Security Management Systems Flashcards

(24 cards)

1
Q

What does CIA stand for?

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Policies should be:

5 things

A

Unambiguous
Short as possible
Cover the majority of cases
Come with a process of dealing with exceptions
Do not contain lengthy background material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Procedures should be:

4 things

A

Step by step descriptions of what needs to be done
Always accurate and up to date
Immediately flagged for review if they do not work
Minimise opportunity for people to make decisions which may be inconsistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the results of procedures recorded in?

A

Quality records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do internal audits do?

A

Check that procedures are being followed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do external audits do?

A

Issue certificates to say the quality system is built for purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an asset register?

A

A register of all the information assets in the business. Everything an attacker might want to control, destroy or compromise, that might stop working, that you might want to apply a control to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you build an asset register?

A

Start with systems and databases and then expand downwards. Then do “what you can see”, buildings, people, cabling, etc and expand upwards. Then iterate on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a threat?

A

Something that an attacker might try and do to an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a threat source?

A

A person or organisation that desires to breach security and will ultimately benefit from said breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a threat actor?

A

A threat actor is the person that causes the attack, whether intentional or accidental.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a threat level?

A

A value attributed to the combination of the capability and the motivation of a threat source or threat actor to attack an asset. It takes into account any security clearances the threat actor might have and if they are deterrable in any way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a compromise method?

A

The broad type of attack by which a threat actor may attempt to compromise the CIA of an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a risk assessment?

A

The list of things that might happen to your assets, looking at likelihood and impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What might be included in a risk assessment?

A

Threat Actor
Threat Source
Compromise method
How the CIA of an asset would be affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a risk treatment plan?

A

The process of choosing and applying a set of controls to address risks identified in the Risk Assessment.

17
Q

What 2 things do controls do to risks?

A

Reduce the chance of the risk taking place
Mitigate the impact of the risk when it does take place

18
Q

What are the 2 alternatives to controls?

A

Transfer the risk (insurance, outsource)
Accept the risk

19
Q

What are direct side effects to controls?

A

The consequences of imposing the control, irrespective of the way users respond.

20
Q

What are indirect side effects to controls?

A

The consequences of imposing the control caused by users working around it or other displacement of risk.

21
Q

What is risk appetite?

A

How much risk an organisation is willing to absorb

22
Q

Why would an organisation accept a risk?

A

They either see the chance of the event happening to be too small or the impact when it does to be too small to be worth preparing for

23
Q

Give 5 examples of controls

A

Firewalls
Encryption
Antivirus software
Intrusion detection systems
Access controls

24
Q

Give 5 examples of threat actors

A

Nation States
Ransomware Gangs
Script kiddies
Employees
Cloud service provider