Term
The categories of security policies |
|
Definition
corporate security policy major policies (email, hiring, firing, PII) AUP - summarizes key points counter measures |
|
|
Term
|
Definition
specify the DETAILED action that must be taken by specific employess |
|
|
Term
the logical responses to risk |
|
Definition
reduction - adopting active countermeasures acceptance - no countermeasures and absorbing damages transference - having someone else absorb the risk (insurance/outsourcing) avoidance - not partaking in an action that is too risky |
|
|
Term
|
Definition
limits the discretion of people in order to simplify decisions, limit bad decisions and give consistency |
|
|
Term
|
Definition
statements of what should be done under specific situations |
|
|
Term
|
Definition
specifies how to do security planing and implementation |
|
|
Term
|
Definition
things that require a firm to change it's security planing protections and responses |
|
|
Term
|
Definition
describes the details of what is to be done without specifically describing how to do them. (Checklists: save data, but doesn't say through what media) |
|
|
Term
absolute IT security is impossible and companies must think in terms of ___ |
|
Definition
|
|
Term
high level decisions for what should be done are ___ |
|
Definition
|
|
Term
name the aspects of strategic IT security planing |
|
Definition
assess current security ID driving forces ID all resources protected by IT security classify resources by sensitivity |
|
|
Term
units within a firm that are of special importance to IT security |
|
Definition
Ethics/compliance/privacy officers HR legal Auditing (internal, financial, IT) facilities management uniformed security |
|
|
Term
___ requires strong protection for private data in health care organizations |
|
Definition
Health Insurance Portability and Accountability Act (HIPAA) |
|
|
Term
prescriptive statements about what companies SHOULD do |
|
Definition
|
|
Term
in many cases ___ are the weakest links in security protection |
|
Definition
|
|
Term
an element of the architecture at which an attacker can do a great deal of damage by compromising a single system |
|
Definition
single point of vulnerability |
|
|
Term
all of a company's technical countermeasures and how they are organized into complete systems of protection. |
|
Definition
technical security architecture |
|
|
Term
what is most commonly outsourced for security |
|
Definition
|
|
Term
what is the purpose of auditing |
|
Definition
develop opinions on the health of controls, not to find punishable instances of non compliance |
|
|
Term
what is COS and it's objective |
|
Definition
focuses broadly on CORPORATE and internal financial controls - strategic - operations - reporting - compliance |
|
|
Term
Possible locations of security in a business |
|
Definition
Outside IT - no independence from IT within IT - IT and security share technology skill set Hybrid - firewall maintenance in IT: policy making, planing and auditing outside IT |
|
|
Term
descriptions of what the best firms in the industry are doing |
|
Definition
|
|
Term
when should security be involved in a project? |
|
Definition
|
|
Term
security technology that a company implemented in the past but are now at least somewhat ineffective |
|
Definition
legacy security technology |
|
|
Term
These are discretionary to implement |
|
Definition
|
|
Term
formally announcing or making users aware of a new policy |
|
Definition
|
|
Term
being able to manage security technologies from a single security management console |
|
Definition
centralized security management |
|
|
Term
Vulnerability tests are done to ___ |
|
Definition
tell if the security policies are succeeding and ID vulnerabilities by attacking the system yourself |
|
|
Term
___ requires companies to report material control deficiencies in their financial reporting processes |
|
Definition
sarbanes-oxley act of 2002 |
|
|
Term
sanctions/liability if implementation isn't done properly |
|
Definition
|
|
Term
if the failure of any single element will ruin security |
|
Definition
|
|
Term
___ are a few well chosen measurable indicators of security success or failure |
|
Definition
|
|
Term
an outside firm that handles delegated security controls |
|
Definition
managed security service provider |
|
|
Term
what is the most important part of driving forces? |
|
Definition
compliance laws and regulations |
|
|
Term
mandatory implementation guidance are called ___ |
|
Definition
|
|
Term
most common single point of vulnerability is ___ |
|
Definition
DNS server (unless there are several) |
|
|
Term
___ doesn't evolve in an uncoordinated series of security decisions but follows a coherent plan |
|
Definition
security system decisions |
|
|
Term
define plan protect respond |
|
Definition
plan - reassessments, new threats and business conditions require security re-evaluation protect - plan based creation and operation of countermeasures. most time is spent here response - recovery according to plan. must be planned out in advance |
|
|
Term
___ has the power to prosecute firms that fail to take reasonable precautions to protect private informaion |
|
Definition
|
|
Term
closing all routes of an attack |
|
Definition
|
|
Term
multiple countermeasures for an attacker to break through. They are all independent |
|
Definition
|
|
Term
___ was enacted to bolster computer and network security within the federal government and affiliated parties. |
|
Definition
Federal information security management act (FISMA) |
|
|
Term
___ is when a person who authorizes a request should never be the one who makes the request |
|
Definition
request-authorization control |
|
|
Term
compares probable losses with the cost of security protections |
|
Definition
|
|
Term
___ is a complete act that should require two or more people |
|
Definition
|
|
Term
|
Definition
opportunity pressure rationalization |
|
|
Term
|
Definition
Certification of the system by the organization or outside party
accreditation of the system by issuing an authorization to operate |
|
|
Term
Broad set of rules ensuring privacy rights in Europe |
|
Definition
EU data protection directive of 2002 |
|
|
Term
___ requires strong protection for personal data in financial institutions |
|
Definition
Gramm-Leach-Bliley Act GLBA |
|
|
Term
COSO framework components |
|
Definition
Internal environment objective setting event identification risk assessment risk response control activity |
|
|
Term
___ is used to establish IT controls |
|
Definition
Control Objectives for Information and Related Technologies (COBIT) |
|
|
Term
a system's entire life from creation to termination |
|
Definition
|
|
Term
professional association for IT auditors |
|
Definition
Information Systems audit and control association |
|
|
Term
___ focuses on IT security in detail |
|
Definition
|
|
Term
|
Definition
plan and organize acquire and implement deliver and support monitor and evaluate |
|
|
Term
to protect against threats, most firms use the highest level security management process called ___ |
|
Definition
Plan-Protect-Respond cycle |
|
|
Term
companies must develop and follow ___ in security management |
|
Definition
|
|