SlideShare a Scribd company logo
Davis, Nigel
CH.5 Review Questions (1-10)
February 25, 2014
1. The security framework provides a strategic direction to design and implement the security
infrastructure. It also ensures the accomplishment of objectives. Information security
governance is the application of the principles of corporate governance-that is, executive
management's responsibility to provide strategic direction, ensure the accomplishment of
objectives, oversee that risks are appropriately managed, and validate responsible resource
utilization-to the information security function.
2. In order to effectively implement security governance, the Corporate Governance Task Force
(CGTF) recommends that organizations follow an established framework, such as the IDEAL
framework from the Carnegie Mellon University Software Engineering Institute.
3. Its one of the most widely referenced security models in Information Technology-code of
practice for the information security management, which was originally published as British
standard BS7799. ISO/IEC 27002 is focused on a broad overview of the various areas of
security, providing information on 127controls over ten broad areas; ISO/IEC 27001provides
information on how to implement ISO/IEC 27002 and how to set up an information security
management system (ISMS).
4. The global information security community had not defined any justification for a code of
practice as identified in the ISO/IEC 17799. ISO/IEC 17799 lacked the necessary measurement
precision of a technical standard. ISSO/IEC 17799 was not complete as other frameworks.
ISO/IEC 17799 was hurriedly prepared given the tremendous impact its adoption could have on
industry information security controls. There was no reason to believe that ISO/IEC 17799 was
more useful than any other approach. The recommended alternatives is to follow the major
process steps.
5. Other approaches are described in the many documents available from the Computer Security
Resource Center of the National Institute for the Standards and technology. The documents are
publicly available at no charge and have been for some time, they have been broadly reviewed
by government and industry professionals , and are among the references cited by the federal
government when it decided not to select the ISO IEC 17799 standards. The following are
sections examine these documents as they apply to the blueprint for information security .
-SP 800-12, -SP 800-14, -SP 800-16, -SP 800-18, -SP 800-26 and -SP 800-30
6. They can benefit by using awareness policies of federal agencies. Most agencies have these
policies in place. Federal agencies are also very good at examine and processing evidence. This
could be useful to private companies if some sort of theft or equipment loss or data loss were to
happened.
7. Some Web resources that can aid an organization in developing best practices as part of a
security framework include, http://csrc.nist.gov/groups/SMA/fasp, www.cert.org,
www.techforum.com and www.iapsc.org.
8. Managerial controls are security processes that are designed by strategic planners and
implemented by security administration of the organization. It sets the direction and scope of
the security process and provide detailed instructions for its conduct, as well as addressing the
design and implementation of the security planning process and security program management.
Operational controls are management and lower-level planning functions that deal with the
operational functionality of security in the organization, such as disaster recovery and incident
response planning. They address personnel security, physical security, and the protection of
production inputs and outputs. Technical controls are the tactical and technical implementations
of security in the organization. They address are the components put in place to protect an
organization's information assets.
9. Policy are rules and should be followed by the community or country. Standards are the
recommended status for the community or country. Practice is the actual application of use of
an idea , belief, or method opposed to theories about such application use. Enterprise
Information Security Policy is a direct support, which is given to the organization's mission,
vision and direction. It would be use when providing a direction in the development,
implementation and management of the security program. In Issue -specific Security Policy, the
scope and applicability of the security policy is examined. It would be used when authorization
of user access , privacy protection, fair and responsible use of the technology is addressed.
System-specific Security Policies often include standards and procedures to be implemented
while maintaining of systems. It is used to address implementation and configuration of
technology as well as the behavior of the people. Enterprise would be use to guide the use of the
Web, Issue-specific Security Policy would be used for E-mail and System-specific Security
Policy would be use for office equipment/personal use.
10. Users are ultimately responsible for managing a technology. The Project Manager is responsible
for enforcing policy that affects the use of a technology.

More Related Content

PPT
Security policy and standards
PDF
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
PPT
Information Security Policies and Standards
PPTX
Information Security : Is it an Art or a Science
PPT
Security and personnel
PPSX
Information Security Governance: Concepts, Security Management & Metrics
PPT
Network security and policies
DOC
Computer Security Policy
Security policy and standards
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
Information Security Policies and Standards
Information Security : Is it an Art or a Science
Security and personnel
Information Security Governance: Concepts, Security Management & Metrics
Network security and policies
Computer Security Policy

What's hot (20)

PPT
information security management
DOCX
The Role of Information Security Policy
PPT
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
PPTX
Information security management (bel g. ragad)
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
PPT
Information security
PPT
Information security policy_2011
PPT
Computer Security Policy D
PDF
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
PPT
Lesson 1 - Introduction
PPT
It Policies
PDF
Information Security Management System: Emerging Issues and Prospect
PPT
Privacy & security in heath care it
PPTX
Professional designations in it governance
PPTX
Information Security - Back to Basics - Own Your Vulnerabilities
PDF
ISO.IEC_27001-27002-2013 Topology
PPTX
Resume: The Complete Guide to Cybersecurity Risks and Controls
PDF
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
information security management
The Role of Information Security Policy
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information security management (bel g. ragad)
Information Assurance And Security - Chapter 1 - Lesson 4
Information security
Information security policy_2011
Computer Security Policy D
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Lesson 1 - Introduction
It Policies
Information Security Management System: Emerging Issues and Prospect
Privacy & security in heath care it
Professional designations in it governance
Information Security - Back to Basics - Own Your Vulnerabilities
ISO.IEC_27001-27002-2013 Topology
Resume: The Complete Guide to Cybersecurity Risks and Controls
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Information Assurance And Security - Chapter 1 - Lesson 2
Ad

Similar to Ch.5 rq (1) (20)

PPT
Security Manager - Slides - Module 10.ppt
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
DOCX
Information Systems Security & Strategy
PDF
A to Z of Information Security Management
PPT
Start With A Great Information Security Plan!
PDF
NIST Privacy Engineering Working Group -- Risk Models
PDF
create your own Security Management Model using the NIST Special Pub.pdf
PDF
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
PPTX
ICS_Unit-I_Foundations of Information Security
DOCX
CHAPTER 5 Security Policies, Standards, Procedures, a
DOCX
Operationaland Organizational SecurityChapter 3Princ.docx
DOCX
Operationaland Organizational SecurityChapter 3Princ.docx
PDF
Security policy.pdf
PPT
Module 4 - ASP Privacy Management Certfication.ppt
PDF
Implementing IT Security Controls
PDF
Protecting business interests with policies for it asset management it-tool...
PDF
Chapter 7 Managing Secure System.pdf
DOCX
The Significance of IT Security Management & Risk Assessment
Security Manager - Slides - Module 10.ppt
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
Information Systems Security & Strategy
A to Z of Information Security Management
Start With A Great Information Security Plan!
NIST Privacy Engineering Working Group -- Risk Models
create your own Security Management Model using the NIST Special Pub.pdf
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
ICS_Unit-I_Foundations of Information Security
CHAPTER 5 Security Policies, Standards, Procedures, a
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
Security policy.pdf
Module 4 - ASP Privacy Management Certfication.ppt
Implementing IT Security Controls
Protecting business interests with policies for it asset management it-tool...
Chapter 7 Managing Secure System.pdf
The Significance of IT Security Management & Risk Assessment
Ad

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Testing WebRTC applications at scale.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
innovation process that make everything different.pptx
PPTX
artificial intelligence overview of it and more
Digital Literacy And Online Safety on internet
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Testing WebRTC applications at scale.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
Module 1 - Cyber Law and Ethics 101.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
presentation_pfe-universite-molay-seltan.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Introuction about WHO-FIC in ICD-10.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
Slides PPTX World Game (s) Eco Economic Epochs.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PptxGenJS_Demo_Chart_20250317130215833.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Job_Card_System_Styled_lorem_ipsum_.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
innovation process that make everything different.pptx
artificial intelligence overview of it and more

Ch.5 rq (1)

  • 1. Davis, Nigel CH.5 Review Questions (1-10) February 25, 2014 1. The security framework provides a strategic direction to design and implement the security infrastructure. It also ensures the accomplishment of objectives. Information security governance is the application of the principles of corporate governance-that is, executive management's responsibility to provide strategic direction, ensure the accomplishment of objectives, oversee that risks are appropriately managed, and validate responsible resource utilization-to the information security function. 2. In order to effectively implement security governance, the Corporate Governance Task Force (CGTF) recommends that organizations follow an established framework, such as the IDEAL framework from the Carnegie Mellon University Software Engineering Institute. 3. Its one of the most widely referenced security models in Information Technology-code of practice for the information security management, which was originally published as British standard BS7799. ISO/IEC 27002 is focused on a broad overview of the various areas of security, providing information on 127controls over ten broad areas; ISO/IEC 27001provides information on how to implement ISO/IEC 27002 and how to set up an information security management system (ISMS). 4. The global information security community had not defined any justification for a code of practice as identified in the ISO/IEC 17799. ISO/IEC 17799 lacked the necessary measurement precision of a technical standard. ISSO/IEC 17799 was not complete as other frameworks. ISO/IEC 17799 was hurriedly prepared given the tremendous impact its adoption could have on industry information security controls. There was no reason to believe that ISO/IEC 17799 was more useful than any other approach. The recommended alternatives is to follow the major process steps. 5. Other approaches are described in the many documents available from the Computer Security Resource Center of the National Institute for the Standards and technology. The documents are publicly available at no charge and have been for some time, they have been broadly reviewed by government and industry professionals , and are among the references cited by the federal government when it decided not to select the ISO IEC 17799 standards. The following are sections examine these documents as they apply to the blueprint for information security . -SP 800-12, -SP 800-14, -SP 800-16, -SP 800-18, -SP 800-26 and -SP 800-30 6. They can benefit by using awareness policies of federal agencies. Most agencies have these policies in place. Federal agencies are also very good at examine and processing evidence. This could be useful to private companies if some sort of theft or equipment loss or data loss were to happened. 7. Some Web resources that can aid an organization in developing best practices as part of a security framework include, http://csrc.nist.gov/groups/SMA/fasp, www.cert.org, www.techforum.com and www.iapsc.org. 8. Managerial controls are security processes that are designed by strategic planners and implemented by security administration of the organization. It sets the direction and scope of the security process and provide detailed instructions for its conduct, as well as addressing the design and implementation of the security planning process and security program management. Operational controls are management and lower-level planning functions that deal with the operational functionality of security in the organization, such as disaster recovery and incident response planning. They address personnel security, physical security, and the protection of production inputs and outputs. Technical controls are the tactical and technical implementations of security in the organization. They address are the components put in place to protect an
  • 2. organization's information assets. 9. Policy are rules and should be followed by the community or country. Standards are the recommended status for the community or country. Practice is the actual application of use of an idea , belief, or method opposed to theories about such application use. Enterprise Information Security Policy is a direct support, which is given to the organization's mission, vision and direction. It would be use when providing a direction in the development, implementation and management of the security program. In Issue -specific Security Policy, the scope and applicability of the security policy is examined. It would be used when authorization of user access , privacy protection, fair and responsible use of the technology is addressed. System-specific Security Policies often include standards and procedures to be implemented while maintaining of systems. It is used to address implementation and configuration of technology as well as the behavior of the people. Enterprise would be use to guide the use of the Web, Issue-specific Security Policy would be used for E-mail and System-specific Security Policy would be use for office equipment/personal use. 10. Users are ultimately responsible for managing a technology. The Project Manager is responsible for enforcing policy that affects the use of a technology.