CHAPTER SUMMARY

This chapter addressed techniques for designing, organizing, implementing, and maintaining an IT security policy and standards library. The importance of understanding the organizational culture and creating shared beliefs was discussed. You learned how to understand a business’s perspective and mindset through an understanding of its operating model. You learned characteristics of policies and standards that make them easy to understand. Core security principles were covered, which are important to remember when developing security documents. Training and awareness programs help you enforce policies and get buy-in from employees.

You also learned about the review and approval processes that are part of creating and maintaining library documents. A policy change control board, for example, is an efficient way to maintain policies and standards. It also helps minimize unforeseen impacts on the organization. Additionally, you learned the importance of creating a “lessons learned” process to keep the policies current. Finally, you learned about some leading practices that others have found useful for developing and maintaining a policy and standards library.

KEY CONCEPTS AND TERMS

CHAPTER 7 ASSESSMENT

  1. When writing policies and standards, you should address the six key questions: who, what, where, when, why, and how.
    1. True
    2. False
  2. Which of the following are important to consider before a policy?
    1. Operating model
    2. Intent
    3. Policy change control board
    4. A and B
    5. B and C
    6. A, B, and C
  3. Guideline documents are often tied to a specific control standard.
    1. True
    2. False
  4. Which of the following is not an administrative control?
    1. Development of policies, standards, procedures, and guidelines
    2. Screening of personnel
    3. Change control procedures
    4. Logical access control mechanisms
  5. Which of the following are common steps taken in the development of documents such as security policies, standards, and procedures?
    1. Design, development, publication, coding, and testing
    2. Feasibility, development, approval, implementation, and integration
    3. Initiation, evaluation, development, approval, publication, implementation, and maintenance
    4. Design, coding, evaluation, approval, publication, and implementation
  6. The sole purpose of an operating model is to define how all the businesses technology will be implemented.
    1. True
    2. False
  7. Exceptions or waivers to security policies are a bad idea and should never be approved.
    1. True
    2. False
  8. Which type of control is associated with responding to and fixing a security incident?
    1. Deterrent
    2. Compensating
    3. Corrective
    4. Detective
  9. List examples of physical security control items.
  10. A process to refresh policies as needed based on a major event uses the principle called ________.
  11. A(n) ________ is a plan or course of action used by an organization to convey instructions from its senior-most management to those who make decisions, take actions, and perform other duties on behalf of the organization.
  12. The principle that states security is improved when it is implemented as a series of overlapping controls is called ________.
  13. Security principles are needed in the absence of complete information to make high-quality security decisions.
    1. True
    2. False
  14. “Access to all Organization information resources connected to the <Organization> network must be controlled by using user IDs and appropriate authentication” is a statement you might find in a procedure document.
    1. True
    2. False
  15. Which of the following does a policy change control board do? (Select two.)
    1. Assesses policies and standards and makes recommendations for change
    2. Determines the policies and standards library numbering scheme
    3. Implements technical controls as business conditions change
    4. Reviews requested changes to the policy framework

ENDNOTES

1. Cyprus Shipping Chamber, “Cyber Security Case Study,” July 2017, https://csc-cy.org/wp-content/uploads/2018/06/Cyprus-Shipping-Chamber-Cyber-Security-Case-Study.pdf, accessed April 20, 2020.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.238.159