISO/IEC 27001 specifies the requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS), while other 27000-series standards provide guidance, implementation details, or supporting controls (e.g., 27002).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain how Annex A in ISO/IEC 27001:2013 supports risk treatment within the ISMS.

A

Annex A provides a reference list of control objectives and controls that organizations can select from to treat identified risks, forming the basis for the Statement of Applicability (SoA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the key structural changes in the 2022 update of ISO/IEC 27002, and why are they significant?

A

The 2022 revision reduced 114 controls to 93, reorganized them into four clauses (organizational, people, physical, and technological), and added 11 new controls. This modernized structure aligns with emerging technologies and simplifies control integration across frameworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define “risk” as per ISO/IEC 27000:2012 and discuss its implications for ISMS design.

A

Risk is “the effect of uncertainty on objectives,” encompassing both likelihood and consequence. ISMS design must embed risk-based thinking into planning, operations, and continual improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the definition of a “management system” under Annex SL shape ISO/IEC 27001’s structure?

A

It provides a harmonized high-level structure ensuring consistency across ISO standards, integrating policies, objectives, and processes that interrelate to achieve defined organizational outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What contextual elements must an organization assess under Clause 4 of ISO/IEC 27001?

A

Organizations must consider internal and external factors, identify interested parties and their expectations, and define ISMS scope considering dependencies and interfaces—all within a framework of continual improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is board-level engagement emphasized under Clause 5 (Leadership)?

A

Effective ISMS implementation requires top management commitment to integrate information security governance within corporate governance, allocate resources, and establish accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the dual nature of “planning” under Clause 6 in ISO/IEC 27001.

A

Planning involves both identifying risks and opportunities and establishing measurable information security objectives, aligning them with business goals through risk-based and strategic planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is “selling security” compared to marketing under Clause 7 (Support)?

A

Information security professionals must communicate effectively and foster awareness across stakeholders—much like marketing teams—to gain organizational buy-in and cultural integration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discuss why risk assessment is described as the “fundamental discipline” of information security management.

A

It drives all control decisions, resource prioritization, and risk treatment actions; without sound risk assessment, ISMS becomes reactive rather than proactive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How should risk treatment decisions under Clause 8 balance acceptance, avoidance, and mitigation?

A

Organizations should apply a risk appetite-based approach—some risks may be accepted if within tolerance, while others are mitigated or transferred using appropriate controls aligned with the SoA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What role do KPIs and KRIs play in Clause 9 (Performance Evaluation)?

A

They measure ISMS effectiveness and risk exposure, providing quantifiable assurance that controls are operating as intended, although defining meaningful metrics remains a significant challenge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the connection between the “three lines of defence” model and ISO/IEC 27001 performance evaluation.

A

It clarifies accountability: first-line operations own controls, the second line monitors compliance, and the third line (internal audit) independently evaluates ISMS performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does Clause 10 (Improvement) ensure ISMS resilience?

A

By mandating corrective actions for nonconformities, root cause analysis, and continuous exercises/testing, Clause 10 embeds learning and adaptive resilience into the ISMS lifecycle.

17
Q

How does ISO/IEC 27001 enable alignment with frameworks like NIST CSF or CIS Controls?

A

Through its risk-based and control-oriented structure, ISO 27001 can map to and integrate with other frameworks, allowing organizations to harmonize compliance and operational security objectives.

18
Q

What are the implications of ISO/IEC 27001’s “Statement of Applicability” for audit readiness?

A

The SoA demonstrates due diligence in risk treatment and control selection; auditors use it to verify that chosen controls are appropriate, justified, and implemented effectively.

19
Q

How can organizations operationalize the dynamic nature of context in Clause 4.1?

A

By implementing regular environmental scanning, stakeholder analysis, and updating ISMS scope and risk assessments to reflect evolving internal and external factors.

20
Q

Why is continual improvement not merely a final step but an embedded principle in ISO/IEC 27001?

A

Because information security threats, technologies, and business objectives evolve continuously—an ISMS must adapt iteratively through feedback loops, monitoring, and proactive enhancement.