4. Information Management Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is Data Governance?

A

Programs that identify, track, and manage sensitive information for an organization, ensuring that data handling practices are consistent with the organization’s policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is included in Data Governance?

A
  1. Building a data inventory
  2. Data classification
  3. Data flow mapping
  4. Data lifecycle management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some data inventory types?

A
  • Personally identifiable information (PII)
  • Protected health information (PHI)
  • Financial information
  • Government information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is data classification?

A

Data categories based on the sensitivity of the information and the impact on the organization should the information be inadvertently disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the business data classification typically used

A
  • Highly sensitive
  • Sensitive
  • Internal
  • Public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data flow mapping?

A

Tracking the ways the organization receives, handles, shares, and disposes of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are data flow diagrams helpful?

A

Helps the privacy professional understand the movement of information through their organizations and also contribute to their ability to manage the full data lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data minimization

A

Collecting the smallest possible amount of information to meet the business requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is purpose limitation

A

Data should only be used for the purpose that it was originally collected and that was consented to by the data subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain data retention

A

Guides end of the data lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the stages of the data lifecycle?

A
  1. Data creation
  2. Data storage
  3. Data sharing and usage
  4. Data archival
  5. Data deletion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List some cybersecurity threat actors

A
  • Script Kiddies
  • Hacktivist
  • Criminal syndicates
  • Advanced Persistent Threats (APT)
  • Insiders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ransomware?

A

Ransomware combines traditional malware techniques with the weaponization of encryption technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an incident event?

A

Any observable occurrence in a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an incident adverse event?

A

Any event that has negative consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an security incident?

A

Violation or imminent threat of violation of security policies, acceptable use policies, or standard security practices

17
Q

What is the Computer Security Incident Response Team (CSIRT) responsible for?

A

Responding to computer security and privacy incidents that occur within an organization by following standardized response procedures and incorporating their subject matter expertise and professional judgement

18
Q

What are the phases of Incident Response?

A
  1. Preparation
  2. Detection and Analysis
  3. Containment, Eradication, and Recovery
  4. Post-incident activity
19
Q

List some events that happen during the Incident Response Preparation phase

A
  • Proper policy foundation
  • Operating procedures
  • Appropriate training
  • Prepares to respond to an incident
  • Building strong cybersecurity defenses
  • Purchase cyberinsurance
20
Q

NIST 800-61, Computer Security Incident Handling Guide, describes four major security event indicators. What are they?

A
  • Alerts that originate from intrusion detection and prevent system, security information and event management system, antivirus software, file integrity checking software, third-party monitoring services
  • Logs generated by OS, services, applications, network devices, and network flows
  • Publicly available information about new vulnerabilities and exploits
  • People from inside the organization or external sources who report suspicious activity
21
Q

At a high level, what are the containment, eradication, and recovery phase designed to achieve?

A
  1. Select a containment strategy appropriate to the incident circumstances
  2. Implement the selected containment strategy to limit the damage caused by the incident
  3. Gather additional evidence as needed to support the response effort and potential legal action
  4. Identify the attackers and attacking systems
  5. eradicate the effects of the incident and recover normal business operations
22
Q

What happens during the Post-incident Activity?

A

Team members conduct a lessons-learned review and ensure that they meet internal and external evidence retention requirements

23
Q

List some lessons learned questions

A
  • Exactly what happened and at what time?
  • How well did staff and management perform in responding to the incident?
  • Were the documented procedure followed? Were they adequate?
  • What information was needed sooner?
  • Were any steps or action taken that might have inhibited the recovery?
  • What would the staff and management do differently the next time a similar incident occurs?
  • How could information sharing with other organizations have been improved?
    What corrective actions can prevent similar incidents in the future?
  • What precursors or indicators should be watch for in the future to detect similar incidents?
  • What additional tool or resources are needed to detect, analyze, and mitigate future incidents?
24
Q

What key elements should an incident response policies contain?

A
  • Statement of management commitment
  • Purpose and objectives of the policy
  • Scope of the policy (to whom it applies and under what circumstances)
  • Definition of cybersecurity incidents and related terms
  • Organizational structure and definition of roles, responsibilities, and level of authority
  • Prioritization or severity rating scheme for incidents
  • Performance measures for the CSIRT
  • Reporting and contact forms