SPP Reset Flashcards

(39 cards)

1
Q

What should an Information Security Policy cover?

A
  • Cover end-to-end security processes across the organization
  • It should be enforceable, practical, regularly updated in response to business needs and evolving threats, and focused on business goals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three levels of security documentation?

A
  • Policies, Standards, Procedures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policies, Standards, Procedures.

A
  • Policies (high level business rule, the WHAT)
    The what? The purpose?
  • Standards (the HOW?)
    The how, who will implement, who is responsible, who will be affected)
  • Procedures-Technical Controls
    Step by step instruction that people will follow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the 3-2-1 rule for backup entail?

A

3 copies, 2 media/medium, 1 copy off site

This rule ensures data redundancy and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristics of Information Security Policies?

A

Should not be optional, should not refer to specific technical platforms, they act as a contract between the organization and stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Characteristics of Security Standards

A

provide the necessary level of detail to make a security policy practical across the entire organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four types of Information Security?

A
  • Application Security
  • Network Security
  • Cloud Security
  • Cryptography

These types address various dimensions of security needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why do companies need to meet information security standards?

A
  • Prevent Cyber Attacks
  • Increased awareness of risk
  • Enhanced reputation
  • Legal trouble/fines

Compliance with standards helps mitigate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two primary Information Security Standards?

A
  • ISO 27001
  • ISO 27002

These standards provide frameworks for managing information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three principles of Information Security?

A
  • Confidentiality - the information is only available to the intended parties
  • Integrity - the information is complete when accessed and/or transferred
  • Availability - the information is immediately available when requested

These principles ensure proper handling of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Characteristics of Security Procedures

A

The procedure would outline a set of steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are key elements of an Information Security Policy?

A
  • Purpose
  • Audience
  • Information Security Objectives
  • Authority and Access Control Policy
  • Data Classification
  • Security Awareness Training
  • Responsibilities and Duties of Employees
  • Encryption policy
  • Data backup policy
  • References to regulations and compliance standards

These elements guide the implementation of the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are best practices for Information Security Management?

A
  • Acceptable use policy (AUP)
  • Access control policy (ACP)
  • Change management policy
  • Incident response (IR) policy
  • Remote access policy
  • Email/communication policy
  • Disaster recovery policy
  • Business continuity plan (BCP)
  • Data classification policy
  • IT operations and administration policy
  • SaaS and cloud policy
  • Identity and access management (IAM) policy
  • Data security policy
  • Privacy Regulations
  • Personal and mobile devices policy

These practices help organizations manage security effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What situations demonstrate the payoff of strong policies, standards, and procedures?

A
  • You experience a breach
  • You have to discipline/dismiss an employee for inappropriate use of technology
  • Vendors demand evidence of your security program
  • A user accidentally gives their credentials to a hacker
  • An entry-level employee makes a bad choice on a firewall setting

These situations highlight the importance of having robust security measures in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What defines Security Culture?

A

Ideas, customs, and social behaviors of a group that influence its security

A strong security culture enhances employee engagement and responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the benefits of a strong Security Culture?

A
  • Increased compliance with protective measures
  • Reduced risk of security incidents
  • Employees identify and report concerns
  • Greater sense of security among employees
  • Enhanced security without large expenditure

A positive culture leads to proactive security behavior.

17
Q

What are the seven dimensions of Security Culture?

A
  • Attitudes
  • Behaviors
  • Cognition
  • Communication
  • Compliance
  • Norms
  • Responsibilities

These dimensions encompass the various aspects that shape an organization’s security culture.

18
Q

What is the general purpose of an information security policy?

A

Establish a general approach to information security

An information security policy serves as a foundational document that guides an organization’s security efforts.

19
Q

What should an information security policy document?

A

Security measures and user access control policies

This documentation is essential for ensuring that all users understand their responsibilities regarding information security.

20
Q

What is a key aim of an information security policy in relation to compromised information assets?

A

Detect and minimize the impact of compromised information assets

Compromised assets include misuse of data, networks, mobile devices, computers, and applications.

21
Q

How does an information security policy protect an organization?

A

Protect the reputation of the organization

A strong security policy helps maintain trust with stakeholders and customers.

22
Q

What legal and regulatory requirements should an information security policy comply with?

A

Legal and regulatory requirements like NIST

Compliance with standards such as NIST ensures that the organization meets industry benchmarks for security.

23
Q

What type of consumer data should an information security policy aim to protect?

A

Consumer’s data, such as credit card numbers

Protecting sensitive consumer information is crucial for maintaining customer trust and legal compliance.

24
Q

What mechanisms should an information security policy provide?

A

Effective mechanisms to respond to complaints and queries related to cyber security risks

This includes addressing concerns about phishing, malware, and ransomware.

25
Fill in the blank: An information security policy should limit access to key information technology assets to those who have an _______.
acceptable use ## Footnote This principle ensures that only authorized users can access sensitive information.
26
* Cover end-to-end security processes across the organization * It should be enforceable, practical, regularly updated in response to business needs and evolving threats, and focused on business goals.
Information Security Policy
27
* Policies, Standards, Procedures.
Three levels of security documentation
28
3 copies, 2 media/medium, 1 copy off site ## Footnote This rule ensures data redundancy and security.
3-2-1 rule for backup
29
Should not be optional, should not refer to specific technical platforms, they act as a contract between the organization and stakeholders
Characteristics of Information Security Policies
30
provide the necessary level of detail to make a security policy practical across the entire organization
Characteristics of Security Standards
31
* Application Security * Network Security * Cloud Security * Cryptography ## Footnote These types address various dimensions of security needs.
Four types of Information Security
32
* ISO 27001 * ISO 27002 ## Footnote These standards provide frameworks for managing information security.
Two primary Information Security Standards
33
* Confidentiality - the information is only available to the intended parties * Integrity - the information is complete when accessed and/or transferred * Availability - the information is immediately available when requested ## Footnote These principles ensure proper handling of information.
Three principles of Information Security
34
The procedure would outline a set of steps
Characteristics of Security Procedures
35
* Purpose * Audience * Information Security Objectives * Authority and Access Control Policy * Data Classification * Security Awareness Training * Responsibilities and Duties of Employees * Encryption policy * Data backup policy * References to regulations and compliance standards ## Footnote These elements guide the implementation of the policy.
Key elements of an Information Security Policy
36
* Acceptable use policy (AUP) * Access control policy (ACP) * Change management policy * Incident response (IR) policy * Remote access policy * Email/communication policy * Disaster recovery policy * Business continuity plan (BCP) * Data classification policy * IT operations and administration policy * SaaS and cloud policy * Identity and access management (IAM) policy * Data security policy * Privacy Regulations * Personal and mobile devices policy ## Footnote These practices help organizations manage security effectively.
Best practices for Information Security Management
37
Ideas, customs, and social behaviors of a group that influence its security ## Footnote A strong security culture enhances employee engagement and responsibility.
Security Culture
38
* Increased compliance with protective measures * Reduced risk of security incidents * Employees identify and report concerns * Greater sense of security among employees * Enhanced security without large expenditure ## Footnote A positive culture leads to proactive security behavior.
Benefits of a strong Security Culture
39
* Attitudes * Behaviors * Cognition * Communication * Compliance * Norms * Responsibilities ## Footnote These dimensions encompass the various aspects that shape an organization's security culture.
Seven dimensions of Security Culture