Chapter4 Flashcards

1
Q

List the 6 steps to developing a complaint security program

A

1 - Identify information Assets
2- Conducting risk assessment
3 - Selecting & Implementing security controls
4 - Monitor & Test the controls
5 - Review & Adjust the program
6 - Oversee third party service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which step is the baseline for security controls?

A

Step 2: Conducting a risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a threat?

A

Anything that has the potential to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Vulnerability?

A

Flaw or weakness that can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 security controls?

A

Physical Security Controls
Technical Security Controls
Administrative Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Factors citied in security statutes and regulations:

A
Organization size and combabilities
Nature & Scope of the business
Nature and sensitivity of information
State of the art tech.
Cost of the security
Infrastructure Capabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Businesses must conduct periodic internal reviews to evaluate and adjust the information security program as a result of:

A
Testing & Monitoring
Material Changes to the business
Changes in technology
Changes in threats
Environmental or operational changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 basic requirements on businesses for outsourcing?

A

1- Exercising due diligence in selecting service provider
2- Contractually require outsource provider to implement appropriate security measures
3- Monitor the performance of the outsource provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Security Controls focuses on?

A

Facility and equipment

Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Technical security controls focus on?

A

Access Controls
Identification and authentication
System and service acquisition Controls
System and information Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Administrative Security Controls focus on?

A

Personal Security
Employee awareness and training
Contigency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Administrative Security Controls focus on?

A

Personal Security
Employee awareness and training
Contingency Planning, backup & disaster recovery
Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 categorization to protect facility and equipment

A

Physical access restriction
Protection against technological failures
Protection against environmental threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Laws & Regulations require to protect data media from being:

A

Read
Copied
Altered
Removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Controlling access to system and data requires?

A

Identification
Authentication
Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To manage the acquisition process should include:

A

Imposing appropriate security requirements
Design and implementation of the system
Testing & Evaluation of security

16
Q

System and data integrity includes:

A

System Integrity
Dats integrity
Malicious code protection
Instrusion detection

16
Q

System and data integrity includes:

A

System Integrity (protect from unauthorized changes)
Dats integrity (protect from unauthorized alteration or destruction)
Malicious code protection
Intrusion detection

17
Q

Laws and regulations require to verify employees, agents and contractors to have:

A

Technical Expertise
Personal Integrity
Reliability

18
Q

Contingency Plan should include:

A
System & data backup procedures
Recovery Plan
Alternate source storage
Backup & retention procedure
Proper immediately deletion after they can not be used
Appropriate mechanism to recovery
Testing the plan on a regular basis
Regular reviewing of the plan
19
Q

Incidence Response Plan should include:

A
Incident Reporting
Incident Handling and response
Incident Monitoring and recordkeeping
Incident Response assistance
Training
Testing
20
Q

What is the purpose of Selecting and Implementing security controls?

A

To manage reduce the risk to an appropriate and reasonable level

21
Q

The implementation of the security law involves:

A

Categories of the security control

The key role of the risk assessment