5.2 Regulations and Standards Flashcards

1
Q

GDRP

A

General data protection regulation- strengthens the regulation of users data in the uk or company’s processing uk data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DPO

A

Data protection officer ensures company compliance with GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PCI DSS

A

Payment card industry data security standard- standard for protecting credit card processing
It is a global standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PCI DSS level 1

A

Company processes over 6 million credit cards a year
Validation requirement- annual on-site assessment for compliance by a qualified exit security assessor (QSA)
Compliance validation- submission of annual report on compliance and quarterly net scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PCI DSS Level 2

A

Company processes 1 to 6 million transactions
Validation-annual self-assessment questionnaire(SAQ) or onsite audit from a QSA
Compliance-quarterly net scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PCI DSS Level 3

A

20,000 to 1 million transactions
Validation-Annual SQA or onsite by QSA
Compliance- quarterly net scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PCI DSS Level 4

A

Processes u under 20,000 transactions
Validation- annual SQA or on-site by QSA
Compliance-maybe quarterly net scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security frameworks

A

Help you to secure a company network with guidelines and best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIS framework

A

Center for internet security- framework to improve security posture designed to address high priority security issues.
3 implementation groups:
Basic cyber hygiene-first basic control steps
Foundational cyber hygiene-builds on basic
Advanced cyber hygiene-most advanced cyber tools setting up detecting and alerting security events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST RMF

A

National Institute of standards and technology risk management framework-mandatory framework for us federal agencies and companies handling federal data.
Six step process-
1.)categorize(classify data processed stored and transmitted by systems based on cia triad)
2.)select- identify and choose security controls based on determined security levels
3.)implement-implement controls
4.)Asses- check if controls working properly
5.)Authorize-Decide if systems and controls will be put into production environment
6.)monitor-Regularly monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIST Csf

A

NIST cyber security framework-Commercial company NIST framework
3 areas in framework-
1.) Framework core-
Identify-risks,processes,assests
Protect-assets
Detect-threats
Respond
Recover
2.)framework implementation-Tiers used to describe organization security posture 4 tiers
Tier 1-partial-company has as hoc approach and little knowledge of risk and strategy
Tier 2-risk informed- aware of risks and may have a documented approach to events
Tier 3-Repeatable-well document and repeatable approaches to events
Tier 4- company had repeatable and well documented approaches to event and is very adaptive to new events
3.) framework profile alignment of standard, guideline and regulations to framework core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO/IEC

A

International organization for standardization/International electrotechnical commission
4 important standards
ISO/IEC 27001
ISO/IEC 27002
ISO/IEC 27701
ISO/IEC 3100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISO/IEC 27001

A

International organization for standardization/ International electrotechnical commission 27001-Concerned with Information security management systems (isms) which protect sensitive data with processes, policies and procedures
Uses plan-do-check-act
Plan-establish isms and define objectives
Do- implement isms
Check-monitor isms
Act-Take corrective and preventative actions to improve isms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISO/IEC 27002

A

Provides guidance of best practices for implementing controls on isms , this acts as more of a guide for bettering isms while 27001 is set of requirements and structure for isms for a company to get the 27001 certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISO/IEC 27701

A

Provides guidelines and a framework for establishing,implementing and maintaining a privacy information management system (PIMS)-focused mainly on jsut privacy for data rather then informations security as a whole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISO/IEC 3100

A

Risk management practices

17
Q

SSAE SOC 2 type 1/11

A

From AICPA(American institute of certified public accountants) called statement on standard for attestation engagements- This is an accounting standard 2 types
Type 1- assess the security posture of a company at that given time
Type 2- asses the security posture of a company and its operations over a period of at least 6 months

18
Q

CSA

A

Cloud security alliance-cloud sec framework, created a ccm
CCM-cloud controlled matrix framework-this is where cloud clntrols are mapped to standards, best practices, and regulations.

19
Q

FERPA

A

Family educational rights and privacy act- requires that educational institutions implement security and privacy controls for student educational records

20
Q

SOX

A

SOX-Sarbanes -Oxely act- dictates requirement for storage and Retention of documents relating to organizations financial and business operations
-relevant for any publicly traded company with market value of 75 million or more

21
Q

GLBA

A

GLBA-Gramm-leach-bliley act- are requirements for institutes that help protect the privacy of an individual financial info that’s is held by a financial institution