The incident management process of an organization enables them to prepare for and respond to information security incidents. In addition, the organization has procedures in place for assessing information security events. According to ISO/IEC 27001, what else must an incident management process include?
A. Processes for using knowledge gained from information security incidents
B. Establishment of two information security incident response teams
C. Processes for handling information security incidents of suppliers as defined in their agreements
Explanation: According to ISO/IEC 27001, an incident management process must include processes for using knowledge gained from information security incidents to reduce the likelihood or impact of future incidents, and to improve the overall level of information security. This means that the organization should conduct a root cause analysis of the incidents, identify the lessons learned, and implement corrective actions to prevent recurrence or mitigate consequences. The organization should also document and communicate the results of the incident management process to relevant stakeholders, and update the risk assessment and treatment plan accordingly. (Must be taken from ISO/IEC 27001 : 2022 Lead Implementer resources)
FinanceX, a well-known financial institution, uses an online banking platform that enables clients to easily and securely access their bank accounts. To log in, clients are required to enter the one-lime authorization code sent to their smartphone. What can be concluded from this scenario?
A. FinanceX has implemented a securityControl that ensures the confidentiality of information
B. FinanceX has implemented an integrity control that avoids the involuntary corruption of data
C. FinanceX has incorrectly implemented a security control that could become a vulnerability
Explanation: Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes. A security control is a measure that is put in place to protect the confidentiality, integrity, and availability of information assets. In this scenario, FinanceX has implemented a security control that ensures the confidentiality of information by requiring clients to enter a one-time authorization code sent to their smartphone when they log in to their online banking platform. This control prevents unauthorized access to the clients’ bank accounts and protects their sensitive information from being disclosed to third parties. The one-time authorization code is a form of two-factor authentication, which is a security technique that requires two pieces of evidence to verify the identity of a user. In this case, the two factors are something the user knows (their username and password) and something the user has (their smartphone). Two-factor authentication is a recommended security control for online banking platforms, as it provides a higher level of security than single-factor authentication, which relies only on one piece of evidence, such as a password.
Kyte. a company that has an online shopping website, has added a Q&A section to its website; however, its Customer Service Department almost never provides answers to users' questions. Which principle of an effective communication strategy has Kyte not followed?
A. Clarity
B. Appropriateness
C. Responsiveness
Explanation: A demilitarized zone (DMZ) is a network segment that separates the internal network from the external network, such as the internet. A DMZ is designed to provide a layer of protection for the internal network by limiting the exposure of publicly accessible resources and services to potential attackers. A DMZ is an example of a preventive control, which is a type of security control that aims to prevent or deter cyberattacks from occurring in the first place. Preventive controls reduce the likelihood of a successful attack by implementing safeguards and countermeasures that make it more difficult or costly for an attacker to exploit vulnerabilities or bypass security mechanisms. Other examples of preventive controls include encryption, authentication, access control, firewalls, antivirus software, and security awareness training. (From the PECB ISO/IEC 27001 Lead Implementer Course Manual, page 83)
An organization documented each security control that it Implemented by describing their functions in detail. Is this compliant with ISO/IEC 27001?
A. No, the standard requires to document only the operation of processes and controls, so no description of each security control is needed
B. No, because the documented information should have a strict format, including the date, version number and author identification
C. Yes, but documenting each security control and not the process in general will make it difficult to review the documented information
Explanation: According to ISO/IEC 27001:2022, clause 7.5, an organization is required to maintain documented information to support the operation of its processes and to have confidence that the processes are being carried out as planned. This includes documenting the information security policy, the scope of the ISMS, the risk assessment and treatment methodology, the statement of applicability, the risk treatment plan, the information security objectives, and the results of monitoring, measurement, analysis, evaluation, internal audit, and management review. However, the standard does not specify the level of detail or the format of the documented information, as long as it is suitable for the organization’s needs and context. Therefore, documenting each security control that is implemented by describing their functions in detail is not a violation of the standard, but it may not be the most efficient or effective way to document the ISMS. Documenting each security control separately may make it harder to review, update, and communicate the documented information, and may also create unnecessary duplication or inconsistency. A better approach would be to document the processes and activities that involve the use of security controls, and to reference the relevant controls from Annex A or other sources. This way, the documented information would be more aligned with the process approach and the Plan-Do-Check-Act cycle that the standard promotes.
Diana works as a customer service representative for a large e-commerce company. One day, she accidently modified the order details of a customer without their permission Due to this error, the customer received an incorrect product. Which information security principle was breached in this case?
A. Availability
B. Confidentiality
C. Integrity
Explanation: According to ISO/IEC 27001:2022, information security controls are
measures that are implemented to protect the confidentiality, integrity, and availability of
information assets1. Controls can be preventive, detective, or corrective, depending on
their purpose and nature2. Preventive controls aim to prevent or deter the occurrence of a
security incident or reduce its likelihood. Detective controls aim to detect or discover the
occurrence of a security incident or its symptoms. Corrective controls aim to correct or
restore the normal state of an asset or a process after a security incident or mitigate its
impact2.
In this scenario, Socket Inc. implemented several security controls to prevent information
security incidents from recurring, such as:
Segregation of networks: This is a preventive and technical control that involves
separating different parts of a network into smaller segments, using devices such
as routers, firewalls, or VPNs, to limit the access and communication between
them3. This can enhance the security and performance of the network, as well as
reduce the administrative efforts and costs3.
Privileged access rights: This is a preventive and administrative control that
involves granting access to information assets or systems only to authorized
personnel who have a legitimate need to access them, based on their roles and
responsibilities4. This can reduce the risk of unauthorized access, misuse, or
modification of information assets or systems4.
Cryptographic controls: This is a preventive and technical control that involves the
use of cryptography, which is the science of protecting information by transforming
it into an unreadable format, to protect the confidentiality, integrity, and authenticity
of information assets or systems. This can prevent unauthorized access,
modification, or disclosure of information assets or systems.
Information security threat management: This is a preventive and administrative
control that involves the identification, analysis, and response to information
security threats, which are any incidents that could negatively affect the
confidentiality, integrity, or availability of information assets or systems. This can
help the organization to anticipate, prevent, or mitigate the impact of information
security threats.
Information security integration into project management: This is a preventive and
administrative control that involves the incorporation of information security
requirements and controls into the planning, execution, and closure of projects,
which are temporary endeavors undertaken to create a unique product, service, or
result. This can ensure that information security risks and opportunities are
identified and addressed throughout the project life cycle.
However, information backup is not a preventive control, but a corrective control.
Information backup is a corrective and technical control that involves the creation and
maintenance of copies of information assets or systems, using dedicated software and
utilities, to ensure that they can be recovered in case of data loss, corruption, accidental
deletion, or cyber incidents. This can help the organization to restore the normal state of
information assets or systems after a security incident or mitigate its impact. Therefore,
information backup does not prevent information security incidents from recurring, but
rather helps the organization to recover from them.
Page 3 out of 16 Pages |
Previous |