Security Risk and Management Flashcards
What are the three pillars of Information Security? (Information Security Triad)
Confidentiality, Integrity and Availability (C.I.A)
Can you define Confidentiality?
Property that information is not made available or disclosed to unauthorised individuals, entities or processes.
Can you define Integrity?
Property of accuracy and completeness.
Can you define Availability?
Property of being accessible and usable upon demand by an authorised entity.
What is an ISMS?
Information Security Management System
What does PDCA stand for?
Plan, Do, Check, Act.
What does IAAA stand for?
Identification, Authentication, Authorisation (Permissions) Auditing.
Define due care.
The care that are reasonable person would use in order to approach a problem or a concern. Under any given certain circumstances, what are the actions I would engage in, in order to deal with the concern of a problem.
List five qualities a Control Framework must be?
- Consistent - In approach and application.
- Measurable - To determine progress and set goals.
- Standardised - Results can be compared within & between organisations.
- Comprehensive - Should cover minimum requirements and be extensible.
- Modular - Allow changes to be easily incorporated.
List five qualities a Control Framework must be?
- Consistent - In approach and application.
- Measurable - To determine progress and set goals.
- Standardised - Results can be compared within & between organisations.
- Comprehensive - Should cover minimum requirements and be extensible.
- Modular - Allow changes to be easily incorporated.
Name an example of an ISMS?
ISO270001
What does an ISMS consist of?
Policies, Procedures, Guidelines, and Associated Resources and Activities, in the pursuit of protecting its assets.
What are missing words?
An ISMS is a systematic approach for establishing, _________, __________, ___________, ____________, __________ and ___________ an organisation’s information security to achieve business objectives.
implementing, operating, monitoring, reviewing, maintaining and improving
Explain the difference between “due care” and “due diligence’.
Due Care
- Conduct that a reasonable and prudent person will exercise in a particular situation.
Due Dilidence
- Similar to due care but usually pre-emptive
- The processes undertaken to ensure that a course of action is prudent and within risk appetite before committing to the action
- Will lead to due care being observed
Give some exmaples of due diligence?
- Background checks for employees
- Credit checks of business partners
- Information system security assessments
- Risk assessments of physical security systems
- Penetration tests
- Contingency testing of backup systems
- Checking the availability of company IP on the internet
What does GRC stand for?
Governance, Risk Management and Compliance.
What is COBIT and who is the entity that maintains it?
COBIT is a governance framework managed by ISACA.
Risk Management is the systematic process used to identify, ________, _________, remedy and _________ risk.
analyse, evaluate, monitor
As a result of risk management, what options does the organisation have to deal with risk?
The result of the risk management processes that an organisation will either mitigate, transfer, accept or avoid a particular risk.
Define a computer crime?
The use of a computer to take or alter data, or to gain unlawful use of computers or services.
- The threat can be from internal or external sources
Examples include:
- Sale of IP or personal information
- Malware or Ransomware
- Fraud
- Hacking - attacking CIA of systems
Provide a definition of a ‘patent’?
A patent is a legally enforceable right to exclude others from practising the invention for some length of time - usually 20 years.
- Must make the invention public during the patent process.
Provide a definition of a ‘trademark’?
A trademark is a recognisable sign, design or expression which identifies products or services.
What is copyright?
A copyright covers the expression of ideas rather than the ideas themselves and usually protects artistic property such as writing, recordings, databases and computer programs.
- Usually protected for life of the author, plus 50-100 years.
What is a trade secret?
A trade secret usually refers to the proprietary business or technical information, processes, designs, practices, etc., that are confidential and critical to the business.
- The Coca-Cola formula