Chap 5 - Governance Risk and Compliance Flashcards
(84 cards)
ISO 27002
international standard for implementing and maintaining information security systems
ISO 27012
international standard for cloud security
NIST 800-12
general security standard, US based (National Institute of Standards and Technology)
NIST 800-14
standard for policy development, US based (National Institute of Standards and Technology)
Chap 5-7: You are a security manager for your company and need to reduce the risk of employees working in collusion to embezzle funds. Which of the following policies would you implement?
Mandatory vacations
Clean desk
NDA
Continuing education
Mandatory vacations
Chap 5-10: Which of the following agreements is less formal than a traditional contract but still has a certain level of importance to all parties involved?
SLA
BPA
ISA
MOU
MOU
MOU
Memoradum of Understanding - type of agreement that is usually not legally binding
ISA
Interconnection Security Agreement - specifies the technical and security requirements of an interconnection between organizations
SLE
Single Loss Expectancy. Calucated by value * exposure factor
e.g. asset valued at $10,000 with an exposure factor of 30% would have an SLE of $3,000
Chap 5-20: You are a security administrator and advise the web development team to include a CAPTCHA on the web page where users register for an account. Which of the following controls is this referring to?
Deterrent
Detective
Compensating
Degaussing
Deterrent
Chap 5-21: As the IT security officer for your organization, you are configuring data label options for your company’s research and development file server. Regular users can label documents as contractor, public or internal. Which label should be assigned to company trade secrets
High
Top Secret
Confidential
Low
Confidential
BPA
Business Partnership Agreement. Legal agreement between 2 partners
Chap 5-24: Your security manager wants to decide to mitigate based on cost. What is this an example of?
Quantitative risk assessment
Qualitative risk assessment
Business impact analysis
Threat assessment
Quantitative risk assessment
Quantitative risk assessment
process of assigning numerical values to the probability that an event will occur and what impact the event will have
Requires complex calculations and is more time consuming because it requires detailed financial data and calucations.
Qualitative risk assessment
process of ranking which risk poses the most danger
Business impact analysis
aka BIA; used to evaluation the possible effect a business can suffer should an interruption to a critical system’s operation occur. Could be the result of an accident, disaster or emergency
Chap 5-25: Your company has outsourced its proprietary processes to Acme Corporation. Due to technical issues, Acme wants to include a third party vendor to help resolve the technical issues. Which of the following must Acme consider before sending data to a third party?
The data should be encrypted before it is sent to the third party vendor
This may constitute unauthorized data sharing
This may violate the privileged user role-based awareness trainining
This may violate the Non-Disclosure Agreement (NDA)
This may violate the Non-Disclosure Agreement (NDA)
Chap 5-27: Which of the following is typically included in a BPA?
Clear statements detailing the expectation between a customer and a service provider
The agreement that a specific function or service will be delivered at the agreed on level of performance
Sharing of profits and losses and the addition or removal of a partner
Security requirements associated with interconnected IT systems
Sharing of profits and losses and the addition or removal of a partner
ISA
Interconnection Service Agreement: specifies security requirements associated with interconnecting IT systems
Data Minimization
process of ensuring that only the data required for business functions is collected and maintained
Your company website is hosted by an Internet Service Provider. Which of the following risk responsible techniques are in use?
Risk avoidance
Risk register
Risk acceptance
Risk mitigation
Risk avoidance
Risk Response Techniques
There are four possible risk response strategies for negative risks:
Avoid – eliminate the threat to protect the project from the impact of the risk. An example of this is cancelling the project.
Transfer – shifts the impact of the threat to as third party, together with ownership of the response. An example of this is insurance.
Mitigate – act to reduce the probability of occurrence or the impact of the risk. An example of this is choosing a different supplier.
Accept – acknowledge the risk, but do not take any action unless the risk occurs. An example of this is documenting the risk and putting aside funds in case the risk occurs.
There are also four possible risk responses strategies for positive risks, or opportunities:
Exploit – eliminate the uncertainty associated with the risk to ensure it occurs. An example of this is assigning the best workers to a project to reduce time to complete.
Enhance – increases the probability or the positive impacts of an opportunity. An example of this adding more resources to finish early.
Share – allocating some or all of the ownership of the opportunity to a third party. An example of this is teams.
Acceptance – being willing to take advantage of the opportunity if it arises but not actively pursuing it. An example of this is documenting the opportunity and calculating benefit if the opportunity occurs.
Data retention policy
Policy which defines how long an organization will retain data. Regulations require financial transactions to be stored for years
Chap 5-35: How do you calculate the annual loss expectancy (ALE) that may occur due to a threat?
Exposure factor (EF) / single loss expectancy (SLE)
Single loss expectancy (SLE) x annual rate of occurrence (ARO)
Asset value (AV) x exposure factor (EF)
Single loss expectancy (SLE) / exposure factor (EF)
Single loss expectancy (SLE) x annual rate of occurrence (ARO)