Chapter 2 - Understanding Security Policies Using a LIfecycle Approach Flashcards

0
Q

What is initiation in regards to the security lifecycle?

A

This involves preliminary risk assessments and categorizing of risk, such as with labels of low, medium, or high.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the 5 phases of the security lifecycle?

A

1) Initiation
2) Acquisition and development
3) Implementation
4) Operations and maintenance
5) Disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is acquisition and development in regards to the security lifecycle?

A

This involves a more detailed risk assessment, acquiring the products and tools needed to implement the countermeasures needed to reduce the risk, and testing these countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is implementation in regards to the security lifecycle?

A

This is the actual point where the rubber meets the road, where you put the countermeasures in place on the production network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is operations and maintenance in regards to the security lifecycle?

A

This involves monitoring and with the care and feeding of our network security devices (and incident handling when issues arise).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is disposition in regards to the security lifecycle?

A

All things come to an end, and disposing of network gear (including sanitizing/formatting/destroying media storage devices) is part of this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 2 methods for calculating the impact or risk value of an asset?

A

1) Qualitative - The data is gathered by an individual, who likely is a subject matter expert (in this case as to the asset’s value, its vulnerabilities, potential threats, and the impact or risk based on those factors).
2) Quantitative - In this method, you use raw data, numbers, and statistics to determine the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 5 key activities when assessing the current security posture of network devices?

A

1) General security assessment - Provides a high-level idea about the security state of network devices (servers, desktops, and data storage).
2) Internal assessment - How well protected you are from the inside network.
3) External assessment - This is to assess the security risk associated with attacks from external devices on networks that connect to you.
4) Wireless assessment - Identifies vulnerabilities and weaknesses associated with the wireless implementation.
5) Analysis and documentation - This combines the details about vulnerabilities that may exist from the assessments completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 5 things to consider when considering a specific asset in regards to risk management?

A

1) Value of the asset
2) Vulnerabilities
3) Potential threats
4) Compliance issues
5) Business requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For each new asset (for which you have not calculated risk) what steps should you take?

A

1) Using qualitative/quantitative approaches, identify the risk (value of asset, vulnerability, potential threats = risk).
2) Take action regarding the risk (which could include transferring the risk, accepting the risk, or reducing the risk using countermeasures).
3) Monitor the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the who, what, and why of a security policy?

A

1) Who creates security policies?
2) What is in a security policy?
3) Why do we have security policies?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is ultimately responsible for the data and the networks that carry the data in the company?

A

The executive senior management team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the governing policy?

A

The high-level security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the responsibility of management teams and staff who have the appropriate skills when it comes to the creation of security policies?

A

Implementing the appropriate controls (which include physical, logical, and administrative).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an end-user policy or acceptable use policy?

A

End users agreeing to and abiding by the policies set forth by the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is normally included in a security policy?

A

The primary aspect is risk management. It can include items such as access controls, backups, virus protection, incident handling, encryption, monitoring, password requirements, disposing of resources, inspections and reviews, personal/physical security, etc.

15
Q

What is the scope of the policy?

A

General overview about why the policy was written and what it covers and what it does not cover.

16
Q

Why do we have security policies?

A

Besides risk management, security policies are also used to educate users, staff, and other workers about what the policy of the company is. It can be used to establish a baseline for which security measures must be implemented to protect assets.

17
Q

What is regulatory compliance?

A

If you do not comply with regulations, government agencies may have the right to completely close down the business. So, part of the overall plan for security and managing risk is to implement whatever regulatory compliance is required in your local community.