8.2) Controls for information security (policies and procedures) Flashcards
In summer 2021, retail giant Amazon’s financial records revealed that officials in Luxembourg issued a €___ million ($877 million) for breaches of the GDPR. According to a blog post by cybersecurity vendor Tessian, the full reasons behind the fine haven’t yet been confirmed, but it is believed to involve cookie consent. Amazon is said to be appealing the fine, with a spokesperson stating, “There has been no ____ breach, and no customer data has been exposed to any third party.”
746
no
Retail pharmacy group Dis-Chem has been found guilty of contravening various sections of the Protection of Personal Information Act (_______) after a cyber-attack compromised the personal records of more than ______ million South Africans last year. The Information Regulator has now given the retailer instructions to ensure people’s personal information is sufficiently safeguarded, or face a fine of up to R___ million or even imprisonment.
POPIA
Three
10
What are information security controls?
Information security controls are measures and mechanisms put in place to protect the confidentiality, integrity, and availability of information assets.
What role does information security controls play?
Information security controls play an indispensable role in safeguarding valuable information assets, assuring the CIA triad requirements are met.
True or false, In the current relentless battle against cyber threats, organizations require a solid and advanced platform that empowers them to fortify their information security defenses effectively.
True
What are the three primary categories of information secuirty controls? (3)
- Preventive controls
- Detective Controls
- Response controls
What are the types of preventive coontrols? (3)
1) Administrative controls
2) Process controls
3) IT solution
What are administrative controls? (4)
- Developing policies and procedures [e.g., GDPR,POPIA]
- Offering information security training
- Creation of cybersecurity awareness culture
- Change controls and change management
What are process controls? (4)
- User access control
- Penetration testing
- Backup and recovery plans
- Log analysis
What are IT solution controls? (3)
- Anti-malware
- Network access controls
- Encryption
What are the types of detective controls? (2)
1) Phyical security controls
2) Intrusion detection controls
What are physical security controls? (3)
- Surveillance systems: installing CCTV cameras and other monitoring devices
- Locks and biometric systems
- Secured fences and Guards
What are intrusion detection controls? (4)
- Network-based Intrusion Detection Systems (NIDS)
- Host-based Intrusion Detection Systems (HIDS)
- Anomaly Detection Systems (ADS)
- Hybrid Intrusion Detection Systems (HIDS)
What are Network-based Intrusion Detection Systems (NIDS)
- Systems that monitor network traffic to identify real-time anomalies
What are Host-based Intrusion Detection Systems (HIDS)?
Systems that installed on servers or workstations to detect unauthorized malicious behavior