Information Security Management Introduction Flashcards

1
Q

Governance

A

‘The rules that run an organisation including, policies standards and procedures.’

Governance is about how the business is run. It is about how the organisation is managed, the oversight and accountability required to demonstrate active involvement by management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Corporate Governance

A

Corporate governance is the system and rules that companies must follow to make sure they are run properly and for the right reasons. This includes the way people work together and the rules they need to follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IT Governance

A

IT governance is a type of corporate governance that concentrates on making sure that the organization uses its IT resources in the most effective and efficient way possible to accomplish its objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Governance

A

This refers to the guidelines, methods, regulations, and steps that an organization employs to handle information in a uniform way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Governance

A

Security governance is a set of procedures that help an organization in defining, supporting, and managing its security efforts, which are linked to information, IT, and corporate governance. The aim is to ensure that the organization meets its needs concerning regulatory compliance, risk management, and operational requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Assurance

A

We usually hear about this in the context of making sure information is safe, which is called Information Assurance. This means making sure information is used, processed, stored, and sent in a secure way. It also includes taking care of the systems and processes that are used to manage this information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information Security

A

Information security is all about protecting information and information systems from unauthorised access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyber Security

A

Cyber security is frequently interpreted as being the same as information security but in reality, there is a subtle difference. Cyber security is more about the technology used to secure systems and products rather than governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Security Triangle

A

The Security Triangle consists of security, functionality and ease of use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The CIA Triad

A

Information security has three main parts, called Confidentiality, Integrity, and Availability. Think of them like a triangle, with each one being a corner of the triangle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality

A

We should only let authorized people see information, and we need to protect it so it doesn’t get shared by accident or on purpose. To make sure information stays confidential, we can use things like encryption or access controls to limit who can see it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Integrity

A

This is about making sure that information is accurate and can be trusted. We don’t want it to be changed without permission, so we use something called integrity controls like hashing or checksums to check if the information has been modified. We can also use access controls to limit who can change the information. The goal is to make sure the information is consistent and reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Availability

A

Availability means that information should be easy to get to when we need it. The IT department is responsible for making sure the systems that store information are always working properly. If something goes wrong, like a power outage or a hard drive failure, we might not be able to access the information. Another problem is when hackers try to block access to a website, which is called a Denial-of-Service attack. The goal is to make sure the information is always available and ready to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Non-repudiation

A

Non-repudiation means that no one can deny doing something because there is proof that it happened. This is important for things like sending emails or ordering goods online. Without non-repudiation, people could deny doing things and it would be difficult to prove otherwise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authenticity

A

This is about being able to prove where something came from and that the party who sent it cannot deny it. (Proof of origin)
This is closely related to non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Assets

A

An asset is something valuable to the organization, it can be physical like a building or something intangible like information or reputation. For example, assets of a business include people, buildings, computer systems, information, reputation, and brand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threats

A

A potential cause of an incident that may result in harm to a system or organisation

18
Q

Threat Source

A

Where does the threat come from. (The source of the threat)

19
Q

Threat Actor

A

AKA ‘Threat Agent’ - The party that carries out the attack

20
Q

Vulnerability

A

A weakness of an asset or group of assets that can be exploited by one or more threats

21
Q

Risk

A

The potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organisation

22
Q

Impact

A

“Impact” is a word used to describe the result of a particular event that affects the goals or objectives of a business. In simpler terms, when a risk becomes a reality, it can have a negative effect on the business and cause problems with operations, customers, or employees.

23
Q

Risk Management

A

To deal with the various risks that come with running a business, we need a plan to manage them. This plan is called a risk management framework. Its job is to help us figure out what controls and processes we need to use to manage the risks. The goal of risk management is to first identify all the risks in the business, analyse them, figure out the best way to deal with each one, apply the chosen solution, and then make sure it works.

24
Q

What are the four stages of Risk Management?

A

Identify (the risks)
Analyse (the risks)
Treat (the risks)
Monitor (for effectiveness)

25
Q

What are some options in treating a risk?

A

Avoidance – stop the activity
Reduction – apply controls to reduce risk
Transfer – typically through insurance
Acceptance – we make a business decision to accept the risk

26
Q

Risk - Avoidance

A

Risk avoidance means deciding not to participate in or withdraw from an activity to avoid a particular risk. By avoiding the activity, we eliminate the possibility of the risk occurring. For example, we might choose not to build a data centre in an earthquake-prone area or not to construct high-value infrastructure in a coastal region where there is a risk of tsunamis. While we are not directly addressing the risk itself, we are making a conscious business decision to avoid it.

27
Q

Risk - Reduction

A

AKA - Mitigation, is a commonly used term in risk management, referring to the actions taken to reduce the probability or negative consequences of a risk. The definition of mitigation is “actions taken to lessen the probability, negative consequences, or both, associated with a risk.” The ultimate goal of mitigation is to reach an acceptable level of risk, which may involve implementing a single control or multiple layers of controls. For instance, using a gas-based suppression system in the server room to extinguish a fire is an example of risk reduction, while strong physical access controls that limit the likelihood of an unauthorized intruder gaining access to a business’s premises is another example of risk reduction.

28
Q

Risk - Transfer

A

This involves distributing an element of risk to another party. This can be done through various means such as insurance policies, outsourcing activities, or sharing responsibilities with suppliers and vendors. By transferring the risk, the responsibility may shift to a third party, but the liability and accountability for the risk remain with the owner. The most common example of risk transfer is insurance, which can protect against financial losses or damage caused by various risks. Cyber insurance is a specific type of insurance that covers risks related to cybersecurity. In summary, risk transfer involves shifting the responsibility for a risk to another party, but the accountability and liability for the risk remain with the owner.

29
Q

Risk - Acceptance

A

An informed decision to take a particular risk.” There are two types of risk acceptance:

  1. Where a risk is identified but, based on the circumstances, the decision is made to accept the risk without taking any further actions towards it. This could be due to the risk being of a very low likelihood but very high impact, and the cost of providing protective measures would be excessive. This would be a business decision made by senior management.
  2. Where a risk is identified, and risk reduction measures are applied through the use of controls to reduce the risk to an acceptable level. However, there is still some residual risk remaining, which is accepted.
30
Q

Identity

A

Identity is a unique characteristic that allows us to tell individuals or resources apart. It helps us keep track of what they are doing, like a username for a person or a process identity for a computer program.

31
Q

Authentication

A

Authentication is a way to confirm that someone or something is who or what they claim to be. It involves checking their identity using credentials such as a username and password or a pre-shared key. This helps to ensure that only authorized individuals or devices can access certain resources or perform certain actions.

32
Q

Authorisation

A

Authorization determines what actions can be taken after a user or device is successfully authenticated. Access controls are used to define what level of access a user or device has. For example, a user may be authorized to read a document but not authorized to modify it.

33
Q

Access Controls

A

Access controls are used to make sure that only authorized individuals or processes can access certain assets based on business and security needs. The authorization policy defines who has access, while access controls determine the level of access, such as read, write, or no access.

34
Q

Accountability

A

Accountability means being responsible for your actions and decisions. It involves keeping a record of activities that can be traced back to the responsible party. All systems have logs that record different activities, and these logs help in attributing actions to an individual or entity. Responsibility can be devolved, but accountability cannot. Even if someone else is responsible for managing an asset, the owner of the asset is still accountable for it.

35
Q

Audit

A

Audit is a review of actions, policies, and procedures to ensure compliance with requirements. It can cover user actions, system processes, policies, and effectiveness of controls. Audits can be conducted internally or externally by an independent body. The audit trail is a record of actions that may have been carried out by a user or individual. External audits can verify compliance with standards such as ISO27001, and compliance audits may go beyond contractual and regulatory requirements to consider legal compliance and privacy.

36
Q

Professionalism and Ethics

A

Businesses need to operate not just legally, but also ethically. In today’s world, ethics has become more important due to the power of social media and the potential damage to a company’s reputation and brand. Ethics is a global issue that is strongly linked to culture, and building the right culture in an organization can encourage ethical behaviour. Professional bodies that provide frameworks and certification programs for information assurance have ethics statements for their members to follow, and these statements help install ethics into the business. The goal is for the information assurance profession to have the same respect as other professions like lawyers.

37
Q

Why is information security important?

A

Information security is important because as technology advanced, the exchange of information became easier, and hackers emerged. Protecting information is critical because often, the information is the business. Security is not a separate issue but rather integrated into the business model.

38
Q

Drivers for Security

A

Businesses today face multiple security challenges due to factors such as the increasing use of the internet, the need to protect vast amounts of sensitive information, the use of social media, online banking, and global operations. Failure to implement protective security measures could lead to threats such as malware, insider threats, data breaches, and loss of integrity. The rapidly changing world of technology and evolving business models also affect information security. Therefore, information assurance must adapt to current circumstances and change dynamically as the business evolves.

39
Q

Cost of Security

A

Security measures require investment, and it’s important to have a return on that investment. The cost of implementing controls should not exceed the value of the asset being protected. In some cases, organizations may choose to accept certain risks if the cost of risk treatment is too high. It can be difficult to calculate potential losses, particularly with intangible assets such as databases.

40
Q

Information Security - Other consideration

A

The growth of technology and internet usage has led to an increase in cybercrime. Good information security measures can reduce the risk of becoming a victim of cybercrime. Having an Information Management Security System (ISMS) in place can help standardize security policies and ensure compliance with regulations. A good security program can improve working practices, promote secure ways of working, reduce costs, and act as a market differentiator for businesses. Information security should be part of company policy and should involve everyone from senior management to the shop floor.

41
Q

Cyberspace - Cybersecurity

A

Cyberspace refers to the virtual domain of digital networks, which consists of interconnected computer systems, servers, and other electronic devices. It is a complex and dynamic environment that allows for the creation, storage, modification, and sharing of information and data through various forms of communication. This includes the internet, as well as other digital systems and platforms that support business operations, infrastructure, and services. Cyberspace is constantly evolving and has become an essential part of modern society, affecting virtually all aspects of life, from communication and commerce to national security and defence.

Cybersecurity the practice or science or protecting Cyberspace from accidental or deliberate loss or harm.