Infosec

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Review Questions:

Answer the following:

1. What is an InfoSec framework? (5pts)


Answer:
An InfoSec framework is a group or compilation of state-mandated policies and
processes to protect vital information of the user. Wherein it is a model that is use during the
design, selection, and initial and ongoing implementation of all subsequent security controls,
including lnfoSec policies, security education and training programs, and technological
controls. InfoSec Framework is important because it helps the security leader manage and
protect information in a consistent and cohesive way and could eliminate or prevent risk from
leaking of information.

2. What is COBIT? Who is its sponsor? What does it accomplish? (10pt)


Answer:
Control Objectives for Information and Related Technology (COBIT) is a framework
for developing, implementing monitoring, and improving information technology governance
and management practices. The publisher of COBIT is IT Governance Institute and The
Information Systems Audit and Control Association and the IT Governance Institute (ITGI).
COBIT’s main objective is to provide a practical language for business executives to
communicate about various things, such as objectives, results, plans, ideas, and goals. COBIT
enables clear policy development and good practice for IT control throughout organizations

3. What are the two primary advantages of NIST security models? (5pts)
Answer:
The two primary Advantages of NIST security models are first they are publicly
available at no charge, Second they have been available for some time; thus, they are very
thorough and have undergone a great deal of refinement over time.

4. What is COSO, and why is it important? (5pts)


Answer:
The Committee of Sponsoring Organizations of the Treadw Way Commission
(COSO) is a U.S. private-sector initiative formed in 1985. Wherein COSO is a framework for
designing, implementing and evaluating internal control for organizations, providing
enterprise risk management. It was published for the Internal Control Integrated Framework
(ICIF) and it is widely used in the United State. It is important for its main goal is to figure
out what causes fraudulent financial reporting and give advice on how to prevent it.
Companies and organizations can examine their control systems against the COSO's common
definition of internal controls, standards, and criteria.
5. What is access control? (5pts)
Answer:
Access controls regulate the admission of users into trusted areas of the organization
that governs both logical and physical access to the organization's facilities. Where there are
set of regulations, programs to carry out those policies, and technology that enforce
regulations in order to maintain access control.
6. What are the essential processes of access control? (5pts)
Answer:
Access control consists of four different types of processes. First is the identification
wherein it will acquire the identity of the person who asks for access to physical or logical areas.
Next process is the authentication.where it determines who is the person that requires access to
specific areas. Followed by authorization that gives instructions to what the person can or cannot
carry out in the dedicated areas. Lastly is accountability that helps to track of the actions
accomplished by the responsible individual and systems.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy