Putting it all together Flashcards
What is the HITRUST Common Security and Privacy Framework
HITRUST is an American Company working to have one framework, one certification, and one assessment as a globally recognized standard for exchanging attestations of trust between organizations public or private. HITRUST CSF normalizes the many different sets of security and privacy requirements, definitions, and controls, starting from the ISO/IEC 27000 family, U.S. government requirements, standards and guidelines such as NIST, HIPAA, and others, along with industry frameworks from COBIT and ITIL.
Why are security control frameworks different from other security governance frameworks
Security control frameworks (SCFs) provide the framework publishers’ minimum acceptable practices for implementation and operation of security controls within their span of activities. eg SWIFT PCI DSS
What actually is a framework?
Frameworks provide a set of principles upon which an organization builds its policies and processes.
Why is ISO 27000 not really applicable when adopting a framework?
Because ISO 27000 provides a general overview of the ISO “family” of standards. It includes such items as terms and definitions.
Within the U.S., the Health Insurance Portability and Accountability Act (HIPAA) was introduced to protect healthcare data. What framework was developed to support HIPAA?
HITRUST. The Common Security Framework (CSF).
Types of investigation
Administrative
Civil
Regulatory
Criminal investigation
International Organization of Standardization (ISO) 223XX Series
standards that define the requirements and guidelines of implementing a Business Continuity Management System in an organization
National Institute of Standards and Technology Special Publication 800-34
Contingency Planning Guide for Federal Information Systems,
What is the MAD
The maximum allowable downtime
BCDR What is read-through
A controlled, isolated role-playing activity, only involving those personnel tasked with disaster recovery or DR responsibilities and activities and a moderator. The participants should gather at a centralised location, such as a conference room, and bring all DR guidance materials
BCDR What is a walkthrough
in a walk-through, instead of staying around a conference table, the participants will walk to each of the locations they will need to visit for response activities, hence the name. They can still refer to written guidance and should be monitored by someone who can record any problems and successes. The walk-through is more beneficial than the tabletop exercise in terms of being able to assess physical limitations for response actions and establish timing for certain activities.
BCDR What is a simulation
A simulation can be thought of as a walk-through exercise with more complexity and involvement. A simulation might involve all personnel in each office or location participating in a scripted emergency situation. An example would be a fire drill where everyone evacuates from the worksite. Simulations can be much more expensive than tabletop or walk-through exercises because they involve more people and activity.
This is by far the most expensive BCDR exercise option, with the greatest impact to the organization and its stakeholders.
Simulation
Is running a parallel test a part of BC testing?
Yes, the business continuity test requires that we have solutions in place that allow business functions to continue. Testing the solution to see if it works would be considered a DR test.
A building evacuation test would be what type of test?
A DR test, as while the building is empty of staff there may be an interruption to business functions.
You are storing corporate data in the cloud. What would identify and control the type of media used to store the data?
A contract. The storage media is an example of one of the elements that might be included within the contract.
Your Internet Service Provider (ISP) has promised you a minimum download speed of 10Gbps. What document is designed to ensure compliance?
A service-level agreement (SLA). The contract will include levels of service.
Acceptable use policies (AUPs) detail, from the user’s expected perspective, the appropriate and approved usage of the organization’s assets, including the IT environment, devices, and data. Policy aspects commonly included in AUPs include the following except which one:
A. Data disclosure
B. Passwords
C. Ethical policies
D. Internet usage
The correct answer is C.
Ethical policies are not part of AUPs. The following policy aspects are commonly included in AUPs:
Data access
System access
Data disclosure
Passwords
Data retention
Internet usage
When should you use qualitative risk assessment
- Newness
- Uniqueness
When should you use quantitative risk assessment
Business process involved with the risks are well understood
Measurement techniques are available
Experience with the process in question will produce a large enough quantity of data samples
ALE = SLE x ARO
ALE = Annual loss expectancy
The annualized rate of occurrence (ARO) is the number of times per year a given impact is expected, expressed as a number.
The single loss expectancy (SLE) is the expected impact related to a particular risk (the risk being assessed).
There are various threat modeling tools, and one of the leading tools is
Microsoft STRIDE
These are the elements of STRIDE:
Spoofing identity: the type of threat wherein an attacker poses as an entity other than the attacker, often as an authorized user.
Tampering with data: when the attacker attempts to modify the target data in an unauthorized way.
Repudiation: when the attacker, as a participant of a transaction, can deny (or conceal) the attacker’s participation in that transaction.
Information disclosure: just like it sounds, this category can include both inadvertent release of data (where an authorized user discloses protected data accidentally to unauthorized users, or gains access to material that their authorization should not allow) and malicious access to data (an attacker getting unauthorized access).
Denial of service (DoS): an attack on the availability aspect of the CIA triad; creating a situation in the target where authorized users cannot get access to the system/application/data.
Elevation of privilege: when an attacker not only gains access to the target but also can attain a level of control with which to completely disable/destroy the entire target system.
Aside from STRIDE name two other threat models
OOCTAVE and TRIKE