Info Gov Flashcards

(77 cards)

0
Q

What are the 5 classifications commonly used by the U.S. department of Defence?

A
Unclassified
Sensitive but Unclassified (SBU)
Confidential
Secret
Top Secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is the opposite of CIA?

A

Disclosure
Alteration
Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which classification level (US DoD) may often use the terms “for official use only” or “for internal use only”?

A

Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between unclassified and SBU? (US DoD)

A

SBU generally contains personal information ie medical records or disciplinary proceedings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the lowest level of classified government information? (US DoD)

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What term is commonly used to collectively represent policies, procedures, guidelines and standards that help steer an organisations decisions and operations?

A

Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four main types of policies?

SARI

A

Senior Management
Regulatory
Advisory
Informative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of policy do most policies fall under?

SARI

A

Advisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of identity management system facilitates authentication, non-repudiation and access control via digital certificates?

A

PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which 3 of the following 5 background checks would commonly be included as part of more extensive pre-employment screening?
Credit check
Drug test
Reference check
Special background investigation
Verification of personal/professional data in application

A

Credit check
Drug test
Special background investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is ultimately responsible for an organisations information security? management or information security professional?

A

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With regards information a system admin what commonly be known as what? Information owner or custodian?

A

Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which term is used to ensure that not one individual has complete authority or control over a critical system or process and also reduces dependence on individuals, ie avoiding a single point of failure?

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which terms describes regularly transferring key personnel into different roles or positions in different parts of the organisation?

A

Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What 3 things does the risk assessment triple consist of?

A

Quantities risk methodologies
Risk calculations
Safeguard selection criteria and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What 2 elements are multiplied to calculate a risk?

A

Threat x Vulnerability = Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What 3 elements does the risk management triple consist of?

A

Threat
Vulnerability
Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk management consists of 3 elements. What are they?

A

Identification
Analysis
Risk Treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When does risk identification occur?

A

During a risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two methods used for determining the value of an asset?

A

Quantitive

Qualities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which method is related to cost? Quantitive or qualative?

A

Quantitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which method is related to importance? Quantitive or qualative

A

Qualative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What 3 basic elements are used to determine the value of an asset?

A

Initial and maintenance costs
Organisational (internal) value
Public value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which value (organisational or public) includes the cost of acquiring, creating or re-creatinine information, and the business impact or loss if the information is lost or compromised. It can also include liability costs, personal injury, death, etc?

A

Organisational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Which value (organisational or public) includes loss of proprietary information or processes and business reputation?
Public
25
What are the 4 basic steps in threat analysis?
1. Define the threat 2. Identify the consequences if threat occurs 3. Determine the probable frequency of threat event 4. Assess the probability of threat occurring
26
What two types are threats generally categorised as?
Man made | Natural
27
Which 4 steps are involved in risk analysis?
1. Identify assets to be protected including sensitivity, value, importance to the organisation. 2. Define specific threats including threat frequency and impact data 3. Calculate Annualised Loss Expectancy (ALE) 4. Select appropriate safeguards
28
How is the annual loss expectancy calculated?
SLE x ARO = ALE | Single loss expectancy x annual rate of occurrence
29
How is single loss expectancy (SLE) calculated?
Asset value x Exposure Factor
30
What is a measure of the negative effect or impact that a realised threat or event would have on a specific asset, expressed as a percentage otherwise known as?
Exposure factor
31
Which type of risk analysis would include the following advantages? No complex calculations are required Time and work effort involved is relatively low Volume of input data required is relatively low
Qualative
32
Which type of risk analysis would include the following advantages? Financial costs are defined (cost-benefit analysis) More concise, specific data supports analysis, ie fewer assumptions Analysis and calculations can often be automated Specific quantifiable results are easier to communicate
Quantitive
33
Which type of risk analysis is scenario driven and doesn't use numeric values?
Qualative
34
Which type of risk analysis attempts to assign objective numeric values?
Quantitive
35
Purely Quantitive risk analysis is generally not possible or practical? True or false?
True
36
What are the 4 methods of risk treatment?
Risk reduction Risk assignment (or transference) Risk avoidance Risk acceptance
37
What is the calculation for cost benefit analysis?
ALE before safeguard - ALE after safeguard - cost of safeguard = value of safeguard
38
What should be considered when calculating the cost of a safeguard?
Total cost of ownership (TCO)
39
What 4 criteria should be considered when selecting a safeguard?
Cost effectiveness Legal liability Operational impact Technical factors
40
What are the 3 main components of an effective security awareness program?
General awareness program, formal training and education
41
What 5 key factors are critical to a successful security awareness program?
Senior level management support Demonstration that security supports business objectives Demonstration that security affects all individuals and job functions Take into account the target audience ie level of training Action and follow up
42
Which person directs, coordinates, plans and organises information security activities throughout the organisation? Security officer Information Systems Security professional Security Administrator
Security Officer
43
Who is responsible for drafting of policies, standards and supporting guidelines, procedures and baselines? Security officer Information Systems Security professional Security Administrator
Information Systems Security Professional
44
Who is responsible for designing security controls into information systems, testing the controls and implementing the systems in production? Security officer Information Systems Security professional Security Administrator Information Systems/Technology Professional
Information Systems/Technology Professional
45
Who is responsible for managing user access requests and privileges? Security officer Information Systems Security professional Security Administrator Information Systems/Technology Professional
Security Administrator
46
NIST SP 800-53 is mandatory for US federal agencies and their contractors. True or False?
True
47
NIST SP 600-53 and ISO 27001 are examples of what?
Control frameworks
48
Common organisations that develop standards?
National Institute of Standards and technology (NIST) Institute of Electronics and Electrical Engineers (IEEE) American National Standards Institure (ANSI) National Security Agency (NSA)
49
Guidelines are recommendations, best practices and templates documented in the frameworks created by other organisations such as:
- Control Objectives For Information and Related Technology (COBIT) - the Capability Maturity Model (CMM) - ISO 2700
50
``` Which two governance Framework documents are best to keep as standalone? procedures guidelines policies standards baselines ```
Standards and Policies
51
How often should a policy be reviewed?
Annually
52
The following are types of what? Canada's "Security of Information Act" China's Law on "Guarding State Secrets" The UK's "Official Secrets Act"
classification and categorisation systems.
53
NIST Federal Information Processing Standard 199 and NIST special publication 800-60 "Guide for mapping types of information and information systems to security categories" are required to be followed by whom
The US Federal Government
54
What are the 9 steps of the NIST Risk Methodology?
1. System Characterisation 2. Threat Identification 3. Vulnerability Identification 4. Control Analysis 5. Liklihood Determination 6. Impact Analysis 7. Risk Determination 8. Control Reccomendations 9. Results Documentation
55
Which Framework/Methodology identifies 5 areas of internal control necessary to meet the Financial Reporting and disclosure objectives?
-COSO (The Committee of sponsoring organisations of the Treadway Commission)
56
Which Framework/Methodology contains a set of best practices for IT core operational processes such as change, release and configuration management, incident and problem management, capacity and availability management and IT Financial Management. It's primary contribution is showing how the controls can be implemented for the service management IT processes? - ITIL (The IT Infrastructure Library) - COBIT (Control Objectives for Information and Related Technology)
- ITIL (The IT Infrastructure Library)
57
Which Framework/Methodology provides an overall structure for information technology control and includes control objectives. Also used to examine effectiveness, efficiency, compliance, confidentiality, etc. of high level control objectives. - ITIL (The IT Infrastructure Library) - COBIT (Control Objectives for Information and Related Technology)
- COBIT (Control Objectives for Information and Related Technology)
58
What is ISO 17799:2005 standard?
contains 134 information security controls
59
What is ISO/IEC 27000?
the information security management series
60
What is ISO 27002:2005?
specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented information security management system
61
name 8 types of risk methodologies?
- NIST SP 800-30, 800-39, 800-66 - Qualative, used by US federal government, plus regulated industries and health care. 9 stages - CRAMM - staged discipline approach, both technical and non-technical. uses asset identification & valuation, threat and vulnerability assessment and countermeasure selection and recommendation - Failure Modes and Effect Analysis - hardware/software analysis using Immediate level, intermediate level and system wide - FRAP - uses a narrow risk assessment. allows for pre-screening to determine is risk analysis is needed - OCTAVE - driven by operational risk and security practices. criteria is a set of principles, attributes and outputs - Security Officers Management and Analysis Project (SOMAP) - open information security management project - Spanning Tree Analysis - creates a tree of all possible threats to or faults in a system - VAR (Value At Risk) - provides a summary of the worst loss due to a security breach over a target horizon
62
In a quantitative risk methodology, the calculation ALE = SLE x ARO can be adjusted using which 2 estimates?
Local Annual Frequency Estimate (LAFE) | Standard Annual Frequency Estimate (SAFE)
63
What are the 4 elements of a risk?
threat vulnerability likelihood impact
64
What is the calculation for risk?
likelihood x impact
65
Which risk methodology uses likelihood?
Qualitative
66
How can the likelihood be determined?
capabilities of the threat and the presence or absence of countermeasures
67
In asset valuation, what is the consensus/modified Delphi method?
Participants in a valuation exercise are asked to comment anonymously about the task at hand. results collected and then discussed in public forum
68
What is the difference between a tangible asset and a intangible asset?
Tangible is something physical, intangible is not.
69
How is a tangible asset generally valued?
Original cost minus depreciation.
70
What are 3 ways to determine tangible asset value?
- Original cost minus depreciation - Actual market value through research - cost of switching to a competing asset
71
Intangible assets can be defined as what?
Definite - expiration date ,ie patent | Indefinite - no expiration date, ie brand
72
How can an intangible asset value be calculated?
- cost to create and replace - capitalisation of historic profits - cost avoidance or savings
73
Job descriptions should have some reference to information security responsibilities. True or False?
True
74
Credit checks carried out as part of employment checks must be done in line with which pieces of legislation in the US?
Fair Credit Reporting Act (FCRA) | Equal Employment Opportunity Commission (EEOC)
75
In the US the law "Americans with Disabilities Act" (ADA) may provide protection for which individuals in the event of drug screening as part of employment checks?
individuals undergoing drug rehabilitation
76
What is a CIRT?
Computer Incident Response Team