IS Governance & Risk Management Flashcards

1
Q

Availability

A

Availability: Reliable and timely access to data and resources is provided to authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Integrity: Accuracy and reliability of the information and systems are provided and any unauthorized modification is prevented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

Confidentiality: Necessary level of secrecy is enforced and unauthorized disclosure is prevented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shoulder surfing

A

Viewing information in an unauthorized manner

by looking over the shoulder of someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social engineering

A

Gaining unauthorized access by tricking someone

into divulging sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What controls can be implemented to protect data confidentiality?

A

Confidentiality
• Encryption for data at rest (whole disk, database encryption)
• Encryption for data in transit (IPSec, SSL, PPTP, SSH)
• Access control (physical and technical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What controls can be implemented to protect asset integrity? Including

  1. Data integrity
  2. System integrity
  3. Process Integrity
A
  1. Hashing (data integrity)
  2. Configuration management (system integrity)
  3. Change control (process integrity)
    • Access control (physical and technical)
    • Software digital signing
    • Transmission CRC functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What controls can be implemented to ensure asset availability?

A
  • Redundant array of inexpensive disks (RAID)
  • Clustering
  • Load balancing
  • Redundant data and power lines
  • Software and data backups
  • Disk shadowing
  • Co-location and off-site facilities
  • Roll-back functions
  • Fail-over configurations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability

A

Weakness or lack of countermeasure.
Can be software, hardware, a procedural, or human weakness that can be exploited.

e.g. service running on a server, unpatched applications or operating systems, an unrestricted wireless access point, an open port on a firewall,
lax physical security that allows anyone to enter a server room, or unenforced password
management on servers and workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Agent

A

An entity that can exploit a vulnerability
e.g.
• an intruder accessing the network through a port on the firewall
• a process accessing data in a way that violates the security policy
• a tornado wiping out a facility
• an employee making an unintentional mistake that could expose confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat

A

The danger of a threat agent exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk

A

The probability of a threat agent exploiting a vulnerability and the associated business impact.

e.g.
• If a firewall has several ports open, there is a higher likelihood that an intruder will use one to access the network in an unauthorized method.
• If users are not educated on processes and procedures, there is a higher likelihood that
an employee will make an unintentional mistake that may destroy data.
• If an intrusion detection system (IDS) is not implemented on a network, there is a higher likelihood
an attack will go unnoticed until it is too late.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Control

A

Safeguard/countermeasure that is put in place to reduce a risk.

A countermeasure may be a software configuration, a hardware device, or a procedure that eliminates a vulnerability or that reduces the likelihood a threat agent will be able to exploit a vulnerability.

e.g.
• strong password
• management, firewalls, a security guard, access 
• control mechanisms, encryption, and
• security-awareness training.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Exposure

A

Presence of a vulnerability, which exposes the organization to a threat.
e.g.
• If password management is lax and password rules
are not enforced, the company is exposed to the possibility of having users’ passwords
captured and used in an unauthorized manner.
• If a company does not have its wiring
inspected and does not put proactive fire prevention steps into place, it exposes itself to
potentially devastating fires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Relationship between security concepts

A

A threat agent > gives rise to a threat > which exploits a vulnerability > leading to a risk > which can damage an asset > and cause an exposure > Can be countermeasures by a safeguard/control > which directly affects the threat agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three types of controls required to provide defence-in-depth

A

• Administrative/Management controls
Management-oriented e.g. security documentation, risk management, personnel security, and training
• Technical/Logical controls
Software or hardware components, as in firewalls, IDS, encryption, identification and authentication mechanisms.
• Physical/Operational controls
Items put into place to protect facility, personnel, and resources e.g.security guards, locks, fencing, and lighting

17
Q

Six functionalities of controls

A
  • Deterrent Intended to discourage a potential attacker
  • Preventive Intended to avoid an incident from occurring
  • Detective Helps identify an incident’s activities and potentially an intruder
  • Corrective Fixes components or systems after an incident has occurred
  • Recovery Intended to bring the environment back to regular operations
  • Compensating Controls that provide an alternative measure of control
18
Q

Defence-in-depth

A

Defense-in-depth

Implementation of multiple controls so that successful penetration and compromise is more difficult to attain

19
Q

Security through obscurity

A

Relying upon the secrecy or complexity of

an item as its security, instead of practicing solid security practices.

20
Q

FRAP

A

Facilitated Risk Analysis Process (FRAP) A focused, qualitative approach that carries out prescreening to save time and money

21
Q

OCTAVE

A

Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Team-oriented approach that assesses organizational and IT risks through facilitated workshops.

22
Q

ISO/IEC 27005

A

ISO/IEC 27005 International standard for the implementation of a risk management program that integrates into an information security management system (ISMS).

23
Q

Failure Modes and Effect Analysis

A

Approach that dissects a component into its basic functions to identify flaws and those flaws’ effects.

24
Q

CRAMM

A

CRAMM Central Computing and Telecommunications Agency Risk Analysis and Management Method.

25
Q

Data classification procedures

A
  1. Define classification levels.
  2. Specify the criteria that will determine how data are classified.
  3. Identify data owners who will be responsible for classifying data.
  4. Identify the data custodian who will be responsible for maintaining
    data and its security level.
  5. Indicate the security controls, or protection mechanisms, required for
    each classification level.
  6. Document any exceptions to the previous classification issues.
  7. Indicate the methods that can be used to transfer custody of the
    information to a different data owner.
  8. Create a procedure to periodically review the classification and
    ownership. Communicate any changes to the data custodian.
  9. Indicate procedures for declassifying the data.
  10. Integrate these issues into the security-awareness program so all employees
    understand how to handle data at different classification levels.