5.4 - 5.5 Flashcards
Risk managment types
Legacy systems, internal external threats or multiple parties , ip theft, etc
Acceptance - thats life we will accept the risk
Risk avoidance- use alternative devices
Transference - like cybersec insurance
Sec hardware
Evaluating risk
Risk register
Risk matrix (heatmap)
Inherent risk
Residual risk
Risk appetite
Find and fill gaps with a formal security audit or self assessment add more sec controls for high levels of risk areas like firewalls so now required compliance is every year
Risk awareness
Business impact analysis
Recovery time Objective rto when back up
Recovery point objective at what point to turn on rpo
Mean time repair mttr time to fix
Mean time between failures mtbf
Functional recovery plan
Plan from outage to back up running, contact of key players, full technical process and list of steps, then test system, then resume
Privacy impact assessment pia
How new products will affect customers data and privacy and this process can be public to build trust
Data classification
Label sensitivity for diff documents requiring different levels of protection information
Proprietary
Personably identifiable information
Protected health information
Public/unclassified
Private/classified/ restricted/internal use
Sensitive
Confidential
Critical
Enhancing privacy
Tokenization
Data minimization
Data masking
Anonymization
Pseudo anonymization
Data roles
Data owner
Data controller
Payroll controller
Data steward
Data protection officer