Security Programme management and oversight 5.1 Flashcards

1
Q

Security Policy Guidelines.

A

What rules are you following to provide CIA.

Security Policies answer the what and the why.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information security policy

A

A big list of all security related policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acceptable Use Policy

A

Acceptable Use Policy
Defines what users are able to do with the technology has been provided to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business Continuity

A

Plan for when technology does not work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disaster Recovery plan

A

It should be ready to respond to disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Incidents

A

policy to be able to react to different events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident response team

A

Specialised team to respond to a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST

A

National institute of standards and technology.

Incident response lifecycle:

Preparation, Detection, Containment, Post-incident Activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SDLC

A

Systems development cycle
AGILE VS WATERFUL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Change management

A

Policies which need to be followed in relation to making a change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Standards

A

A formal definition for using security technologies and processes.

Many standards are already available
ISO (International Organisation for Standardisation).
NIST (National Institute of Standards and Technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passwords

A

Ensure a specific set of password policies are being used when setting a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access control

A

Define which access control types are used. Determine which information, at what time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical Security - Standards

A

Rules and Policies regarding physical security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption - standards

A

Password storage (Encrypted).
Data encryption standards depending on the state of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Regulations are often mandated.

A

Security standards are often mandated by regulations. Sox Hippa.

17
Q

Legal - Oversight.

A

The Security team is often tasked with the legal responsibilities.

Disclosure, Reporting illegal activities, Holding data required for legal proceedings.

18
Q

Industry -

A

The industry may require specific security consideration.

19
Q

Geographical Security

A

May be different standards depending on where you are in the world.

20
Q

Security Procedures - Change management

A

Scope of change
Risk of change
Create a plan
Change control board
Have a back out plan.

21
Q

On boarding

A

Bringing someone into the building,
New Accounts will need to be created.

22
Q

Off boarding

A

What should happens when users decide to leave the organisation. What happens to the data on any of their devices.

23
Q

Playbook

A

Conditional steps to follow,

For example; investigate a data breach, recover from ransomware.

Often Integrated into a SOAR platform.

24
Q

SOAR

A

Security Orchestration, Automation and Response.

25
Q

Monitoring and Revision

A

Look for opportunities to tweak security systems to enhance security.

26
Q

Governance Structures

A

Board - Panel of specialists which set the tasks or requirements for the committees.

Centralised/Decentralised
Centralised governance is located in one location with a group of decision makers. Decentralised governance spreads the decision-making process around to other individuals or locations.

27
Q

Data Responsibility

A

Who is responsible what data. For example: Treasurer is responsible for all financial data.

28
Q

Data controller

A

Manages how the data will be used.
Manages the purposes and means by which personal data is processed.

Eg: Payroll Controller

29
Q

Data processor

A

Processes the data on behalf of the data controller. Often a third-party or different group.

Eg: Py roll processor.

30
Q

Data Custodian/ Steward

A

Making sure that the data is being handled in a way which is compliance to laws and standards set. Responsible for accuracy, privacy and security.

Responsible for determining what type of user has access to what type of data.

31
Q
A