A-Overview Flashcards

1
Q

What an effective governance program will use

A

Balanced scorecard, metrics, and other means to monitor these or other key processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information security governance

A

A set of activities that are established so that management has a clear understanding of the state of the organization’s security programs, its current risks, and its direct activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Issues that Information security can create

A

business and people issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Goal of the security program

A

To continue to contribute toward fulfillment of the security strategy, which itself will continue to align to the business and business objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IT’s role in a successful information security governance

A

An effective IT governance is required. Without IT governance, information security governance will not be able to reach its full potential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Downward vision flow information security governance

A

1- Business vision to 2- Business strategy ; to 3- Business Objective ; to 4- IT security Strategy ; to 5- IT security strategy; to 6- Security Policy; to 7- Security standards ; to 8- Security process ; to 9-Security Metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Purpose of security governance

A

To align the organization’s security program with the business program with the needs of the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Policy

A

Should at minimum reflect directly the mission, objectives, and goals of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Standards

A

Help to drive a consistent approach to solving business challenges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Processes

A

Formalized descriptions of repeated business activities that include instructions to applicable personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Two keys results of an effective security governance program

A

• Increased trust Customers, suppliers, and partners trust the organization to a greater degree when they see that security is managed effectively. • Improved reputation The business community, including customers, investors, and regulators, will hold the organization in regard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When does governance begin

A

With the establishment of top-level strategic objectives that are translated into actions, policies, procedures, and other activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Term information security governance

A

It refers to collection of top-down activities intended to control the security organization to ensure information security supports the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ojectives

A

Desired capabilities or end states, ideally expressed in archivable, measurable terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Strategy

A

Plan to achieve one or more objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should be considered when building out governance structure.

A

CIA ( Confidentiality Integrity Availability )and the type of info used by the business

17
Q
A