1.1 : Privacy and third Party Management Flashcards

1
Q

What is privacy

A

Privacy is the protection of personal information from unauthorized disclosure, use, and distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personal information

A

refers to a variety of elements about a private citizen, some of which are not well known,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What organizations that collect personal information must do

A

Organizations that collect any of the previously mentioned items on behalf of customers or other constituents need to develop policies that define what the organization is permitted to do with this information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What to consider when outsourcing a service to a third party

A

a risk assessment should be performed to identify and characterize risks associated with this.
The use of any third-party organization should not be permitted to result in an increase of overall risk to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Primary risk with a third-party provider

A

the service provider will have access to some of the organization’s sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of third -party access

A
  • Physical access to hard copy business records
  • Physical access to information systems
  • Physical access to storage media such as hard drives, solid-state drives, backup tapes, and optical drives
  • Logical access to information systems, sensitive data, or source code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risks associated with third party Access

A
  • Theft of business records
  • Exposure of business records to unauthorized parties • Alteration of business records
  • Damage (both deliberate and accidental) to information systems hardware, software, or information • Failure to perform services in a timely manner
  • Failure to perform services accurately • Failure to perform services professionally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to keep the level of risks low when given access to third party provider

A

By introducing countermeasures and compensating controls.

Requires that third-party provider protect data the same way the organization would do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Addressing Third-Party Security in Security Policy

A

An organization should have policies and processes in place to properly assess, measure, and monitor risks related to any third-party service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Measures that an organization would take to mitigate human resources -related risks

A
  • Screening and background checks
  • Job description
  • Employment agreements
  • Monitoring during employment
  • Policy and Disciplinary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a job decription

A

A job description is an employer’s formal statement to an employee that says, “This is what we expect and require of you to perform this job.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Expectation to include in the Job decription

A
  • Name of the position - Job Title
  • Requirements - Education, skills and work experience
  • Duties and responsibilities - Tasks, projects, and other activities that the employee is expect to perform.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are included in the employment agreement

A
  • Duties - of the position
  • Roles and responsibilities - Job description
  • Confidentiality - even after termination
  • Compliance - laws, regulations and policies. Consequences for failing to comply must be stated.
  • Termination - condition and circumstances by which the organization or the employee can server the agreement .
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What employers must do during employemnt

A
  • Periodic renewal of employment agreements
  • Repeat background checks
  • Access changes when transferred - Remove access for the former position each time an employee is transferred from one position to another
  • Awareness training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employees access to information systems and business premises after termination

A

All accesses should be immediately revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what policies must contractors ant temporary worker subjects to

A

To the same policies that employees are required

17
Q

Computers involvement in crimes

A
  • As a target of a crime - computers and its contents are the targets of a crime.
  • As of Instrument in a crime - the computer used as a weapon.
  • As support of a crime - Computers used to support criminal activities. (storage and transmission of stolen property, recordkeeping..)
18
Q

Social Engineer

A

usage of pretexting (pretending to be someone they aren’t) in order to get employees and private citizens to give up secrets that help them break into systems.

19
Q

script kiddies

A

Adolescents (kiddies) or simply inexperienced would-be hackers who obtain hacking tools (scripts) in order to break into computers for fun or just to pass the time.