Compliance, Laws, and Regulations Flashcards

1
Q

What is compliance in cybersecurity?

A

Adherence to rules and regulations that govern information security within an industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two main types of compliance?

A

Regulatory Compliance – Mandated by law (e.g., HIPAA, GDPR).
Industry Compliance – Best practices not legally required (e.g., PCI DSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the consequences of noncompliance with regulatory laws?

A

Fines, lawsuits, loss of business, or even criminal penalties (e.g., jail time).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the consequences of noncompliance with industry standards?

A

Loss of certifications, inability to do business, and reputational damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three main types of security controls?

A

Physical Controls – Protect physical security (e.g., locks, cameras, guards).
Administrative Controls – Policies and procedures (e.g., security training, audits).
Technical Controls – Security technologies (e.g., firewalls, IDS, encryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between key controls and compensating controls?

A

Key Controls – Primary security measures that must not fail (e.g., antivirus on payment systems).
Compensating Controls – Alternative controls when key controls are not feasible (e.g., extra monitoring if MFA isn’t available).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are four key actions to maintain compliance?

A

Monitoring – Continuously check if controls are working.
Reviewing – Periodically assess effectiveness.
Documenting – Keep records of compliance efforts.
Reporting – Communicate compliance status to leadership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is FISMA (Federal Information Security Management Act)?

A

A 2002 law requiring U.S. federal agencies to secure government information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is FedRAMP (Federal Risk and Authorization Management Program)?

A

A 2011 program that sets security standards for cloud services used by federal agencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does HIPAA (Health Insurance Portability and Accountability Act, 1996) protect?

A

The privacy and security of protected health information (PHI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SOX (Sarbanes-Oxley Act, 2002) regulate?

A

Financial data integrity for publicly traded companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does GLBA (Gramm-Leach-Bliley Act, 1999) require?

A

Financial institutions must protect customer financial data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of CIPA (Children’s Internet Protection Act, 2000)?

A

Requires schools and libraries to filter harmful online content for minors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is COPPA (Children’s Online Privacy Protection Act, 1998)?

A

Protects the privacy of children under 13 by limiting data collection from websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does FERPA (Family Educational Rights and Privacy Act, 1974) protect?

A

The privacy of student educational records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is GDPR (General Data Protection Regulation, 2018)?

A

A European Union law that protects personal data and privacy of EU citizens.

17
Q

What are the key ISO (International Organization for Standardization) standards for security compliance?

A

ISO 27000 – Security management terminology.
ISO 27001 – Security management requirements.
ISO 27002 – Best practices for implementing security controls.

18
Q

What are the two key NIST (National Institute of Standards and Technology) publications for compliance?

A

SP 800-37 – Risk Management Framework (RMF) for federal systems.
SP 800-53 – Security and Privacy controls for federal systems.

19
Q

What are the three main cloud service models?

A

Infrastructure as a Service (IaaS) – Provides virtual machines and storage (e.g., AWS, Google Cloud).
Platform as a Service (PaaS) – Provides prebuilt server environments (e.g., Azure, Heroku).
Software as a Service (SaaS) – Provides full applications (e.g., Microsoft 365, Google Docs).

20
Q

Which cloud model requires the most responsibility for security?

A

IaaS (Infrastructure as a Service) – The customer must secure operating systems, apps, and data.

21
Q

Which cloud model requires the least responsibility for security?

A

SaaS (Software as a Service) – The provider secures everything except user access.