Ch 14 - IT Security Management and Risk Assessment

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

IT security management consists of first determining a clear view of an organization's IT security objectives and general risk profile.

T

2
New cards

IT security management has evolved considerably over the last few decades due to the rise in risks to networked systems.

T

3
New cards

Detecting and reacting to incidents is not a function of IT security management.

F

4
New cards

IT security needs to be a key part of an organization's overall management plan.

T

5
New cards

Once the IT management process is in place and working the process never needs to be repeated.

F

6
New cards

Organizational security objectives identify what IT security outcomes should be achieved.

T

7
New cards

The assignment of responsibilities relating to the management of IT security and the organizational infrastructure is not addressed in a corporate security policy.

F

8
New cards

Organizational security policies identify what needs to be done.

T

9
New cards

It is not critical that an organization's IT security policy have full approval or buy-in by senior management

F

10
New cards

Because the responsibility for IT security is shared across the organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and control

T

11
New cards

Legal and regulatory constraints may require approaches to risk assessment

T

12
New cards

A major advantage of the informal approach is that the individuals performing the analysis require no additional skills.

T

13
New cards

A major disadvantage of the baseline risk assessment approach is the significant cost in time, resources, and expertise needed to perform the analysis.

F

14
New cards

One asset may have multiple threats and a single threat may target multiple assets

T

15
New cards

A threat may be either natural or human made and may be accidental or deliberate

T

16
New cards

__________ ensures that critical assets are sufficiently protected in a cost-effective
manner

B. IT security management

17
New cards

The ________ has revised and consolidated a number of national and international standards into a consensus of best practice.
A. ISO B. CSI
C. VSB D. DBI

A. ISO

18
New cards

IT security management functions include:
A. determining organizational IT security objectives, strategies, and policies
B. detecting and reacting to incidents
C. specifying appropriate safeguards
D. all of the above

D. all of the above

19
New cards

Implementing the risk treatment plan is part of the ______ step.
A. check B. act
C. do D. plan

C. do

20
New cards

Maintaining and improving the information security risk management process in response to incidents is part of the _________ step.
A. act B. plan
C. check D. do

A. act

21
New cards

Establishing security policy, objectives, processes and procedures is part of the ______ step.
A. plan B. check
C. act D. none of the above

A. plan

22
New cards

The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives
A. risk register B. corporate security policy
C. vulnerability source D. threat assessment

B. corporate security policy

23
New cards

The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems.
A. combined B. informal
C. baseline D. detailed

C. baseline

24
New cards

The _________ approach involves conducting a risk analysis for the organization's IT systems that exploits the knowledge and expertise of the individuals performing the analysis without using a formal structured process.
A. baseline B. combined
C. detailed D. informal

D. informal

25
New cards

A ________ is anything that might hinder or present an asset from providing appropriate levels of the key security services.
A. vulnerability B. threat
C. risk D. control

B. threat

26
New cards

_________ include management, operational, and technical processes and procedures that act to reduce the exposure of the organization to some risks by reducing the ability of a threat source to exploit some vulnerabilities.
A. Security controls B. Risk appetite
C. Risk controls D. None of the above

A. Security controls

27
New cards

The results of the risk analysis should be documented in a _________.
A. journal B. consequence
C. risk register D. none of the above

C. risk register

28
New cards

13. ________ specification indicates the impact on the organization should the particular threat in question actually eventuate.
A. Risk B. Consequence
C. Threat D. Likelihood

B. Consequence

29
New cards

The purpose of ________ is to determine the basic parameters within which the risk assessment will be conducted and then to identify the assets to be examined.
A. establishing the context B. control
C. risk avoidance D. combining

A. establishing the context

30
New cards

_________ is choosing to accept a risk level greater than normal for business reasons.
A. Risk avoidance B. Reducing likelihood
C. Risk transfer D. Risk acceptance

D. Risk acceptance

31
New cards

_________ is a formal process used to develop and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity, and reliability for an organization's assets.

IT security management

32
New cards

ISO details a model process for managing information security that comprises the
following steps: plan, do, ________, and act.

check

33
New cards

The term ________ refers to a document that describes what an organizations
security objectives and strategies are and the process used to achieve them.

organizational security policy

34
New cards

The aim of the _________ process is to provide management with the information
necessary for them to make reasonable decisions on where available resources
will be deployed.

risk assessment

35
New cards

The four approaches to identifying and mitigating risks to an organization's IT
infrastructure are: baseline approach, detailed risk analysis, combined approach,
and __________ approach.

informal

36
New cards

The __________ approach to risk assessment aims to implement a basic general
level of security controls on systems using baseline documents, codes of practice,
and industry best practice.

baseline

37
New cards

The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential to meeting the organization's business objectives and additional expenditure on
risk analysis cannot be justified.

informal

38
New cards

The advantages of the _________ risk assessment approach are that it provides the most comprehensive examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.

detailed

39
New cards

A(n) _________ is a weakness in an asset or group of assets that can be exploited by one or more threats.

vulnerability

40
New cards

A(n) _________ is anything that has value to the organization.

asset

41
New cards

The level of risk the organization views as acceptable is the organization's __________.

risk appetite

42
New cards

_________ is sharing responsibility for the risk with a third party.

Risk transfer

43
New cards

Not proceeding with the activity or system that creates the risk is _________.

risk avoidance

44
New cards

The _________ approach incorporates elements of the baseline, informal, and detailed risk analysis approaches.

combined

45
New cards

The _________ approach to security risk assessment provides the most accurate evaluation of an organization's IT system's security risks.

detailed risk analysis