Evan Anderson
IS4550
Security Policies and Implementation
Unit 11 (August 26, 2016)
Course Review and Final Examination
Assignments and Study Materials
- Unit 11 Project 11.1: Department of Defense (DoD) Ready
- Unit 11 Exam 11.2: Final Exam
Week 11 Preparation
When preparing for the course review and final examination, you will want to pay particular attention to the following questions:
- From a structural perspective, how are security frameworks usually organized?
- What is the capstone document in a security framework?
- What is the prime objective of information security programs?
- What are the five pillars?
- Why do organizations consider information security policies important?
- Why does a security review most usually entail business process reengineering?
- How are policies different from procedures?
- What are the three most important issues that awareness programs must emphasize?
- What must an organization measure in order to achieve repeatable behavior from its security policy planners?
- Creating an impact report, identifying asset reliance, and establishing asset priority are part of what activity?
- What is the purpose of a data classification system?
- What must first be completed and agreed upon by all the key departments within the organization before a BCP can be crafted?
- What is RTO?
- What function does a Disaster Declaration Policy serve?
- Building a business continuity plan begins with what analytical activity?
- In terms of implementation and compliance, what is the most important factor in an organization-wide security policy?
- What is the difference between a data steward (also called a data owner) and a data custodian?
- What are data administrators primarily responsible for?
- What are data security administrators primarily responsible for?
- What is SOD?
- What are the three lines of defense in the financial services sector?
- What are the most common ways that risk can be mitigated within the user domain?
- As a risk mitigation strategy, securing the workstation is most often associated with which IT infrastructure domain?
- Establishing security rules for the DMZ is a risk mitigation strategy most commonly associated with which IT infrastructure domain?
- What is the primary means by which organizations prohibit accessing or storing unacceptable content?
- What is the purpose of an SAP?
- The standards for deploying and operating wireless access points are typically included in the baseline standards of which IT infrastructure domain?
- What is a PAA?
- Who in an organization is responsible for assessing technology controls and risks?
- Who in an organization should be required to sign and abide by the Acceptable Use Policy?
- What is the purpose of the Control Standards document within a Security Policy Framework?
- With which IT infrastructure domain would a policy defining how firewalls handle application traffic be associated?
- Where within a Security Policy Framework would IDS/IPS architecture and management issues be addressed?
- Into which IT infrastructure domain would web services policies be organized?
- What is the purpose of an IRT policy?
- What are some of the most common kinds of incidents as defined by the Payment Card Industry Data Security Standard (PCI DSS)?
- A typical IRT is composed of members from which departments?
- What must be defined before an IRT can declare an incident?
- After declaring an incident, what must the IRT do before formulating a specific response?
- What are the primary responsibilities of the IRT Manager?
- What are the primary responsibilities of the IRT Coordinator?
- When determining the success of the IRT, what factors should be measured?
- What three motivational factors must be present in a security framework in order to maximize the likelihood of user compliance?
- What are some of the most common causes of security policy failure?
- In terms of organizational culture, what must happen before security policies can be implemented and administered effectively?
- What is the purpose of the Change Control Board with regard to security policies?
- What is an RFC?
- What departments within an organization should be represented on the Change Control Board that oversees the maintenance of security policies?
- What kinds of organizational challenges can prevent the successful deployment of a security framework?
- What are the most serious types of security breaches and why are they important to security policy planners?
- What are the eight steps used to make lasting change in organizations?
- What are the workplace personality types defined by the Kingdomality taxonomy?
- Why are users most likely to oppose security initiatives?
- What are some of the most effective means of ensuring security awareness?
- When encountering resistance to security policies, what should the implementers keep in mind with regard to the reluctant users?
- What law gives employers the right to monitor employees in the ordinary course of business?
- What are some of the primary benefits of automating security policy compliance?
- What makes automated systems more effective at tracking security policy compliance than human monitoring?
- How might MBSA be used in the implementation of security policies?
- How might you apply layered security to the User Domain?