Chapter 1 & 2: Security Fundamentals and Risk Management Flashcards
Which standards organization publishes the 802.X series of networking standards
Institute of Electrical and Electronics Engineers (IEEE)
Which standards organization developed many common internet protocols and issues RFCs on protocols/protocol updates?
Internet Engineering Task Force (IETF)
Which standards organization is international, creates standards for information technology and security standards and practices, and developed the OSI network model?
International Organization for Standardization (ISO)
Which standards organization is a UN agency, allocates radio spectrum, coordinates satellite orbits, and promotes global technical standards related to networking and communication (H.264 MPEG, X.509 digital certificates)
International Telecommunication Union (ITU)
Which standards organization is a US government agency which develops and supports standards used by other government organizations? Their standards are often used by other organizations with similar technology needs.
National Institute of Standards and Technology (NIST)
Which standards organization is a US signals intelligence agency involved in information gathering, codebreaking and codemaking. They have roles in DES, AES, and SHA.
National Security Agency (NSA)
Which standards organization further the state of web application security and provides guidelines, articles, software tools, and others.
Open Web Application Security Project (OWASP)
Which standards organization develops and maintains interoperable standards for the WWW?
World Wide Web Consortium (W3C)
Which security controls involve organizational policies and training. They include: password policies employee screening training procedures compliance with legal regulations
Managerial
Which security controls are enforced by technology. They include:
firewalls
authentication systems
encryption protocols
Technical
Which security controls are accomplished through employee activities and the execution of policies. They include:
backup management
security assessments
incident response
Operational
Which security controls are accomplished through locks fences video surveillance security guards
Physical
Which control is designed to close a gap in an existing control structure?
Preventative
Which control is designed to detect an active threat and record as evidence
Detective
Which control is designed to minimize the harm caused by a security breach and to prevent recurrence?
Corrective
Which control discourages attack or intrusion
Deterrent
What is a federal law designed to protect investors from fraudulent corporate accounting practices? It primarily applies to publicly traded companies and public accounting firms that do business in the US and primarily regulates the preservation, auditing and disclosure of financial records and related communications.
Sarbanes-Oxley Act of 2002 (SOX)
Which act applies to all federal agencies and requires every agency to develop, document, and implement an information security and protection program, and provides guidelines for doing so?
Federal Information Security Management Act (FISMA)
What is a federal law designed to protect health insurance coverage, protects the privacy of patient records, defines PHI, and regulates how it can be used or disclosed.
Health Insurance Portability and Accountability Act (HIPAA)
What is a federal privacy law that governs access to educational records, requires that adult student or the parents of minor students have access to their records, and limits how those records can be shared with others?
Family Educational Rights and Privacy Act (FERPA)
What act protects the customers of financial institutions by setting minimum standards for financial institutions to safeguard clients and customers personnel information.
Gramm-Leach-Bliley Act (GBLA)