Process of Implementing Information Security | CISSP-ISSEP Exam Preparation

Process of Implementing Information Security

Question

Which of the following refers to a process that is used for implementing information security.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

The correct answer is B. Certification and Accreditation (C&A).

Certification and Accreditation (C&A) is a process used for implementing information security. It is also known as the Risk Management Framework (RMF) in the United States Federal Government. This process is used to ensure that information systems are adequately protected against unauthorized access, use, disclosure, disruption, modification, or destruction.

The C&A process consists of six steps:

  1. Initiation: The process starts with the initiation step, where the need for security is identified, and the scope of the system is defined.

  2. Security Categorization: The next step is the security categorization of the system. The system is assigned a security category based on the potential impact that a security breach could have on the organization.

  3. Security Control Selection: After the security categorization, the appropriate security controls are selected to protect the system. The security controls are selected based on the security category assigned to the system.

  4. Security Control Implementation: In this step, the security controls are implemented in the system.

  5. Security Control Assessment: The implemented security controls are assessed to determine if they are operating as intended and providing the necessary security.

  6. Authorization: Finally, based on the results of the security control assessment, the system is authorized to operate.

The C&A process is an iterative process, meaning that it is continually reviewed and updated to ensure that the security controls are adequate for the system's current environment. The C&A process is critical in maintaining the confidentiality, integrity, and availability of information systems.