Sybex Chps 1-7 Flashcards
(122 cards)
Integrity is dependent on what?
Confidentiality
Availability
Confidentiality
Without confidentiality then integrity cannot be maintained.
Availability depends on what?
Confidentiality
Integrity
Both.
Without Integrity and Confidentiality, Availability cannot be maintained.
True / False
Identification and authentication are always used together as a single two-step process
True
Should layers be used in serial or in parallel?
Serial - these are very narrow but deep configurations
__________ simplifies security by enabling you to assign controls to a group of objects collected by type or function.
Abstraction
True or False
Security governance is the implementation of a security solution and a management method that are loosely connected.
False
Security governance is the implementation of a security solution and a management method that are TIGHTLY connected.
It is the responsibility of __________ to flesh out the security policy into standards, baselines, guidelines, and procedures.
Middle Management
Security management is a responsibility of
Upper Management
Developing and implementing a security plan is evidence of __________ on the part of senior management.
Due Care
Due Diligence
Both Due Care and Due Diligence
Long term plan that is fairly stable (5 years of so)
Strategic Plan
Tactical Plan
Operational Plan
Strategic Plan
Short-term plan, highly detailed
Strategic Plan
Tactical Plan
Operational Plan
Operational Plan
midterm plan (about a year)
Strategic Plan
Tactical Plan
Operational Plan
Tactical Plan
Change Management is a requirement for systems complying with what classifications of ITSEC?
B2, B3, A1
True of False
Change Management requires:
1) Detailed inventory of every component and configuration
2) collection and maintenance of complete documentation for every system component
True
True or False
Data Classification is used to determine how much effort, money, and resources are allocated to protect data and control access to it.
True
What are the seven major steps to implement a classification scheme?
- Identify the custodian
- Specify the evaluation material
- Classify and label each resource
- Document any exceptions
- Select the security controls
- Specify procedures for declassifying resources / transferring custody
- Create an enterprise-wide awareness program
Will cause significant effects / critical damage
Top Secret Secret Confidential Sensitive but Unclassified Unclassified
Secret
Will cause drastic effects / grave damage
Top Secret Secret Confidential Sensitive but Unclassified Unclassified
Top Secret
Will cause noticeable effects / serious damage
Top Secret Secret Confidential Sensitive but Unclassified Unclassified
Confidential
Does not compromise or cause any noticeable effects
Top Secret Secret Confidential Sensitive but Unclassified Unclassified
Unclassified
In the private sector classification levels, which level is used for private or personal nature?
Confidential
Private
Sensitive
Public
Private
In the private sector classification levels, which level is sometimes labeled proprietary?
Confidential
Private
Sensitive
Public
Confidential
In the private sector classification levels, which level may contain medical information or PHI?
Confidential
Private
Sensitive
Public
Private
Responsible for understanding and upholding the security policy by following the prescribed operational procedures and operating within defined security parameters.
Security Professional Data Owner Data Custodian User Auditor
User