|
|
ITS 305 - Security Policies and Auditing
Review for First Test
The following questions are provided to help you study for the first
test. Do not expect to see these exact questions on the test.
- What is the meaning of the acronym CIA with regard to information
security?
- What are the meanings of the following vocabulary words from chapter
1?
Asset
Threat
Threat agent
Vulnerability
Exploit
Risk
Policy
- The text tells us that we can view the process of creating policies
as having four phases, which the author calls domains. What happens
in each of those phases?
- Which domain creates service level agreements?
- Which of the four domains creates controls for the new system?
- Which domain monitors daily performance of the new system?
- Which domain monitors the controls in the new system?
- What are the two IA concerns that are added to the traditional ISS
CIA concerns?
- What processes are typically implemented as part of a governance layer
in IT systems?
- What is the difference between a Principle we will observe in our
organization and a Policy that addresses it?
- Which is typically more detailed and specific, a Standard or a Procedure?
- How are guidelines enforced in most organizations?
- What is a policy framework? What are some of the components we expect
to find in one?
- What are some examples of physical controls?
- What are technical controls? Can they work with other kinds of controls?
- What are administrative controls? Why must users be made aware of
these?
- Which kind of controls are likely to be automatic controls?
- Which kind of controls are likely to be manual controls?
- Which kind of control notices errors and offers a method to correct
those errors?
- What is an acceptable use policy?
- Which law requires federal agencies to have a common set of information
security standards?
- Which law includes many complicated rules about sharing a patient's
medical information?
- Which federal law protects children from exposure to obscene materials
in public libraries?
- What federal law sets standards for entities that take payment by
bank and credit cards?
- The text tells us there are seven domains that contain all the elements
of our enterprise. Which one includes acceptable use policies and social
networking policies?
- Which domain includes policies on inventory and discovery management?
- Which domain includes policies for network connectivity devices?
- Which domain includes policies about VPN hardware and its usage?
- Why does the text suggest that we need redundant controls to enforce
a policy that we have made very clear to employees?
- Explain why security policies must be coordinated with human resource
policies.
- With regard to a policy framework, what is a baseline?
- What is an organization's risk tolerance?
- Why is it important to establish a security program charter? Who
must grant the authority to administer this charter?
- What are some well established security program framework models?
Which one's are international standards?
- The text cautions us that the standards we develop should be measured
on four scales. Why is each important?
- clearly written
- repeatable
- pursuing a known goal
- applicable to the people following them
- Which element of a policy framework contains more specific instructions
than a standard? Why might one be needed?
- Chapter six lists five risks our security framework should address.
What is meant by each of them?
- unauthorized access
- unauthorized use
- unauthorized disclosure
- disruption of services
- destruction of assets
- Why should we inform the entire staff of our organization about the
creation and any changes to our security framework?
- What does the text call a framework model that has low service integration
and low standardization? Is this label a signal of trouble?
- What does the text call a framework model that has high service integration
and low standardization?
- What does the text call a framework model that has low service integration
and high standardization?
- What does the text call a framework model that has high service integration
and high standardization?
- Since chapter seven repeats some information from the text, let's
consider it again. What do each of these kinds of controls do that is
different from the others?
- Deterrent controls
- Preventive controls
- Detective controls
- Corrective controls
- Compensating controls
- Mitigating controls
- Recovery controls
- Name four branches of your organization, outside IT security, that
should be consulted when you develop an new security policy.
|