Security Standards Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

Flashcards about Security Standards.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

What is COBIT?

Control Objectives for Information and Related Technologies; A framework policy governance

2
New cards

What are the components of COBIT?

Framework, Process Descriptions, Control Objectives, Management Guidelines, and Maturity Models

3
New cards

What does the Maturity Models component of COBIT evaluate?

A process’s level of development, defined as how the control is performing against objectives

4
New cards

What is the approach of COBIT 2019 guidelines?

More prescriptive, supporting more integrations for governance and risk management

5
New cards

What should be considered when applying ISO standards?

IT department size, compliance issues, IT skill level, innovation, growth, IT role, corporate culture, political situations, hardware/software failures, and processes/procedures

6
New cards

What are some NIST standards important to network security?

NIST SP 800-14, NIST SP 800-35, NIST SP 800-30 Rev. 1

7
New cards

What is the Risk Management Framework (RMF)?

The unified information security framework for the entire federal government, replacing legacy DIACAP processes

8
New cards

What is the Orange Book?

Common name for books published by the DoD, officially titled 'Department of Defense Trusted Computer System Evaluation Criteria'; a cornerstone for computer security standards

9
New cards

What does DoD security category D represent?

Minimal Protection; the default rating for an OS not given any other rating

10
New cards

What does DoD security category C represent?

Discretionary Protection; some protection for file structure and devices with basic auditing capability

11
New cards

What does DoD security category B represent?

Mandatory Protection; providing a higher level of security with mandatory, not discretionary, protection systems

12
New cards

What does DoD security category A represent?

Verified Protection; the highest security standard with formal methods and proof of integrity of TCB

13
New cards

What are some books in the DoD Rainbow Series?

Tan Book, Bright Blue Book, Orange Book, Aqua Book, Burgundy Book, Lavender Book, Venice Blue Book, Red Book, Pink Book, Purple Book, Brown Book, Yellow-Green Book, Light Blue Book, Blue Book, Grey/Silver Book, Lavender/Purple Book, Yellow Book, Forest Green Book, Hot Peach Book, Turquoise Book, Violet Book, Light Pink Book

14
New cards

What standards originated the Common Criteria?

ITSEC (Information Technology Security Evaluation Criteria), DoD Orange Book, and CTCPEC (Canadian Trusted Computer Product Evaluation Criteria)

15
New cards

What is the purpose of security models?

To establish a defense strategy

16
New cards

What are the security levels in the Bell-LaPadula model?

Unclassified, Confidential, Secret, and Top Secret

17
New cards

What are the three parts of the Biba Integrity Model?

A subject cannot execute objects with lower integrity, cannot modify objects with higher integrity, and may not request service from objects with higher integrity

18
New cards

What are the two primary elements of the Clark-Wilson Model?

Well-formed transaction, and separation of duties

19
New cards

What is the main goal of the Chinese Wall Model?

To facilitate a complete separation of information in firms to prevent conflicts of interest

20
New cards

What are the main ways that State Machine Model is used to evaluate the state of the system?

Users, states, commands, output

21
New cards

Name some Federal Regulations, Guidelines, and Standards

HIPAA, HITECH, Sarbanes-Oxley (SOX), Computer Fraud and Abuse Act (CFAA), Fraud and Related Activity in Connection with Access Devices, General Data Protection Regulation, PCI DSS