Week 2 Flashcards

1
Q

Core of any business Security structure?

A

Security Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What serves as foundation of a corporations security program?

A

Core Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Potential loss or harm related to technical infrastructure, use of technology, or reputation of an organization.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 main security objectives?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Weakness that may provide an entry point for an attacker leading to unauthorized access?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any potential danger to information or systems?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Someone or something who will take advantage of a known vulnerability

A

Threat Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Likelihood of a threat agent taking advantage of a vulnerability to cause harm to an asset

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Instance of being exposed to losses from a threat agent

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Parameters, safeguards, or countermeasures implemented to protect data ,infrastructure, and people in an organization

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a documented set of your organization’s information security policies, procedures, guidelines, and standards.

A

Security Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False. Security Administration can be single individual or teams?

A

True, based on size and requirement of company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 Types of Control

A

Administrative, Technical, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of control are these included?

Developing and publishing of policies, standards, procedures and guidelines

Risk Management

Screening personnel

A

Administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Also called Logical controls; This includes configuration of security devices & infrastructure, implement and maintain access control mechanisms

A

Technical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tangible Mechanisms, Protecting perimeter of data center.

A

Physical Controls

17
Q

Lack of understanding typically leads to believing your opponent (attacker) is less intelligent that you

A

Security Through Obscurity

18
Q

3 areas of Security Planning

A

Operational (Short Term), Tactical (mid term), strategic (long term)

19
Q

all of the tools, personnel and business processes that ensure that security is carried out to meet an organization’s specific needs”

A

Information security governance

20
Q

structures, systems, and practices an organization has in place

A

Governance

21
Q

What is the meaning of CobIT

A

Control Objectives for Information Technology

22
Q

From what framework was cobIT derived?

A

COSO framework

23
Q

First Latest version of CobIT

A

1996 and 2019, respectively

24
Q

Six principles of CobIT

A
  1. Meet stakeholder needs,
  2. Holistic approach,
  3. Dynamic governance system,
  4. Distinct governance from management,
  5. Tailored to enterprise needs,
    6.End-to-end governance system
25
Q

Defines goals for the controls that should be used to properly manage IT

A

CobIT

26
Q

4 domains of CobIT

A
  1. Plan and Organize
  2. Acquire and Implement
  3. Deliver and Support
  4. Monitor and Evaluate
27
Q

5 COSO Areas

A

Control Environment
Risk Assessment
Control Activities
Information and Communication
Monitoring

28
Q

What does CobIT and COSO identify?

A

What is to be achieved?

29
Q

De facto standard of best practices for IT

A

Information Technology Infrastructure Library (ITIL)

30
Q
A