Chapter 1, Today's Cyber Security Analyst Flashcards
If security controls are focused on protecting data, privacy controls are focused on what?
privacy controls focus on the ways a company can use and share information it has collected about individuals.
GAPP are strong best practices for implementing a ______ program.
privacy program
Which GAPP principle does the following align to? “The entity monitors compliance with its privacy policies and procedures and has procedures to address privacy-related complaints and disputes.”
a. Monitoring and enforcement
b. Use, retention, and disposal.
c. Choice and consent.
a. Monitoring and enforcement
Which GAPP principle does the following align to? “The entity protects personal information against unauthorized access (both physical and logical).”
a. Access.
b. Collection.
c. Security for privacy.
C. Security for privacy.
Which GAPP principle does the following align to?
“The entity describes the choices available to the individual and obtains implicit or explicit consent with respect to the collection, use, and disclosure of personal information. “
Choice and Consent
Which GAPP principle does the following align to? “the entity limits the use of personal information to the purposes identified in the notice and for which the individual has provided implicit or explicit consent. The entity retains personal information for only as long as necessary…”
Use, retention, and disposal.
What is the definition of a Threat?
is any circumstance or event that has the potential
to compromise confidentiality, integrity, or availability.
Risk is the possibility or likelihood of…
threat exploiting a vulnerability
resulting in a loss
The combination of ______ x _____ equals the Risk
Threat x Vulnerability
Which NIST document guides for conducting risk assessments?
(SP) 800-30
In the NIST SP 800-30, what are the first two tasks in Step 2 of Conducting the risk assessment?
1- Identify Threats
2 - Identify vulnerabilities
In the NIST SP 800-30, what are the 3-4 and 5 tasks in Step 2 of Conducting the risk assessment?
3 - Determine likelihood of occurrence
4 - determine magnitude of impact
5 - determine risk
What kind of environment would you only use Mandatory Access Control approach to security? Why? Which operating system can enforce it?
In highly sensitive applications. This is because it is tricky to manage.
SELinux can enforce it
Which NIST document guides on conducting pen tets?
800-115
What are the 3 phases of the pen test planning stage?
Timing
Scope
Authorization