Information Security & Awareness Midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

information security governance (ISG)

set of practices in organization that align security strategies with business objectives to ensure objectives are achieved, verify that resources are used responsibly, and define responsibility and accountability so that the organization can achieve an acceptable level of risk

threat agent

source that has the potential of causing a threat

threat

those who would seek to misuse or abuse it

__________, a critical part of an organization's culture, is critical for effective information security governance.

tone at the top

Which of the following is a flaw, loophole, oversight, or error that makes an organization susceptible to attack or damage?

vulnerability

Acme Corp. is conducting a business impact analysis for the threat of ransomware impacting its organization. The company determines that there is a 1 percent risk of a significant ransomware attack in any given year. Overall annual revenue for the company is valued at $10,000,000 and estimates are that a large ransomware attack would cause approximately $1,000,000 in damage. What is the single loss expectancy (SLE) in this scenario?

$1 millon

Components of Reactive Policies:

-New Threat/Attack -New Policy/Defense -Threat Analysis

top four cybersecurity frameworks

-PCI DSS: 47% -ISO 27001/27002: 35% -CIS Critical Security Controls: 32% -NIST Framework for Improving Critical Infrastructure Security: 29%

ten domains for cybersecurity capability maturity model

-Risk Management: RM -Asset, Change, and Configuration Management: ACM -Identity and Access Management: IAM -Threat and Vulnerability Management: TVM -Situational Awareness: SA -Information Sharing and Communications: ISC -Event and Incident Response, Continuity of Operations: IR -Supply Chain and External Dependencies Management: EDM -Workforce Management: WM -Cybersecurity Program Management: CPM

gray area: PII or Non-PII?

-anomyzed data that is de-anomyzed (IP address linked to domain name that identifies person) -non-PII that, when linked with other data, can effectively identify person - persistent identifiers (geolocation data; site history and viewing patterns)

four responses to risk

-avoid: ending activites that place enterprise within reach of associated threat -mitigate: changing affected business processes or implementing new controls -transfer/share: outsourcing process or insuring against potential cost -accept; acknowledging it and moving on without further action

impact on security policy

-can't write level 4 policies and standards if you are level 2 organization (unless you are writing for future) -can't write level 2 policies and standards if you need to be level 4 organization (and expect to get there quickly) -can't write level 2 policies and standards if you are level 3 organization

risk

-combination of probability (or frequency) of event and its consequences (or magnitude) -possibility of loss or injury...potential of gaining or losing something of value

maturity model involves five aspects:

-commitment to perform -ability to perform -activities performed -measurement and analysis -verifying implementation

procedures

-consist of step-by-step instructions to assist workers in implementing various policies, standards, and guidelines -specific step-by-step instructions to properly operate control or execute process -could be written instruction on how to configure auditing on server, run vulnerability scanner, or implement firewall rule

why is privacy important?

-data is corporate asset -corporate data is at higher risk of theft or misuse than ever before -companies have obligations to protect data

effective policy should:

-define information as company asset -underscore importance of information as asset -set rules of behavior in handling information asset -describe how to report suspected policy violation -articulate consequences of policy violations -authorize investigation of policy violations

key elements of ISG

-defined organizational alignment and structure (where does security live and why; what is the purpose of your security organization) -policies and procedures -awareness and training -technical security controls and countermeasures -auditing, monitoring, and metrics

standards

-describes implementation and management of information security controls -provides information security control to meet required specifications, including those for meeting specific industries or regulatory compliance objectives

IT risk management

-developing collection of IT risk scenarios -reduces risks by defining and controlling threats and vulnerabilities

quantitative

-does more complex calculations -mathematical and statistical calculations -uses independently verifiable and objective metrics -allows cost/benefit analysis -easier to automate -used in risk management performance tracking -without automated tools, process is very difficult -more preliminary work is needed to gather detailed information about environment

attributes of good policies:

-endorsed: policy has support of management -relevant: policy is applicable to organization -realistic: policy makes sense -attainable: policy can be successfully implemented -adaptable: policy can accommodate change -enforceable: that administrative, physical, or technical controls can be put in place to support policy -inclusive: policy scope includes all relevant parties, areas, and technologies

benefits of effective IS governance

-ensure security of assets (information and technology) -provide framework for security (codifies the desired security level; ability to measure current security posture; helps keep practices up to date) -communicate cybersecurity requirements with stakeholders (assists in prioritizing improvement activities; enables investment decisions to address gaps) -provides mechanism to assess risk

four main objectives to risk governance:

-establish and maintain common risk view -integrate risk management into enterprise -make risk-aware business decisions -ensure that risk management controls are implemented and operating correctly

strategic metrics

-every policy should be measurable -every statement should have defined metrics that signal when it is being followed/executed well and when it is not

purpose of risk analysis

-identify threats to business processes and information systems -justify implementation of specific countermeasures to mitigate risk

planning an intentional methodology for constructing security program:

-identifying our important assets -identifying potential threats against them -assessing vulnerabilities that we have present -taking steps to mitigate these risks

security governance framework

-information security risk management methodology -comprehensive security strategy explicitly linked with business and IT objectives -effective security organizational structure -security strategy that talks about the value of information protected -security policies that address each aspect of strategy, control and regulation -complete set of security standards for each policy to ensure that procedures and guidelines comply with policy -institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk -process to ensure continued evaluation and update of security policies, standards, procedures and risks

mitigating risk

-inherent risk represents amount of risk that exists before mitigation -residual risk is amount of risk that remains after controls (countermeasures) are implemented -Total Risk - Countermeasures = Residual Risk

5 maturity levels

-initial -managed -defined -quantitatively managed -optimizing

why focus on risk

-management of organizational risk is key element in organization's information security program -provides effective framework for selecting appropriate security controls for system (security controls necessary to protect individuals and operations and assets of organization)

governance application to information security (three dimensions)

-organizational culture -business process structure -business operations

two types of information

-personally identifiable information (PII) can be linked to specific individual (name, email, full postal address, birth date, SSN, driver's license number, account numbers) -non-personally identifiable information (non-PII) cannot, by itself, be used to identify specific individual (aggregate data, zip code, area code, city, state, gender, age)

intro to policy framework (bottom up pyramid)

-policy (sets high-level expectations) -control objective (identifies desired conditions to be met) -standard (assigns quantifiable requirements) -procedure (establishes proper steps to take) -guideline (provides additional, recommended guidance)

information security policy is directive that defines how organization is going to:

-protect organization, its employees, its customers, and vendors from harm resulting from intentional or accidental damage, misuse, or disclosure of information -protect integrity of information and ensure availability of information systems -ensure compliance with legal and regulatory requirements

structuring the organization

-protect, shield, defend, and prevent -monitor, hunt, detect, -respond, recover, sustain -management, governance, compliance, education, risk management

qualitative

-requires no calculations -involves higher degree of estimating -provides generalities and indications of risk -does not allow cost/benefit analysis -based on opinions of individuals -eliminates opportunity to create dollar value for cost/benefit analysis -hard to develop security budget from results

potential contents of policy

-scope: should address all information, systems, facilities, programs, data, networks and all users of technology in organization, without exception -information classification: should provide content-specific definitions rather than generic confidential or restricted -management goals: place of policy in context of other management directives and supplementary documents (is agreed by all at executive level, all other information handling documents must be consistent with it) -supporting documents: include references to supporting documents (roles and responsibilities, process, technology standards, procedures, guidelines) -specific instructions: include instruction on well-established organization-wide security mandates -responsibilities: outline specific designation of well-established responsibilities (technology department is sole provider of telecommunications lines) -consequences: include consequences for non-compliance (up to and including dismissal or termination of contract)

purpose of cybersecurity policy

-to clearly and unambiguously express goals and objectives as well as boundaries for security management and security solutions -to define role and scope of cybersecurity within general information security

why do we need policy?

-to influence and guide present and future decision making -define acceptable use of enterprise assets -ensure consistency in protection efforts across enterprise -Cover Your Assets (legal, ethical, compliance) -should be at center of risk assessment/management, security planning, auditing, and compliance processes

applying ISG as security professional

-understand organization's goals -identify risk within those goals (quantify/qualify those risks) -understand your current cybersecurity capabilities (what do you do well, where are your gaps) -communicate security and risk to internal stakeholders in terms they understand -help them make decisions about how to treat risks in appropriate manenr -understand company culture and match security culture to company culture

What is at risk?

Ability to offer, fulfill your "Brand Commitment"

When faced with a risk, there are generally four possible responses for addressing that risk. The four choices are Avoid, Mitigate, Transfer, or ________.

Accept

calculating risk

Annualized Loss Expectancy (ALE) = Single Loss Expectancy (SLE) * Annualized Rate of Occurrence (ARO)

The three primary concepts in information security are Confidentiality, Integrity, and ___________.

Availability

What is at risk?

Business continuity and resilience

ISG tasks maintain ___ and ___ across all information systems, employees, and resources in the organization

CIA and PSR

What is at risk?

Competitive advantage; market and investor confidence

Traditional Security Focus (CIA)

Confidentiality, Integrity, Availability

What is at risk?

Customer retention and growth

how much security is enough

Determine: -adversary (means, motives, and opportunity) -asset value -threats -vulnerabilities -resulting risk -countermeasures -risk appetite

What is at risk?

Ethics and duty of care

(T/F) Risk Management is the practice of passing on the risk in question to another entity, such as an insurance company.

False

Five possible motivations for threat actors (i.e., hackers, attackers) who target companies from an information security perspective are wrath, ideology, opportunity, glory and __________.

Gain

Which one of the motivations from the previous question is behind most of the breaches in the last year?

Gain

Related to the concept of risk governance, one of the four objectives of risk governance is:

Integrate risk management into the enterprise.

Impact of digital, social and convergence of IoT (PSR)

Privacy, Safety, Reliability

What is at risk?

Relationships with business partners

R = L * I (qualitative definition)

Risk = (Likelihood/probability of incident occurring) * Impact of Incident

A formal security strategy is implemented in part by developing and deploying comprehensive ________________ that reflect the objectives of the organization and address each element of the strategy.

Security policies

IT risk

The business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise.

(T/F) Two social/technical/business trends that have led to the importance of Privacy, Safety and Reliability in the information security domain are the Internet of Things and digital business enablement.

True

(T/F) Information security is defined as "protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction," according to US law.

TrueThe three primary concepts in information security are Confidentiality, Integrity, and ___________.

What is at risk?

Trust - Reputation, brand, image

Five things why people do bad things

Wrath, Gain, Glory, Ideology, Opportunity

attack

action intending harm by exploiting vulnerability

countermeasures and safeguards

action or control that mitigates potential risk

risk governance

actions, processes, traditions and institutions by which authority is exercised and decisions are taken and implemented; applies principles of identification, assessment, management and communication of risks

risk appetite

amount of risk that enterprise prefers to accept as it pursues its objectives

threat

any potential danger to information or an information system

strong security culture

both mindset and mode of operation; integrated into day-to-day thinking, business processes and decision making

what's the potential harm?

breaches of data privacy, data security can result in: -damage to reputation -disruption of operations -legal liability under new and amended laws, regulations, and guidelines, as well as under contracts -financial costs

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?

confidentiality

IT risk scenario

description of IT-related event that can lead to loss event that has business impact, when and if it should occur

quantitative risk analysis

determine asset value > calculate exposure factor > calculate SLE > assess annualized rate of occurrence > determine annualized loss expectancy

risk management

discipline for governing possibility that future events may cause harm; reduces risks by defining and controlling threats and vulnerabilities

policy

document that records high-level principle or course of action that has been decided on

One of the chief reasons to develop a formal information security program is to __________________________.

ensure the security of information assets.

why is writing policy hard

every company's risk appetite, culture, business processes, legal requirements, customer expectations, leadership, structure, control structure and technology is different

risk tolerance

extent that actual risk can be permitted to deviate from (exceed) risk appetite

vulnerability

information system weakness that could be exploited

risk

likelihood of unwanted event occurring

governance

mechanisms, processes, rights, responsibilities, policies, decision making, and objective setting that determine how an entity is controlled and directed

__________ are risks that are associated with the day-to-day operation of the business and its operational and administrative processes.

operational risk

asset

our information/data, and the systems that hold it

residual risk

portion of risk that remains

information technology risk

possibility of loss or injury related to use of computers to store, retrieve, transmit, and manipulate data, or information, often in context of business or other enterprise

security risk

potential that an asset will be compromised and thereby cause harm to an organization, customers, employees, the public

Security Risk Analysis

process of identifying assets, identifying and assessing vulnerabilities, and determining threats

risk analysis

process of prioritizing risks for further analysis or action by assessing and combining their probability of occurrence and impact

cyber security

protecting our assets from threats to the best extent we reasonably can, given our environment and tolerance for risk

asset

resource (physical or logical) that is valued by organization

risk formula

risk = asset (value) + threat + vulnerability

Effective governance starts with defining the enterprise _________, the amount of risk that the enterprise prefers to accept as it pursues its objectives.

risk appetite

The primary vehicle of tracking risks and the remediation of them is _______

risk register

Your company recently purchased a cybersecurity insurance policy that will cover your organization's expenses in the event of a data breach. What risk management strategy is your company pursuing?

risk tolerance

maturity model

set of characteristics, attributes, indicators, or patterns that represent capability and progression in particular discipline


Conjuntos de estudio relacionados

ευκαρυωτικα κυτταρα

View Set

Chapter 41: Gastrointestinal Dysfunction

View Set

Italian Short Answer Summary unit 1

View Set

Big Ideas Math Geometry Chapter 8 :: Postulates, Properties, & Theorems 21/22

View Set

RAD 101, Chapter 4 Elbow and Humerus

View Set

International Organization and Co-op

View Set