Week 1 Flashcards

(13 cards)

1
Q

What are the three key elements of Information Security Management (ISM)?

A

-Information Risk Management
-Information Security Management System (ISMS)
-Standards and Best Practices (e.g., ISO 27000 series)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define the CIA triad in information security.

A

-Confidentiality: Protecting information from unauthorized access.
-Integrity: Ensuring information is accurate and unaltered.
-Availability: Ensuring information is accessible when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a threat and a vulnerability?

A

-Threat: A potential cause of an incident (e.g., hacker, natural disaster).
-Vulnerability: A weakness that can be exploited by a threat (e.g., unpatched software).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the four risk management controls.

A

-Eliminate (risk avoidance)
-Reduce (risk reduction)
-Transfer (risk transfer)
-Accept (risk acceptance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of an ISMS?

A

An ISMS (Information Security Management System) is designed to protect a company’s important information by managing risks like hacking, leaks, or loss.

In simple terms:
It keeps information safe by setting rules, processes, and checks to prevent problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the key characteristics of ISO 27001?

A

-Asset-focused
-Risk-driven
-Process-oriented (continuous improvement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the relationship between ISO 27001 and ISO 27002?

A

ISO 27001 is the standard that tells you what you must do to set up an Information Security Management System (ISMS).

ISO 27002 is a guide that gives you ideas and details on how you can do it.

In short:
👉 ISO 27001 = what you need to do
👉 ISO 27002 = how you can do it

ISO 27001 says you must control who can access important data, and ISO 27002 suggests how you can do that, like using passwords, ID cards, or fingerprint scanners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the focus of ISO 27004?

A

Measuring the effectiveness of ISMS processes and controls (e.g., log analysis, incident statistics, training records).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four steps in the ISO 27005 risk management process?

A

Risk Identification
Risk Analysis
Risk Evaluation
Risk Treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are three criticisms of ISO 27001?

A

-Seen as a “checkbox exercise” without real security improvement.
-Scope can be limited to avoid broader security issues.
-Some requirements are vague, leading to subjective implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name two companies with ISO 27001 certification.

A

Amazon Web Services (AWS)
(Example: Microsoft, IBM, or others mentioned in class)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name 3 security metrics.

A
  • % of patched devices
  • Number of intrusion attempts
  • Time to detect, respond, and recover from threats (MTTD, MTTR, etc.)
  • Phishing success rate
  • Cost per security incident
  • Results of staff training
  • Virus scan results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Outline what is covered in each of the standards in the 27000 series and explain their importance.
27001
27002
27004
27005

A

27001- ISMS requirements
What it covers: Rules for setting up and running an information security system (ISMS).
Why it matters: It’s the main standard for keeping information safe and getting certified.
27002- Security controls
What it covers: A list of best practices and controls to protect information.
Why it matters: Helps you choose and apply the right security measures.
27004- Measuring ISMS
What it covers: How to measure and check if your ISMS is working well.
Why it matters: Helps you track performance and make improvements.
27005- Risk management
What it covers: Steps to identify and manage security risks.
Why it matters: Helps you focus on the biggest threats and reduce harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly