S3-m2 Flashcards
COSO objectives
operations, reporting, compliance
Operational Objectives
Include performance measures and safeguards that can help increase the likelihood that an organizations IT assets are protected against cybersecurity threats and fraud
Reporting Objectives
Related to increasing the likelihood that cybersecurity controls are in place so that they do not affect internal and external financial and nonfinancial reporting. Focus of transparency, reliability, timeliness, and trustworthiness
Compliance Objective
Based on adherence to governmental laws and compliance regulations. Compliance with industry standards such as those issued by NIST
Control Environment
the tone at the top
-sets ethical values for an organization by creating a top down approach
Risk Assmesment
Performing risks assessments to evaluate internal and external factors. Applied to cyber threats by tailoring the organizations risk assessment procedures to analyze cyber risks, likelihood of occurrence and the magnitude of their impact
Control Activities
Policies and procedures put in place to help to determine whether the tone at the top set by the control environment is being implemented at all levels of the organization
Information and Communication
Focuses on using consistent and relevant language, following best practices for sharing information, and communicating internally and externally with the right stakeholders
-BIA reports reviewed by management that outline the impact of interrupting key business functions
-Periodic emails addressing cybersecurity internal controls to the entire company
Monitoring Activities
Component that should be practiced on an ongoing basis to identify areas of risk vulnerability and to determine effectiveness and efficiencies.
-penetration testing
-vulnerability scanning
-Periodic phishing reports
Uppermost level of an security rules
security policies, which serve as an overview of an organizations security needs and strategic plan for what should be implemented
Mid level of security rules
set of standards that organizations use as a benchmark to accomplish the goals defined by the security policies
Bottom level of security rules
Standard operating procedures that are typically detailed documents that specially outline how to perform business processes
Acceptable Use Policy (AUP)
A control document created by an organization to regulate and protect technology resources by assigning varying levels of responsibilities to job roles, listing acceptable behaviors by employees and vendors, specifying consequences for those who violate the AUP
-Definition, scope, and purpose
-acceptable use of personal devices of business activities
Bring your own device (BYOD)
allows employees to use their personally owned devices for work related activities. It may include some of the same elements as an AUP but will address monitoring and enforcment of actions on personnel devices
What is a network?
a system of physical and virtual devices that are connected using wired cables or wireless technology that communicate using a mix of different protocols so that users can send, receive, and store data.
What is a security standard?
organizational requirements that are either mandatory by law or adopted by companies as guidelines for best practices. the next level of security rules beneath policies that serve as a course of action to achieve security polices
Standard Operating Procedures (SOPs)
The lowest level of documentation that provide detailed instructions on how to perform specific security tasks or controls. These SOPs usually involve a combination of systems, software, and physicals actions so that goals of the security policy and standards are achieved
Access Point (AP)
Network Hardware
a wireless connection point for users to directly connect to a wired network using wireless devices
Bridges
Network Hardware
connects separate networks that use the same protocol, even if those networks have different topologies or transmission speeds. Operate at the data link layer
Computers
Network Hardware
are user endpoint devices that are the primary mean of user interaction with a network
Gateway
Network Hardware
Connects multiple networks that use different protocols, translating one protocol to another so that the two networks can interact. Can operate in all layers but generally in the application
Hub
Network Hardware
Connection points that link multiple systems and devices using the same protocol within a single network
Mobile Phones and Tablets
Network Hardware
Devices that are another means through network connection
Modems
Network Hardware
Devices that modulate between digital info and analog signal to support networks.