Exam 3: Governance and Strategic Planning for Security
Information security governance yields significant benefits.List five.
1.An increase in share value for organizations
2.Increased predictability and reduced uncertainty of business operations by lowering information-security-related risks to definable and acceptable levels
3.Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care
4.Optimization of the allocation of limited security resources
5.Assurance of effective information security policy and policy compliance
6.A firm foundation for efficient and effective risk management,process improvement,and rapid incident response
7.A level of assurance that critical decisions are not based on faulty information
8.Accountability for safeguarding information during critical business activities,such as
mergers and acquisitions,business process recovery,and regulatory response.
What is the first phase of the SecSDLC?
B
The ISA 27014:2013 standard promotes five risk management processes,which should be adopted by the organization's executive management and its governing board.
False
A person or organization that has a vested interest in a particular aspect of the planning or operation of the organization is a stockbroker.
What is necessary for a top-down approach to the implementation of InfoSec to succeed?
Which of the following is a key advantage of the bottom-up approach to security implementation?
Which of the following explicitly declares the business of the organization and its intended areas of operations?
The individual responsible for the assessment,management,and implementation of information-protection activities in the organization is known as a(n)____________.
Individuals who control,and are therefore responsible for,the security and use of a particular set of information are known as ____________.
ISO 27014:2013 is the ISO 27000 series standard for ____________.
A senior executive who promotes the project and ensures its support,both financially and administratively,at the highest levels of the organization is needed to fill the role of a(n)____________ on a development team.
The ______________________ phase is the last phase of SecSDLC,but perhaps the most important.
The individual accountable for ensuring the day-to-day operation of the InfoSec program,accomplishing the objectives identified by the CISO and resolving issues identified by technicians are known as a(n)____________.
According to the ITGI,what are the four supervisory tasks a board of directors should perform to ensure strategic InfoSec objectives are being met?
A 2007 Deloitte report found that valuable approach that can better align security functions with the business mission while offering opportunities to lower costs is ____________.
_________resources include people,hardware,and the supporting system elements and resources associated with the management of information in all its states.
According to the Corporate Governance Task Force (CGTF),which phase in the IDEAL model and framework lays the groundwork for a successful improvement effort?
When using the Governing for Enterprise Security (GES)program,an Enterprise Security Program (ESP)should be structured so that governance activities are driven by the organization's executive management,select key stakeholders,as well as the ____________.
What is the values statement and what is its importance to an organization?
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)