Term
| ______________ is the identification, measurement, control, and minimization of loss associated with uncertain events or risks. |
|
Definition
|
|
Term
| Risk Management ensures each risk an organization is exposed to is identified and one of which of what four things? |
|
Definition
| Accepted,Mitigated, Transferred or Avoided |
|
|
Term
| The objective of a security program is appropriate _____________. |
|
Definition
|
|
Term
| Which part of the information security triad can be summed up as "protecting secrets"? |
|
Definition
|
|
Term
| Which part of the information security triad can be summed up as "protecting accuracy and authenticity"? |
|
Definition
|
|
Term
| Which part of the information security triad can be summed up as "protecting stability and reliability"? |
|
Definition
|
|
Term
| What are the three parts of the information security triad? |
|
Definition
| Confidentiality, Integrity, and Availability |
|
|
Term
| In order for a security program to be successful, who must be aware of their roles and responsibilities? |
|
Definition
|
|
Term
| ____________ have care or custody of information assets. |
|
Definition
|
|
Term
| ______________________ are responsible for the design, implementation, management, and review of security policies, standards, baselines, procedures, and guidelines. |
|
Definition
| Information Security Professionals |
|
|
Term
| _____________ is responsible for developing and implementing the security plan |
|
Definition
|
|
Term
| _______________ perform tasks such as information classification, setting user access conditions, and deciding on business continuity priorities. |
|
Definition
|
|
Term
| ______________ outlines expectations and requirements relating to proper use of IT resources. |
|
Definition
|
|
Term
| ________________ means giving users the minimum permissions necessary to do their job. |
|
Definition
|
|
Term
| __________ states that users shouldn't have access to information they do not need to do their job |
|
Definition
|
|
Term
| Security only happens by means of _________ and ____________. |
|
Definition
|
|
Term
| _______ Planning focuses on the high-level, long-range requirements of the company's long-term plan |
|
Definition
|
|
Term
| _________ Planning is a mid-term focus on events that will affect the entire organization. |
|
Definition
|
|
Term
| ___________ Planning focuses on "fighting fires" at the keyboard level. |
|
Definition
|
|
Term
| What does holistic security mean? |
|
Definition
| Making security part of everything and not its own thing |
|
|
Term
| What does ISO 27000 cover? |
|
Definition
|
|
Term
| What does ISO 27001 cover? |
|
Definition
| Information Security Management Systems Requirements |
|
|
Term
| What does ISO 27002 cover? |
|
Definition
| Code of practice derived from ISO 17799 and BS 7799 |
|
|
Term
| What does ISO 27003 cover? |
|
Definition
| ISMS implementation guidance |
|
|
Term
| What does ISO 27004 cover? |
|
Definition
| Information Security Measurement |
|
|
Term
| What does ISO 27005 cover? |
|
Definition
| A standard for Information Security Risk Management |
|
|
Term
| What does ISO 27006 cover? |
|
Definition
| Provides guidance for auditing an ISMS |
|
|
Term
| What does ISO 27799 cover? |
|
Definition
| Information Security for health sector organizations |
|
|
Term
| What does functionality refer to? |
|
Definition
|
|
Term
| What does assurance refer to? |
|
Definition
|
|
Term
| ______________ ensures that policy is enforced by mandating how a task will be completed. |
|
Definition
|
|
Term
| ______________ are the benchmarks used to ensure that a minimum level of security is maintained |
|
Definition
|
|
Term
| _____________ are essential because they allow for a basis of for common practices across an organization. |
|
Definition
|
|
Term
| ____________ is something that is of value to an organization |
|
Definition
|
|
Term
| _____________ is a circumstance or event with the potential to cause harm to an IT system |
|
Definition
|
|
Term
| __________ is a potential danger to information or an information system |
|
Definition
|
|
Term
| _____________ is an opportunity for a threat to cause loss |
|
Definition
|
|
Term
| ____________ is a flaw or weakness in system security |
|
Definition
|
|
Term
| ___________ is the probability that a vulnerability will be executed. |
|
Definition
|
|
Term
| ____________ is an action intending harm to a system |
|
Definition
|
|
Term
| ______________ are administrative, technical, or physical measures taken to protect systems |
|
Definition
|
|
Term
| _________________ are controls applied after the fact |
|
Definition
|
|
Term
| _____________ are proactive controls |
|
Definition
|
|
Term
| ________________ includes the factors of threats, vulnerabilities, and current values of assets |
|
Definition
|
|
Term
| _______________ is the amount of risk remaining after countermeasures and safeguards are applied |
|
Definition
|
|
Term
| What are the three phases of risk management? |
|
Definition
| Risk Assessment, Risk Mitigation, Assurance |
|
|
Term
| The Asset Value multiplied by the Exposure factor = ____________ |
|
Definition
|
|
Term
| What is the Annual Rate of Occurrence? |
|
Definition
| The number of times per year that an incident is likely to occur |
|
|
Term
| Multiplying the Single Loss Expectancy by the Annual Rate of Occurrence = ______________ |
|
Definition
|
|
Term
| _________________ theories and approaches are best on outcomes. They try to provide the greatest good for the greatest number of individuals |
|
Definition
|
|
Term
| ______________ theories subscribe to the belief that it is the duty of each person to do good |
|
Definition
|
|
Term
| _____________ states that access to the internet is a privilege. |
|
Definition
|
|
Term
| Would Ethernet be considered a standard or a policy? |
|
Definition
|
|
Term
| Which ISO framework provides information security best practices? |
|
Definition
|
|
Term
| IT systems are normally operated by _______________. |
|
Definition
|
|
Term
| What is the benefit of mandatory vacations? |
|
Definition
| It makes it easier to detect fraud |
|
|
Term
| When should security awareness begin for an employee? |
|
Definition
| On the first day of employment |
|
|
Term
| Guidelines are _____________ |
|
Definition
|
|
Term
| What is the first ISC2 cannon? |
|
Definition
| Protect society, the commonwealth, and the infrastructure |
|
|
Term
| What do assurance mechanisms provide us with? |
|
Definition
| Confidence in the appropriateness of the controls |
|
|
Term
| How should countermeasure cost relate to asset value? |
|
Definition
| The cost should be less than the value |
|
|
Term
| What determines the right amount of security for an organization? |
|
Definition
| The amount of acceptable risk |
|
|
Term
| Information classification is the responsibility of the ______________ |
|
Definition
|
|
Term
|
Definition
| Not mitigating risk and absorbing the cost if it occurs |
|
|