Controls Flashcards

(93 cards)

1
Q

Security of network services

A

8.21 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data masking

A

8.11 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protection of records

A

5.33 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security of assets off-premises

A

7.9 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security testing in development and acceptance

A

8.29 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Segregation of networks

A

8.22 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information security event reporting

A

6.8 #Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contact with authorities

A

5.5 #Preventive #Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Configuration management

A

8.9 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compliance with policies, rules, and standards for information security

A

5.36 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure development life cycle

A

8.25 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Storage media

A

7.10 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information security awareness, education, and training

A

6.3 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Remote working

A

6.7 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assessment and decision on information security events

A

5.25 #Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information security for use of cloud services

A

5.23 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Installation of software on operational systems

A

8.19 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Secure coding

A

8.28 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Separation of development, test, and production environments

A

8.31 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Use of privileged utility programs

A

8.18 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Information security roles and responsibilities

A

5.2 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Access rights

A

5.18 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Access control

A

5.15 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Secure authentication

A

8.5 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Physical security perimeters
7.1 #Preventive
26
Protection against malware
8.7 #Preventive #Detective #Corrective
27
Managing information security in the ICT supply chain
5.21 #Preventive
28
Return of assets
5.11 #Preventive
29
Response to information security incidents
5.26 #Corrective
30
Information security in project management
5.8 #Preventive
31
Legal, statutory, regulatory, and contractual requirements
5.31 #Preventive
32
Responsibilities after termination or change of employment
6.5 #Preventive
33
Policies for information security
5.1 #Preventive
34
Screening
6.1 #Preventive
35
Capacity management
8.6 #Preventive #Detective
36
User endpoint devices
8.1 #Preventive
37
Threat intelligence
5.7 #Preventive #Detective #Corrective
38
Independent review of information security
5.35 #Preventive #Corrective
39
Authentication information
5.17 #Preventive
40
Management of technical vulnerabilities
8.8 #Preventive
41
Secure disposal or re-use of equipment
7.14 #Preventive
42
Use of cryptography
8.24 #Preventive
43
Working in secure areas
7.6 #Preventive
44
Collection of evidence
5.28 #Corrective
45
Documented operating procedures
5.37 #Preventive #Corrective
46
Protection of information systems during audit testing
8.34 #Preventive
47
Clear desk and clear screen
7.7 #Preventive
48
Test information
8.33 #Preventive
49
Physical entry
7.2 #Preventive
50
Monitoring, review, and change management of supplier services
5.22 #Preventive
51
Redundancy of information processing facilities
8.14 #Corrective
52
Labelling of information
5.13 #Preventive
53
Network security
8.20 #Preventive #Detective
54
Classification of information
5.12 #Preventive
55
Acceptable use of information and other associated assets
5.10 #Preventive
56
Physical security monitoring
7.4 #Preventive #Detective
57
Confidentiality or non-disclosure agreements
6.6 #Preventive
58
Contact with special interest groups
5.6 #Preventive #Corrective
59
Information backup
8.13 #Corrective
60
Web filtering
8.23 #Preventive
61
Information security incident management planning and preparation
5.24 #Corrective
62
Management responsibilities
5.4 #Preventive
63
Secure system architecture and engineering principles
8.27 #Preventive
64
Addressing information security within supplier agreements
5.20 #Preventive
65
Equipment siting and protection
7.8 #Preventive
66
Application security requirements
8.26 #Preventive
67
Intellectual property rights
5.32 #Preventive
68
Outsourced development
8.30 #Preventive #Detective
69
Learning from information security incidents
5.27 #Preventive
70
Terms and conditions of employment
6.2 #Preventive
71
Data leakage prevention
8.12 #Preventive #D
72
Segregation of duties
5.3 #Preventive
73
Information transfer
5.14 #Preventive
74
Privileged access rights
8.2 #Preventive
75
Information security in supplier relationships
5.19 #Preventive
76
Identity management
5.16 #Preventive
77
Change management
8.32 #Preventive
78
Supporting utilities
7.11 #Preventive #Detective
79
Access to source code
8.4 #Preventive
80
Protecting against physical and environmental threats
7.5 #Preventive
81
Monitoring activities
8.16 #Detective #Corrective
82
Logging
8.15 #Detective
83
Equipment maintenance
7.13 #Preventive
84
ICT readiness for business continuity
5.30 #Corrective
85
Inventory of information and other associated assets
5.9 #Preventive
86
Information access restriction
8.3 #Preventive
87
Information deletion
8.10 #Preventive
88
Clock synchronization
8.17 #Detective
89
Cabling security
7.12 #Preventive
90
Disciplinary process
6.4 #Preventive #Corrective
91
Information security during disruption
5.29 #Preventive #Corrective
92
Securing offices, rooms, and facilities
7.3 #Preventive
93
Privacy and protection of PII
5.34 #Preventive