3.3.1 Laws and Regulations Flashcards

1
Q

What provides a framework for ensuring the effectiveness of information security controls in government. This legislation is intended to protect government information, operations, and assets from any natural or manmade threat.

A

The Federal Information Security Modernization Act (FISMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the HIPAA provide?

A

Sets limits on the use and disclosure of patient information without authorization and grants individuals rights over their own health records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FERPA stands for and does what?

A

FAMILY EDUCATION RIGHTS AND PRIVACY ACT - Requires all schools that receive funds from programs administered by the U.S. Department of Education to comply with standards regarding the disclosure and maintenance of educational records, including educational information, personally identifiable information, and directory information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What regulates the financial practice and governance of corporations. ________is designed to protect investors and the general public by establishing requirements regarding reporting and disclosure practices.

A

Sarbanes-Oxley Act (SOX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Gramm-Leach-Bliley Act (GLBA) does what?

A

Protects the customers of financial institutions, essentially any company offering financial products or services, financial or investment advice, or insurance. The GLBA Privacy Rule requires financial institutions to safeguard a consumer’s “nonpublic personal information,” or NPI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why might a compliance audit be a positive occurrence?

A

Preparing for the audits can help educate participants and and provide opportunities to find and fix problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of data is COPPA concerned with?

A

Children’s Online Privacy Protection Act. Protects under 13 yrs old, privacy, PII, must make reasonable attempt for parental consent - must post privacy policy online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do compliance and security relate to each other?

A

Compliance fills a business need rather than a technical security need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What issues might make conducting an international information security program difficult?

A

Laws are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which NIST Special Publication forms the basis for FISMA and FedRAMP?

A

NIST SP 800-53, Security and Privacy Controls for Information Systems and Organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are industry regulations, such as PCI DSS, important?

A

Protects data, provides security for transactions and necessary security controls. A vendor could lose their ability to process credit card payments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the potential impacts of being out of compliance?

A

industry - could lose support of that company, hefty fines.
Regulatory - jail time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What set of ISO standards might be useful for an information security program?

A

ISO 27000 - Info Sec Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What two items are an indicator of which sets of compliance standards your company might fall under?

A

Industry and location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the difference in Regulatory compliance and industry compliance. BTW, what IS compliance?

A

Compliance refers to adhering to established guidelines, standards, or laws set by regulatory bodies or industries.
Regulatory compliance is mandated by government legislation, whereas industry compliance is often set by industry organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organizations implement _________, _______ , __________ controls to comply with standards and regulations. Each type of control addresses different aspects of security.

A

Organizations implement administrative, technical, and physical controls to comply with standards and regulations. Each type of control addresses different aspects of security:

  1. Administrative Controls: These are policies, procedures, and guidelines that govern the organization’s security practices. They include risk management policies, security awareness training, incident response plans, and access control policies. Administrative controls help ensure that employees understand their roles and responsibilities regarding security.
  2. Technical Controls: These involve the use of technology to protect information and systems. Examples include firewalls, intrusion detection systems, encryption, antivirus software, and access control mechanisms. Technical controls are critical for protecting data from unauthorized access and ensuring the integrity and confidentiality of information.
  3. Physical Controls: These are measures taken to protect physical assets and facilities from unauthorized access or damage. Examples include security guards, surveillance cameras, access control systems (like key cards), and secure areas for sensitive equipment. Physical controls help safeguard the organization’s infrastructure and prevent physical threats.

Together, these controls create a comprehensive security framework that addresses various vulnerabilities and helps organizations comply with relevant standards and regulations.

15
Q

What four activities are involved with maintaining compliance.

A

Monitoring
Review
Document
Report

16
Q

What Act protects children from accessing obscene materials at schools and libraries?

A

The Act that protects children from accessing obscene materials at schools and libraries is the Children’s Internet Protection Act (CIPA). Enacted in 2000, CIPA aims to ensure that schools and libraries take appropriate measures to protect minors from exposure to harmful content on the internet.

Key provisions of CIPA include:

  1. Internet Safety Policies: Schools and libraries that receive federal funding for internet access must develop and implement internet safety policies that include measures to block or filter access to visual depictions that are obscene, child pornography, or harmful to minors.
  2. Filtering Requirements: CIPA requires that schools and libraries use technology protection measures (filters) to prevent minors from accessing inappropriate content online. This includes blocking access to websites that contain obscene materials or that are otherwise harmful to minors.
  3. Parental Involvement: CIPA encourages schools and libraries to involve parents in discussions about internet safety and to provide parents with the option to request that their children be allowed access to specific sites that may be blocked by the filtering measures.
  4. Compliance Monitoring: Schools and libraries must monitor the effectiveness of their internet safety policies and filtering measures to ensure they are adequately protecting minors from harmful content.

CIPA is part of a broader effort to create a safe online environment for children and to address concerns about the potential dangers of the internet in educational and public settings.

17
Q

An Authority to Operate (AOR) is granted by which government compliance standard?

A

FISMA

18
Q

What does FED-RaMp stand for what what do they govern?

A

Federal Risk and Authorization Management program. Covers cloud based technologies.

19
Q

What Data collection regulation protects European Union members from collection without their consent?

A

GDPR - General Data Protection Regulation

20
Q

What is the name of the body that created a standard across nations?

A

ISO - International Standard Organization

21
Q

What part of the CIA triad does block chain provide?

A

Integrity; You can say this wasn’t altered with a high degree of certainty.

22
Q

What are the 6 risk management framework steps forming the basis of many security programs?

A

The six risk management framework steps that form the basis of many security programs are:

  1. Categorize: Identify and categorize information systems and the data they process based on the impact that a security breach could have on the organization. This step involves assessing the types of information processed and determining the appropriate security controls needed based on the categorization (low, moderate, or high impact).
  2. Select: After categorization, the next step is to select the appropriate security controls to protect the information systems. This involves referencing frameworks and guidelines (such as NIST SP 800-53) to choose controls that align with the identified risks and organizational requirements.
  3. Implement: This step involves the actual implementation of the selected security controls. Organizations deploy technical, administrative, and physical controls as outlined in their security plans to mitigate identified risks and protect their information systems.
  4. Assess: Once controls are implemented, organizations must assess their effectiveness. This assessment includes evaluating how well the controls are functioning and determining whether they are adequately mitigating the identified risks. This may involve testing, evaluating, and reviewing the controls.
  5. Authorize: After assessing the controls, the next step is to authorize the system for operation. This involves a formal decision by management to accept the risk associated with the information system, based on the assessment results. This step often includes the approval of a security authorization package.
  6. Monitor: The final step involves continuous monitoring of the information systems and their security controls. Organizations must regularly review and update their risk management practices, assess changes in the risk environment, and ensure that controls remain effective over time.

These steps provide a structured approach to managing risks within an organization and are essential for developing and maintaining effective security programs.

23
Q

What are the three cloud offerings?

A

Infrastructure as a Service
Platform as a service
Software as a service

24
Q

To send an email which cloud model would you use?

A

SaaS - need to keep things simplified. Why build a server, configure mail software (IaaS)?

25
Q

In a cloud model, who takes responsibility for the portions of the the environment the user can’t control?

A

The cloud provider.

26
Q

Why do cloud services pose technological challenges related to compliance?

A

Because they are shared resources. If using cloud resources on same host server as another company, that company’s lack of security could impact your system as well.

27
Q

Privacy Issues can also be referred as?

A

PII

27
Q

Dictionary definition of ____________ is “the state or condition of being free from being observed or disturbed by other people”

A

privacy

27
Q

What four procedural rights does the Federal Privacy Act of 1974 provide to Americans?

A

First, it requires government agencies to show an individual any records kept on him or her. Second, it requires agencies to follow certain principles, called ‘fair information practices,’ when gathering and handling personal data. Third, it places restrictions on how agencies can share an individual’s data with other people and agencies. Fourth and finally, it lets individuals sue the government for violating its provisions” [6].

28
Q

SOX regulates ____________ _________ and _____________ of publicly traded companies

A

records retention; accuracy

29
Q

Which type of algorithm is an asymmetric key?

ECC

MD5

SHA

DES

A

ECC; It’s an example of public key cryptography based on elliptic curves over infinite fields

30
Q
A