CIA Triad Flashcards

1
Q

CIA Strategy steps.

A

Risk assessment, Disaster recovery, Employee security policy, Security Audit, Regulatory Standard, and Security Dashboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify risks that could occur. ie. DDoS, or insider fraud

A

Step 2 of Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Regulatory Standard that requires health plans, and medical service providers to regulate the use and disclosure of an individual’s health information.

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Perform cost-benefit analysis. How much security is worth the risk

A

Step 7 Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Assess frequency, and likelihood of events.

A

Step 3 of Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What part of the CIA strategy involves checking how well implemented a security policy is?

A

Security Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determine how each threat can be mitigated. How can we minimize damage?

A

Step 5 Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Determine wether or not to implement, or reassess

A

Step 8 Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Regulatory Standard that requires financial institutions to assist U.S. government to detect and prevent money laundering

A

Bank Secrecy Act of 1970

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Regulatory Standard that requires organizations doing business with those in the EU with a mechanism to comply with EU data protection requirements

A

European Union - United states privacy shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify assets that support mission, or primary goals. Most important assets.

A

Step 1 of Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Regulatory standard that requires every federal agency to provide information security for the data and information systems that support the agency’s operations and assets.

A

Federal Information Security Management Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Regulatory standard that requires any person that engages in foreign engagements to not make certain payments to foreign persons, and to maintain accurate records

A

Foreign Corrupt Practices Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Determine the impact of each threat. How bad will it hurt?

A

Step 4 of Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Regulatory Standard that requires companies that offer financial products or services to take care with the collection, disclosure, and protections of consumers nonpublic personal information.

A

Gramm-Leach-Bliley Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what rule of the GLBA prohibits deceptive methods of obtaining personal financial information, and encourages financial institutions to safeguard against doing so?

A

Pretexting provisions

17
Q

What rule of the GLBA requires the establishment of security measures to prevent data breeches?

A

Safeguard Rule

18
Q

Rule of the GLBA that the financial institution must tell the customer what data is gathered, who get’s to use it, how it’s used and how it’s protected.

A

Privacy Rule

19
Q

Assess feasibility of implementing mitigation options

A

Step 6 Risk Assessment

20
Q

Regulatory Standard that requires all organizations that transmit payment card data to ensure the safe handling of cardholder information.

A

Payment Card Industry Data Security Standard

21
Q

Regulatory Standard that requires all public corporations to protect shareholders and general public from accounding errors and fraud.

A

Sarbanese-Oxley Act

22
Q

CIA Strategy step used to display key performance indicators related to an organization’s security defense

A

Security Dashboard

23
Q

Methods for implementing CIA at the application level

A

Authentication methods, User Roles and Accounts, and data encryption

24
Q

Methods for implementing CIA at the End-User Level

A

Security Education, Authentication Methods, Anti-virus software, and data encryption