English Preparation Guide Exin Isfs 201403 PDF
English Preparation Guide Exin Isfs 201403 PDF
English Preparation Guide Exin Isfs 201403 PDF
Information Security
Foundation based on
ISO/IEC 27002
Edition March 2014
Content
1.
2.
3.
4.
Overview
Exam requirements
List of basic concepts
Literature
4
7
11
14
33
1. Overview
EXIN Information Security Foundation based on ISO/IEC 27002 (ISFS.EN)
Summary
Preparation Guides are designed to help training providers develop courses and
course material that meet with EXIN requirements.
The main objective of the Preparation Guide is to identify the exam subjects, the
exam requirements and specifications, and the target group to support the
development of new, high quality courses.
Information security is the protection of information from a wide range of threats in
order to ensure business continuity, minimize business risk, and maximize return
on investments and business opportunities. (ISO/IEC 27002 definition)
Information security is gaining importance in the Information Technology (I T) world.
Globalization of the economy is leading to an ever-increasing exchange of
information between organizations (their employees, customers and suppliers) and
an explosion in the use of networked computers and computing devices.
The international standard, the Code of Practice for Information Security ISO/IEC
27002:2013 is a widely respected and referenced standard and provides a
framework for the organization and management of an information security
program. Implementing a program based on this standard will serve an organization
well in its goal of meeting many of the requirements faced in todays complex
operating environment. A strong understanding of this standard is important to the
personal development of every information security professional.
In EXINs Information Security modules the following definition is used: Information
Security deals with the definition, implementation, maintenance, compliance and
evaluation of a coherent set of controls (measures) which safeguard the availability ,
integrity and confidentiality of the (manual and automated) information supply.
In the module EXIN Information Security Foundation based on ISO/IEC 27002, the
basic concepts of information security and their relationships are tested. One of the
objectives of this module is to raise the awareness that information is valuable and
vulnerable, and to learn which measures are necessary to protect information.
The subjects of this module are:
Information and security: the concept, the value, the importance and the
reliability of information;
Threats and risks: the concepts of threat and risk and the relationship with the
reliability of information;
Approach and organization: the security policy and security organization
including the components of the security organization and management of
(security) incidents;
44
Context
Qualification program
55
Target group
The examination for EXIN Information Security Foundation based on ISO/IEC 27002
is intended for everyone in the organization who is processing information. The module
is also suitable for entrepreneurs of small independent businesses for whom some
basic knowledge of information security is necessary.
This module can be a good start for new information security professionals.
Prerequisites
none
Examination type
Computer based multiple-choice questions
Indication study load
60 hours
In-course assessment
Not applicable
Time allotted for examination
60 minutes
Examination details
Number of questions:
Pass mark:
Open book/notes:
Electronic equipment permitted:
40
65% (26 of 40)
no
no
Sample questions
To prepare for your examination you can download a sample exam at
http://www.exin.com.
Training
Group size
The maximum number of course participants is 25.
66
2. Exam requirements
The exam requirements are specified in the exam specifications. The following
table lists the topics of the module (exam requirements). The weight of the di fferent
topics in the exam is expressed as a percentage of the total.
Exam requirement
Exam specification
Weight
(%)
10
1.1 The concept of information
1.2 Value of information
1.3 Reliability aspects
2.5
2.5
5
15
15
30
10
3.1 Security policy and security
organization
3.2 Components
3.3 Incident management
2.5
10
10
10
10
2.5
5
4 Measures
40
10
5.1 Legislation and regulations
Total
10
100
77
Exam specifications
1.
1.1
1.2
1.3
2.
2.1
2.2
88
3.
3.1
3.2
Components (2.5%)
The candidate knows the various components of the security organization.
The candidate is able to:
3.2.1 Explain the importance of a code of conduct
3.2.2 Explain the importance of ownership
3.2.3 Name the most important roles in the information security organization
3.3
4.
Measures (40%)
4.1
4.2
99
4.3
4.4
5.
5.1
Comment
The security measures are for most staff members the first aspects of information
security they encounter. Therefore the measures are central to the module and
have the highest weight. The threats and risks follow in terms of weight. Finally,
insight in the policy, organization and legislation and regulation in the area of
information security is necessary in order to understand the importance of the
information security measures.
10
10
Access control
Asset
Audit
Authentication
Authenticity
Authorization
Availability
Backup
Biometrics
Botnet
Business Continuity Management (BCM)
Business Continuity Plan (BCP)
Category
Certificate
Change Management
Classification (grading)
Clear desk policy
Code of conduct
Code of practice for information security (ISO/IEC
27002:2013)
Completeness
Compliance
Computer criminality legislation
Confidentiality
Continuity
Controls
Copyright legislation
Corrective
Correctness
Cryptography
Cyber crime
Damage
Data
Detective
Digital signature
Direct damage
Disaster
Disaster Recovery Plan (DRP)
Encryption
Escalation
o Functional escalation
o Hierarchical escalation
11
11
Exclusivity
Hacking
Hoax
Identification
Impact
Incident cycle
Indirect damage
Information
Information analysis
Information architecture
Information management
Information system
Infrastructure
Integrity
Interference
ISO/IEC 27001:2005
ISO/IEC 27002:2005
Key
Logical access management
Maintenance door
Malware
Non-repudiation
Patch
Personal data protection legislation
Personal firewall
Phishing
Precision
Preventive
Priority
Privacy
Production factor
Public Key Infrastructure (PKI)
Public records legislation
Qualitative risk analysis
Quantitative risk analysis
Reductive
Reliability of information
Repressive
Risk
Risk analysis
Risk assessment (Dependency & Vulnerability analysis)
o Risk avoiding
o Risk bearing
Risk management
o Risk neutral
Risk strategy
Robustness
Rootkit
Security incident
Security measure
Security Organization
Security Policy
Security regulations for the government
12
12
Segregation of duties
Social engineering
Spam
Spyware
Stand-by arrangement
Storage medium
Threat
Timeliness
Trojan
Uninterruptible Power Supply (UPS)
Urgency
Validation
Verification
Virtual Private Network (VPN)
Virus
Vulnerability
Worm
13
13
4. Literature
Exam literature
A
A:
Chapter 4
1.2
A:
Chapter 4
1.3
A:
Chapter 4
2.1
A:
Chapter 5
2.2
A:
Chapter 5
3.1
A:
Chapter 9
3.2
A:
3.3
A:
Chapter 6
4.1
A:
Chapter 5, Chapter 6
4.2
A:
Chapter 7
4.3
A:
Chapter 8, 10
4.4
A:
Chapter 9, 10
5.1
A:
Chapter 11
14
14
15
15
Contact EXIN
www.exin.com