CISM Exam Prep 2022 with complete solution
Information security governance is primarily driven by: -Answer- Business strategy
Who should drive the risk analysis for an organization? -Answer- the Security Manager
Who s
...
CISM Exam Prep 2022 with complete solution
Information security governance is primarily driven by: -Answer- Business strategy
Who should drive the risk analysis for an organization? -Answer- the Security Manager
Who should be responsible for enforcing access rights to application data? -AnswerSecurity administrators
The MOST important component of a privacy policy is: -Answer- notifications
Investment in security technology and processes should be based on: -Answer- clear
alignment with the goals and objectives of the organization
Define information security governance -Answer- 1. A set of policies and procedures
that establishes a framework of information security strategies
2. A practice area that ensures efficient utilization of information resources
The main purpose of information security governance -Answer- to ensure the safety of
information including its Confidentiality, Integrity and Availability. Information security
governance protects information from loss, misuse, unauthorized usage, and
destruction during its life cycle or the time it is being used in an organization.
Benefits of information security governance -Answer- - accountability for protecting
information during important business activities
- reduction of the impact of security incidents
- reduction in risks to tolerable limits
- protection from civil and legal liabilities
- enhancement of trust in customer relationships
- assurance of policy compliance
- protection of company reputation
In order to be effective, information security governance needs to provide 6 basic
outcomes: -Answer- - strategic alignment
- value delivery
- risk management
- performance measurement
- resource management
- integration
Should information security investments be optimized or minimized? -AnswerOptimized so that they support business objectives.
Primary goals of resource management: -Answer- - keeping a record of security
practices and processes
- acquiring knowledge and making it accessible- building a security architecture that identifies and uses infrastructure resources
properly
What is Corporate Governance? -Answer- Corporate governance is a set of procedures
and duties performed by the board of directors and executive management to direct and
control the organization. Corporate governance helps the board of directors to
• ensure that business objectives are met
• provide strategic direction for business activities
• verify the efficient use of the organization's resources, and
ensure proper handling of business risks
Information Security Governance -Answer- While corporate governance deals with
performance and control at all levels of the organization, information security
governance is a subset of corporate governance. Information security governance is
concerned with the policies and controls related to protecting information in the
organization. It helps you to
• ensure that information security objectives are achieved
• provide strategic direction for information security activities
• ensure the efficient use of information resources, and
manage information security risks
General components of the Information Security Governance Framework are: -Answer-
- security strategy
- security policies
- standards
- security organizational structure
- metrics and monitoring
Steering Committee -Answer- Consists of senior representatives of departments that
are directly or indirectly affected by information security policies. The steering
committee aims to involve all stakeholders influenced by security aspects.
Who is responsible for identifying information assets that need to be protected and
assigning appropriate priorities and protection levels for them? -Answer- The Board of
Directors
Who is responsible for achieving organizational consent over priorities related to
information security and ensuring the involvement of all stakeholders influenced by
security considerations? -Answer- The Steering Committe
Who needs to establish reporting and communication channels in the whole
organization to make sure that information security governance is effective? -AnswerThe CISOWho should establish processes for integrating security with business objectives and
provide proper leadership and continuous support to the people working to implement
information security? -Answer- Executive Management
What is GRC? -Answer- Governance, Risk Management, Compliance
What are the 3 GRC processes? -Answer- - Governance is the process that senior
management can use to direct and control an organization. It involves developing
methods to ensure that all employees of the organization adhere to its policies,
standards, and procedures.
- Risk management helps you create and implement methods for mitigating risks. Using
this process, you can establish the organization's risk tolerance, recognize potential
risks and their impact on business operations, and decide the priority for mitigating the
risks based on business goals and risk tolerance.
- Compliance is the process using which you can supervise the controls and methods
that ensure adherence to an organization's policies, standards, and procedures.
Systems Theory -Answer- Systems Theory is a network of processes, people,
technologies, relationships, events, reactions, and results that interact with each other
to achieve one common goal. By analyzing these interactions, an information security
manager can understand the working of a system in an organization and control any
risks to it.
4 elements of the information security business model -Answer- • organization design
and strategy
• people
• process
• technology
6 dynamic interconnections of the information security business model -Answer- •
governance
• culture
• enablement and support
• emergence
• human factors
• architecture
Governance dynamic interconnection of information security business model -AnswerThe governance dynamic interconnection links the organization and process elements.
It involves guiding and controlling an organization.
Culture dynamic interconnection of information security business model -Answer- The
culture dynamic interconnection links the organization and people elements. It
represents people's beliefs, opinions, and behaviors.Enablement and Support dynamic interconnection of information security business
model -Answer- The enablement and support dynamic interconnection links the
technology and process elements. It involves creating security policies, guidelines, and
standards to support business requirements.
Emergence dynamic interconnection of information security business model -AnswerThe emergence interconnection links the people and process elements. It indicates
patterns in an organization's life that appear and grow without any evident reason, and
have results that are difficult to forecast and control.
Human Factors dynamic interconnection of information security business model -
Answer- The human factors interconnection links the people and technology elements,
and indicates the relationship and gap between these elements.
Architecture dynamic interconnection of information security business model -AnswerThe architecture interconnection links the organization and technology elements. It
completely covers an organization's policies, processes, people, and technology that
compose the security practices.
for the information security strategy to be effective, it should be developed to achieve
certain high-level outcomes: -Answer- - strategic alignment
- risk management
- value delivery
- resource management
- performance measurement
- process assurance
Which 3 key participants are involved in the development of the information security
strategy? -Answer- 1. The BOD or the senior management
2. the executive management and steering committee
3. the CISO or ISM
responsibilities of key participants involved in developing an information security
strategy -Answer- The senior management ensures that the organization's information
security strategy is aligned with its business strategy and objectives.
The executive management and steering committee are actively involved in risk
management. It involves managing the threats to inform
[Show More]