CISM Terms

ISACA CISM

ISACA CISM


Fichier Détails

Cartes-fiches 43
Langue English
Catégorie Technique
Niveau Autres
Crée / Actualisé 14.11.2013 / 16.08.2019
Lien de web
https://card2brain.ch/box/cism_terms
Intégrer
<iframe src="https://card2brain.ch/box/cism_terms/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
RTO

The RTO (Recovery Time Objective) defines the amount of time allowed for the recovery of a business function or resource after a disaster occurs.

RPO

RPO (Recovery Point Objective) is determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interru amount of data loss in case of interruption.

MTO

MTO (Maximum Tolerable Outage) defines the maximum time that an enterprise can support processing in alternate (or emergency) mode.

SDO

SDO (Service Delivery Objective) is directly related to the business needs, SDO is the level of services to be reached during the alternate process mode until the normal situation is restored normal situation is restored.

What is Intristic risk

The same as inherent risk

What is inherent risk

Risk that is available due normal course of conducting business

What is residual risk

The risk that remains after having applied mitigation measures

What is operational risk

Risks that occure due to operating a business i.e. all IT related risks

What is systemic risk

Risks that are available to a whole system i.e. in banking sector, etc.

What is aggregated risk

When multiple minor vulnerabilities aggregate and lead to a significant impact.

What is the fundamental goal of risk mangement?

Reduce risks to an acceptable level

What is a control risk

The risk that a control will not work as expected.

Cascading risk

A risk likely in closely integrated/coupled systems as one failure can lead to a chain reaction.

Risk mitigation

The management of risk through the use of countermeasures and controls.

Risk avoidance

The process for systematically avoiding risk i.e. by omiting processes or projects.

Risk transfer

The process of assigning risk to another enterprise, usually through the purchase of an insurance policy or by out sourcing the service.

AIW

AIW (Acceptable Interruption Window) defines the maximum period of time that a system can be unavailable before compromising the achievement of the enterprise's business objectives.

Exposure

The potential loss to an area due to the occurrence of an adverse event.

ALE

ALE (Annual Loss Expectancy) = SLE (Single Loss Expectancy) * ARO (Annualized Rate of Occurence) where SLE = AV (Asset Value) * EV (Exposure Factor).

Enumerate the four risk treatment options

Terminate, Transfer, Mitigate, Accept.

Enumerate the steps of the NIST risk assessment methodology

1. System characterization 2. Threat identification 3. Vulnerability identification 4. Control analysis 5. Likelihood determination 6. Impact analysis 7. Risk determination 8. Control recommendations 9. Results documentation

What are the six basic outcomes of effective security governance?

1. Strategic alignment 2. Risk management 3. Value delivery 4. Resource management 5. Performance management 6. Integration

What is governance?

A set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring objectives are achieved, risk is managed appropriately and resources are used responsibly.

What topics should be covered by a security strategy?

Define long term objectives, include business linkage and define the desired state.

What BCM testing types do exists?

Checklist review Structured walkthrough Simulation test Parallel test Full interruption test

Describe a checklist review

This is a prelimenary step to a real test. Recovery checklists are distributed to all members of a recovery team to review and to ensure the list is current.

Describe a structured walkthrough

Team members physically implement the plans on paper and review each step to assess its effectiveness, identify enhancements, constrains and deficiencies.

Describe a simulation test

The recovery team rol play a prepared disaster scenario without activating processes at the recovery site.

Describe a parallel test

The recovery site is brought to a state of operational readiness, but operations at the primary site continues normally.

Describe a full interruption test

Operations are shut down at the primary site and shifted to the recovery site in accordance with the recovery plan. This is the most rigorous form of testing but is expensive and potentially disruptive.

How to progressively increase the difficulty of recovery test…

start with table-top walkthrough, continue with table-top walkthrough with mock disaster scenarios, test infrastructure and recovery of critical applications, with and without involvment of end users, test full restoration with some personell unfamiliar with the systems, test communication plan, do surprise tests

What should a business case contain?

1) all the factors that materially affect the project's success or failure 2) benefits, cost and risks 3) financial aspects like TCO 4) describing the exact scope 5) describing the added value (value proposition) 6) deliverables / outcome 7) project metrics

ROI

Return of investment is either calculated as a specific financial measurement or as a collective term. Collective term = gain of investment - cost of investment, financial measurement = usually expressed as a % over three years.

ROSI

Return of security investment = gain from implemented security - cost for implementing security

EVA

Equity Value Analysis: works well then a company's asset are mainly intellectual property, goddwill or marketing allure.

NPV

Net Present Value

TCO

Total Cost of Ownership: refers to the deployment and operational cost usually for a 3 year period. It helps to differentiate solutions while separating deployment cost (i.e. HW, setup, customizing) and operational cost (continous license fees, opertions, etc.).

IRR

Internal Rate of Return

What are the CMM maturity models?

Level 1: initial -> undocumented, ad-hoc Level 2: repeatable -> documented so that repetition can be achieved Level 3: defined -> process is defined Level 4: managed -> using process metrics, management can measure and control Level 5: optimizing -> includes process optimization and improvment

What types of alternate (or recovery) sites do exists?

1) cold sites: have only basic environment (cabling, air condition, etc.) ready, is ready to receive equipment and may require weeks to become operational 2) warm sites: have complete infrastructure but only partly configured in terms of IT may have some less powerful comuter equipment ready 3) hot sites: fully configured and ready to operate within several hours, requires only staff, programs and data 4) Duplicate sites: dedicated recovery site similar to the primary siteso it can take over quickly. can be a standby hot site or reciprocal agreement 5) Mirror sites: if continous uptime and availability is required, this type may be the best, 6) Mobile sites: like cold sites but mobile and can be rented