Main Flashcards

(70 cards)

1
Q

What is the primary goal of ISO/IEC 27001?

A

To establish, implement, maintain, and continuously improve an Information Security Management System (ISMS) that protects the confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is ISO/IEC 27001 certifiable?

A

Yes — organizations can be officially certified through accredited audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which three core principles does ISO 27001 protect?

A

Confidentiality, Integrity, and Availability (CIA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of approach does ISO 27001 use to manage information security?

A

A risk-based approach — identifying, assessing, and treating information security risks systematically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main phases of implementing an ISMS?

A

Establish → Implement → Operate → Monitor → Review → Maintain → Improve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does “Annex A” of ISO 27001 provide?

A

A list of security controls (93 in the 2022 version) covering organizational, people, physical, and technological domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which other ISO standard gives detailed guidance on Annex A controls?

A

A: ISO/IEC 27002.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the PDCA model in ISO 27001?

A

Plan-Do-Check-Act — the continual improvement cycle for managing and refining the ISMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What documents are required under ISO 27001?

A

Scope statement, information security policy, risk assessment and treatment plan, Statement of Applicability (SoA), internal audit results, and management review records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who oversees ISO/IEC 27001 globally?

A

The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of ISO/IEC 27002?

A

To provide guidance and best practices for implementing the security controls listed in ISO/IEC 27001’s Annex A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is ISO/IEC 27002 a certifiable standard?

A

No — it’s advisory, meant to support ISO/IEC 27001 implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four control categories in ISO/IEC 27002:2022?

A

Organizational, People, Physical, and Technological.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many controls are included in the 2022 version of ISO/IEC 27002?

A

93 controls, organized into four control themes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are examples of Organizational controls?

A

Information security policies, supplier security, risk management, and project security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are examples of People controls?

A

Background screening, awareness training, and user responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are examples of Technological controls?

A

Access control, cryptography, logging, and malware protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are examples of Physical controls?

A

Securing facilities, equipment protection, and access control to physical areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the relationship between ISO 27002 and NIST SP 800-53?

A

Both provide security control catalogs, but ISO 27002 is global, while NIST SP 800-53 is primarily U.S. federal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is ISO/IEC 27035 about?

A

It defines the framework and process for detecting, reporting, assessing, and responding to information security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does ISO/IEC 27002 help implement ISO 27001?

A

It provides implementation guidance for each control listed in ISO 27001’s Annex A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the key stages of the ISO/IEC 27035 incident lifecycle?

A

Preparation → Detection & Reporting → Assessment → Response → Lessons Learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the goal of incident assessment?

A

To determine whether an event is an actual security incident and assess its impact and urgency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does ISO/IEC 27035 emphasize after resolving incidents?

A

Lessons learned — identifying root causes and improving processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
What is an “information security event”?
An observable occurrence that may indicate a potential security incident.
23
Why is preparation crucial in ISO 27035?
It ensures predefined roles, responsibilities, and communication plans are ready before an incident occurs.
24
How does ISO/IEC 27035 support ISO/IEC 27001?
It provides a framework for fulfilling the incident management control within the ISMS.
25
What is the difference between a security event and a security incident?
An event is an observation, while an incident is a confirmed breach or threat to information security.
25
What tools and techniques support ISO 27035 implementation?
Incident response playbooks, log monitoring systems, and communication protocols.
26
Which NIST publication aligns closely with ISO 27035?
NIST SP 800-61 — Computer Security Incident Handling Guide.
27
How does ISO 27005 define “risk”?
The effect of uncertainty on objectives, typically expressed as a combination of impact and likelihood.
27
What is ISO/IEC 27005 focused on?
Providing a structured approach to information security risk management in support of ISO 27001.
28
What are the key stages of the ISO 27005 risk management process?
Context establishment → Risk assessment → Risk treatment → Risk acceptance → Risk communication → Risk monitoring and review.
29
What does “risk treatment” involve?
Selecting and implementing controls to reduce risks to acceptable levels.
29
What are the components of risk assessment in ISO 27005?
Identification, analysis, and evaluation of risks.
30
How does ISO 27005 relate to ISO 31000?
It aligns with ISO 31000’s general risk management principles but focuses on information security.
31
Which NIST publication parallels ISO 27005?
NIST SP 800-30 — Guide for Conducting Risk Assessments.
32
What is the purpose of a risk register in ISO 27005?
To document and track identified risks, their treatment, and their status over time.
33
What is the main objective of NIST SP 800-30?
To provide a structured methodology for assessing information system risks.
33
What is “residual risk”?
The risk that remains after controls are applied.
34
Why is continual monitoring important in ISO 27005?
Because threats, vulnerabilities, and business objectives evolve, requiring ongoing reassessment.
35
What are the three main steps in NIST SP 800-30?
Prepare → Conduct Assessment → Communicate & Maintain Assessment.
36
What is a “vulnerability”?
A weakness in an information system that can be exploited by a threat.
36
What does “threat” mean in NIST SP 800-30?
Any circumstance or event with the potential to adversely affect operations, assets, or individuals.
37
What is the formula for risk according to NIST SP 800-30?
Risk = Likelihood × Impact.
38
What are the two main outputs of a risk assessment?
Risk register and recommendations for mitigation.
39
How does NIST SP 800-30 relate to the NIST RMF (SP 800-37)?
It provides the risk assessment process used within the RMF.
40
How often should risk assessments be conducted?
Q: How often should risk assessments be conducted? A: Regularly and whenever major changes occur in the system or environment.
41
What are “risk factors” in NIST SP 800-30?
Conditions that affect the likelihood or impact of a threat exploiting a vulnerability.
42
What is the key outcome of NIST SP 800-30?
A prioritized list of risks with appropriate mitigation strategies.
43
What is the purpose of NIST SP 800-53?
To provide a catalog of security and privacy controls for U.S. federal information systems.
44
What framework does NIST SP 800-53 support?
The NIST Risk Management Framework (RMF).
45
What are the main families of controls in NIST SP 800-53?
20 families, including Access Control, Audit and Accountability, Incident Response, and System Protection.
46
How are controls structured in NIST SP 800-53?
Each control includes a control identifier, name, control statement, and supplemental guidance.
47
What is the latest revision of NIST SP 800-53?
Revision 5, which includes integrated privacy controls.
48
What are the three control baselines in SP 800-53?
Low, Moderate, and High, based on system impact level.
49
How does NIST SP 800-53 relate to ISO/IEC 27002?
Both are catalogs of controls; SP 800-53 is U.S. federal, 27002 is international.
50
What new focus area was added in Revision 5?
Supply chain risk management (SCRM).
51
What is the purpose of control tailoring?
To adjust baseline controls to suit specific system requirements and risk levels.
52
How is NIST SP 800-53 implemented in practice?
Through the RMF steps: Categorize, Select, Implement, Assess, Authorize, Monitor.
53
What is Cyber Essentials?
A UK government-backed scheme that provides baseline cybersecurity requirements for organizations.
54
What are its five key technical controls?
Firewalls, Secure Configuration, User Access Control, Malware Protection, and Patch Management.
55
What is the purpose of Cyber Essentials certification?
To demonstrate an organization’s commitment to basic cybersecurity hygiene.
56
What are the two certification levels?
Cyber Essentials (self-assessed) and Cyber Essentials Plus (externally verified).
57
Who manages the Cyber Essentials scheme?
The UK National Cyber Security Centre (NCSC) and IASME Consortium.
58
Is Cyber Essentials mandatory?
It’s voluntary for most, but required for some UK government contracts.
59
What does Cyber Essentials primarily protect against?
Common internet-based threats like phishing, malware, and unauthorized access.
60
How often must certification be renewed?
Annually.
61
How does Cyber Essentials compare to ISO 27001?
Cyber Essentials is simpler and covers basic controls; ISO 27001 is comprehensive and risk-based.
62
Why is Cyber Essentials valuable for small businesses?
It provides a low-cost, practical baseline for improving security and building trust with customers.