CISSP (Chapter 2 - Information Security Governance and Risk Management) Flashcards
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Who has the primary responsibility of determining the classification level for information?A. The functional managerB. Senior managementC. The ownerD. The user
C. A company can have one specific data owner or different data owners who have been delegated the responsibility of protecting specific sets of data. One of the responsibilities that goes into protecting this information is properly classifying it.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
If different user groups with different security access levels need to access the same information, which of the following actions should management take?A. Decrease the security level on the information to ensure accessibility and usability of the information.B. Require specific written approval each time an individual needs to access the information.C. Increase the security controls on the information.D. Decrease the classification label on the information.
C. If data is going to be available to a wide range of people, more granular security should be implemented to ensure that only the necessary people accessChapter 2: Information Security Governance and Risk Management151the data and that the operations they carry out are controlled. The security implemented can come in the form of authentication and authorization technologies, encryption, and specific access control mechanisms.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
What should management consider the most when classifying data?A. The type of employees, contractors, and customers who will be accessing the dataB. Availability, integrity, and confidentialityC. Assessing the risk level and disabling countermeasuresD. The access controls that will be protecting the data
B. The best answer to this question is B, because to properly classify data, the data owner must evaluate the availability, integrity, and confidentiality requirements of the data. Once this evaluation is done, it will dictate which employees, contractors, and users can access the data, which is expressed in answer A. This assessment will also help determine the controls that should be put into place.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Who is ultimately responsible for making sure data is classified and protected?A. Data ownersB. UsersC. AdministratorsD. Management
D. The key to this question is the use of the word “ultimately.” Though management can delegate tasks to others, it is ultimately responsible for everything that takes place within a company. Therefore, it must continually ensure that data and resources are being properly protected.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Which factor is the most important item when it comes to ensuring security is successful in an organization?A. Senior management supportB. Effective controls and implementation methodsC. Updated and relevant security policies and proceduresD. Security awareness by all employees
A. Without senior management’s support, a security program will not receive the necessary attention, funds, resources, and enforcement capabilities.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
When is it acceptable to not take action on an identified risk?A. Never. Good security addresses and reduces all risks.B. When political issues prevent this type of risk from being addressed.C. When the necessary countermeasure is complex.D. When the cost of the countermeasure outweighs the value of the asset and potential loss.
D. Companies may decide to live with specific risks they are faced with if the cost of trying to protect themselves would be greater than the potential loss if the threat were to become real. Countermeasures are usually complex to a degree, and there are almost always political issues surrounding different risks, but these are not reasons to not implement a countermeasure.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Which is the most valuable technique when determining if a specific security control should be implemented?A. Risk analysisB. Cost/benefit analysisC. ALE resultsD. Identifying the vulnerabilities and threats causing the risk
B. Although the other answers may seem correct, B is the best answer here. This is because a risk analysis is performed to identify risks and come up with suggested countermeasures. The ALE tells the company how much it could lose if a specific threat became real. The ALE value will go into the cost/benefit analysis, but the ALE does not address the cost of the countermeasure and the benefit of a countermeasure. All the data captured in answers A, C, and D are inserted into a cost/benefit analysis.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Which best describes the purpose of the ALE calculation?A. Quantifies the security level of the environmentB. Estimates the loss possible for a countermeasureC. Quantifies the cost/benefit resultD. Estimates the loss potential of a threat in a span of a year
D. The ALE calculation estimates the potential loss that can affect one asset from a specific threat within a one-year time span. This value is used to figure out the amount of money that should be earmarked to protect this asset from this threat.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
The security functionality defines the expected activities of a security mechanism, and assurance defines which of the following?A. The controls the security mechanism will enforceB. The data classification after the security mechanism has been implementedC. The confidence of the security the mechanism is providingD. The cost/benefit relationship
C. The functionality describes how a mechanism will work and behave. This may have nothing to do with the actual protection it provides. Assurance is the level of confidence in the protection level a mechanism will provide. When systems and mechanisms are evaluated, their functionality and assurance should be examined and tested individually.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
How do you calculate residual risk?A. Threats × risks × asset valueB. (Threats × asset value × vulnerability) × risksC. SLE × frequency = ALED. (Threats × vulnerability × asset value) × controls gap
D. The equation is more conceptual than practical. It is hard to assign a number to an individual vulnerability or threat. This equation enables you to look at the potential loss of a specific asset, as well as the controls gap (what the specific countermeasure cannot protect against). What remains is the residual risk, which is what is left over after a countermeasure is implemented
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Why should the team that will perform and review the risk analysis information be made up of people in different departments?A. To make sure the process is fair and that no one is left out.B. It shouldn’t. It should be a small group brought in from outside the organization because otherwise the analysis is biased and unusable.C. Because people in different departments understand the risks of their department. Thus, it ensures the data going into the analysis is as close to reality as possible.D. Because the people in the different departments are the ones causing the risks, so they should be the ones held accountable.
C. An analysis is only as good as the data that go into it. Data pertaining to risks the company faces should be extracted from the people who understand best the business functions and environment of the company. Each department understands its own threats and resources, and may have possible solutions to specific threats that affect its part of the company.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Which best describes a quantitative risk analysis?A. A scenario-based analysis to research different security threatsB. A method used to apply severity levels to potential loss, probability of loss, and risksC. A method that assigns monetary values to components in the risk assessmentD. A method that is based on gut feelings and opinions
C. A quantitative risk analysis assigns monetary values and percentages to the different components within the assessment. A qualitative analysis uses opinions of individuals and a rating system to gauge the severity level of different threats and the benefits of specific countermeasures.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Why is a truly quantitative risk analysis not possible to achieve?A. It is possible, which is why it is used.B. It assigns severity levels. Thus, it is hard to translate into monetary values.C. It is dealing with purely quantitative elements.D. Quantitative measures must be applied to qualitative elements.
D. During a risk analysis, the team is trying to properly predict the future and all the risks that future may bring. It is somewhat of a subjective exercise and requires educated guessing. It is very hard to properly predict that a flood will take place once in ten years and cost a company up to $40,000 in damages, but this is what a quantitative analysis tries to accomplish.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
What is CobiT and where does it fit into the development of information security systems and security programs?A. Lists of standards, procedures, and policies for security program developmentB. Current version of ISO 17799C. A framework that was developed to deter organizational internal fraudD. Open standards for control objectives
D. The Control Objectives for Information and related Technology (CobiT) is a framework developed by the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI). It defines goals for the controls that should be used to properly manage IT and ensure IT maps to business needs.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
What are the four domains that make up CobiT?A. Plan and Organize, Acquire and Implement, Deliver and Support, and Monitor and EvaluateB. Plan and Organize, Maintain and Implement, Deliver and Support, and Monitor and EvaluateC. Plan and Organize, Acquire and Implement, Support and Purchase, and Monitor and EvaluateD. Acquire and Implement, Deliver and Support, and Monitor and Evaluate
A. CobiT has four domains: Plan and Organize, Acquire and Implement, Deliver and Support, and Monitor and Evaluate. Each category drills down into subcategories. For example, Acquire and Implement contains the following subcategories:• Acquire and Maintain Application Software• Acquire and Maintain Technology Infrastructure• Develop and Maintain Procedures• Install and Accredit Systems• Manage Changes
CISSP (Chapter 2 - Information Security Governance and Risk Management)
What is the ISO/IEC 27799 standard?A. A standard on how to protect personal health informationB. The new version of BS 17799C. Definitions for the new ISO 27000 seriesD. The new version of NIST 800-60
A. It is referred to as the health informatics, and its purpose is to provide guidance to health organizations and other holders of personal health information on how to protect such information via implementationof ISO/IEC 27002.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
CobiT was developed from the COSO framework. What are COSO’s main objectives and purpose?A. COSO is a risk management approach that pertains to control objectives and IT business processes.B. Prevention of a corporate environment that allows for and promotes financial fraud.Chapter 2: Information Security Governance and Risk Management145C. COSO addresses corporate culture and policy development.D. COSO is risk management system used for the protection of federal systems.
B. COSO deals more at the strategic level, while CobiT focuses more at the operational level. CobiT is a way to meet many of the COSO objectives, but only from the IT perspective. COSO deals with non-IT items also, as in company culture, financial accounting principles, board of director responsibility, and internal communication structures. Its main purpose is to help ensure
CISSP (Chapter 2 - Information Security Governance and Risk Management)
OCTAVE, NIST 800-30, and AS/NZS 4360 are different approaches to carrying out risk management within companies and organizations. What are the differences between these methods?A. NIST 800-30 and OCTAVE are corporate based, while AS/NZS is international.B. NIST 800-30 is IT based, while OCTAVE and AS/NZS 4360 are corporate based.C. AS/NZS is IT based, and OCTAVE and NIST 800-30 are assurance based.D. NIST 800-30 and AS/NZS are corporate based, while OCTAVE is international.
B. NIST 800-30 Risk Management Guide for Information Technology Systems is a U.S. federal standard that is focused on IT risks. OCTAVE is a methodology to set up a risk management program within an organizational structure. AS/NZS 4360 takes a much broader approach to risk management. This methodology can be used to understand a company’s financial, capital, human safety, and business decisions risks. Although it can be used to analyze security risks, it was not created specifically for this purpose.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
A server that houses sensitive data has been stored in an unlocked room for the last few years at Company A. The door to the room has a sign on the door that reads “Room 1.” This sign was placed on the door with the hope that people would not look for important servers in this room. Realizing this is not optimum security, the company has decided to install a reinforced lock and server cage for the server and remove the sign. They have also hardened the server’s configuration and employed strict operating system access controls.The fact that the server has been in an unlocked room marked “Room 1” for the last few years means the company was practicing which of the following?A. Logical securityB. Risk managementC. Risk transferenceD. Security through obscurity
D. Security through obscurity is not implementing true security controls, but rather attempting to hide the fact that an asset is vulnerable in the hope that an attacker will not notice. Security through obscurity is an approach to try and fool a potential attacker, which is a poor way of practicing security. Vulnerabilities should be identified and fixed, not hidden.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
A server that houses sensitive data has been stored in an unlocked room for the last few years at Company A. The door to the room has a sign on the door that reads “Room 1.” This sign was placed on the door with the hope that people would not look for important servers in this room. Realizing this is not optimum security, the company has decided to install a reinforced lock and server cage for the server and remove the sign. They have also hardened the server’s configuration and employed strict operating system access controls.The new reinforced lock and cage serve as which of the following?A. Logical controlsB. Physical controlsC. Administrative controlsD. Compensating controls
- B. Physical controls are security mechanisms in the physical world, as in locks, fences, doors, computer cages, etc. There are three main control types, which are administrative, technical, and physical.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
A server that houses sensitive data has been stored in an unlocked room for the last few years at Company A. The door to the room has a sign on the door that reads “Room 1.” This sign was placed on the door with the hope that people would not look for important servers in this room. Realizing this is not optimum security, the company has decided to install a reinforced lock and server cage for the server and remove the sign. They have also hardened the server’s configuration and employed strict operating system access controls.The operating system access controls comprise which of the following?A. Logical controlsB. Physical controlsC. Administrative controlsD. Compensating controls
- A. Logical (or technical) controls are security mechanisms, as in firewalls, encryption, software permissions, and authentication devices. They are commonly used in tandem with physical and administrative controls to provide a defense-in-depth approach to security.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
A company has an e-commerce website that carries out 60 percent of its annual revenue. Under the current circumstances, the annualized loss expectancy for a website against the threat of attack is $92,000. After implementing a new application-layer firewall, the new annualized loss expectancy would be $30,000. The firewall costs $65,000 per year to implement and maintain.How much does the firewall save the company in loss expenses?A. $62,000B. $3,000C. $65,000D. $30,000
- A. $62,000 is the correct answer. The firewall reduced the annualized loss expectancy (ALE) from $92,000 to $30,000 for a savings of $62,000. The formula for ALE is single loss expectancy × annualized rate of occurrence= ALE. Subtracting the ALE value after the firewall is implemented from the value before it was implemented results in the potential loss savings this type of control provides.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
A company has an e-commerce website that carries out 60 percent of its annual revenue. Under the current circumstances, the annualized loss expectancy for a website against the threat of attack is $92,000. After implementing a new application-layer firewall, the new annualized loss expectancy would be $30,000. The firewall costs $65,000 per year to implement and maintain.What is the value of the firewall to the company?A. $62,000B. $3,000C. –$62,000D. –$3,000
- D. –$3,000 is the correct answer. The firewall saves $62,000, but costs $65,000 per year. 62,000 – 65,000 = –3,000. The firewall actually costs the company more than the original expected loss, and thus the value to the company is a negative number. The formula for this calculation is (ALE before the control is implemented) – (ALE after the control is implemented) – (annual cost of control) = value of control.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
A company has an e-commerce website that carries out 60 percent of its annual revenue. Under the current circumstances, the annualized loss expectancy for a website against the threat of attack is $92,000. After implementing a new application-layer firewall, the new annualized loss expectancy would be $30,000. The firewall costs $65,000 per year to implement and maintain.Which of the following describes the company’s approach to risk management?A. Risk transferenceB. Risk avoidanceC. Risk acceptanceD. Risk mitigation
- D. Risk mitigation involves employing controls in an attempt to reduce the either the likelihood or damage associated with an incident, or both. The four ways of dealing with risk are accept, avoid, transfer, and mitigate (reduce). A firewall is a countermeasure installed to reduce the risk of a threat.