CSCS Training Flashcards

1
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IoMT

A

Internet of Medical Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mirai

A

Japanese word for the “future”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CCPA

A

California Consumer Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When did the CCPA go into affect?

A

January 1, 2020

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does CCPA grant people?

A

It grants California residents’ new privacy rights and will provide California residents with more control over their personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DBIR

A

Data Breach Investigations Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ransomware

A

When the hacker takes the owners information and makes him pay money to get his own files back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GLB

A

Gramm Leach Bliley

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

GLB applies to financial institutions in the USA

A

Banks, securities firms, insurance companies, and other companies selling financial products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is 21 CFR Part 11 designed for?

A

To prevent fraud while permitting the widest possible use of electronic technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the 21 CFR Part 11 effective date?

A

1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NERC

A

North American Electric Reliability Council

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CIP

A

Critical Infrastructure Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIP Standards

A
CIP-002 Critical Cyber Assets
CIP-003 Security Management Controls
CIP-004 Personnel and Training
CIP-005 Electronic Security
CIP-006 Physical Security 
CIP-007 Systems Security Management
CIP-008 Incident Reporting Response Planning
CIP-009 Recovery Planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SOX

A

Sarbanes Oxley Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who is responsible for misrepresentation of financial data?

A

SOX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Title I of the SOX legislation?

A

Public Company Accounting Oversight Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PCAOB

A

Public Company Accounting Oversight Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Title II for the SOX legislation?

A

Auditor Independence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Title III for the SOX legislation?

A

Corporate Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Title IV for the SOX legislation?

A

Enhanced Financial Disclosures?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SEC

A

Securities and Exchange Commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

COSO

A

Committee of Sponsoring Organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define COSO

A

An acceptable framework to define internal controls for financial reporting systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How many titles are in the SOX?

A

11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the SOX title V?

A

Analyst Conflicts and Interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Title VI of the SOX?

A

Commission Resources and Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Title VII of the SOX?

A

Studies and Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Title VIII of the SOX?

A

Corporate and Criminal Fraud Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is section 802?

A

Criminal Penalties for Altering Documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Title IX of the SOW?

A

White-Collar Crime Penalty Enhancements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Title X of SOX?

A

Corporate Tax Returns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Title XI of SOX?

A

Corporate Fraud and Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

FTC

A

Federal Trade Commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the FTC strategic goals?

A

Protect Consumers, Maintain Competition, and Advance Organizational Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

AICPA

A

American Institute of Certified Public Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

SOC

A

Service Organization Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SOC 2

A

Controls at service organization that are relevant to security, availability, and processing integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

5 Trust Service Principals

A

Security, Availability, Processing integrity, Confidentiality, and Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which country has PIP?

A

Japan

42
Q

PIP

A

Personal Information Protection

43
Q

When did PIP get effective

A

May 2003

44
Q

Which country has PIPEDA?

A

Canada

45
Q

PIPEDA

A

Personal Information Protection and Electronic Document Act

46
Q

When did PIPEDA become effective?

A

April 2000

47
Q

Benefits of ISO

A

A reduction in security incidents, confidence to interested parties, reduction in financial losses, reduction in costs for correction, protection of brand and reputation, tender advantage, and consistency across sites

48
Q

ISO 27799

A

Defines guidelines to support the interpretation and implementation in health informatics of ISO

49
Q

ISO

A

Information Security Organization

50
Q

What does ISO 27799 apply to?

A

Health information in all aspects

51
Q

Structure of ISO standards

A
  1. Scope
  2. Normative References
  3. Terms and Definitions
  4. Context of Organizations
  5. Leadership
  6. Planning
  7. Support
  8. Operation
  9. Performance Evaluation
  10. Improvements
52
Q

ISO 27001 specifies the requirements

A

Establishing, implementing, maintaining, and frontally improving ISMS

53
Q

ISMS

A

Information Security Management System

54
Q

What does the IMS preserve?

A

CIA which is Confidentiality, Integrity, and Availability.

55
Q

What is scope?

A

Provide an overview of ISMS and terms and definitions commonly used in the ISMS family of standards

56
Q

How many Terms and Definitions are there?

A

89

57
Q

Examples of Terms and Definitions?

A

Confidentiality, Control Objective, Level of Risk, Process, Risk Analysis, and Vulnerability

58
Q

ISMS benefits

A

Reduction in security incidents, confidence to interested policies, reduction in financial losses, protection of brand and reputation, competitive, and consistency across sites.

59
Q

Context of the Organization

A
  1. 1 Understanding the organization and its context
  2. 2 Understanding the needs and expectations of the interested parties
  3. 3 Determining the scope
  4. 4 Information Security Management System
60
Q

HIPAA

A

Healthcare

61
Q

Leadership

A
  1. 1 Leadership and Commitment
  2. 2 Policy
  3. 3 Organizational roles
62
Q

Planning addresses what?

A

Risk and Opportunities

63
Q

Planning shall

A

Define and apply an information security risk treatment process

64
Q

Support

A

Shall determine and provide the resources needed for establishment, implementation, maintenance, and to continue to improve ISMS

65
Q

Operation

A

Shall plan, implement, and control the process needed to meet information security requirements, and the implement the actions in 6.1

66
Q

7.1

A

Resources

67
Q

7.2

A

Competence

68
Q

7.3

A

Awareness

69
Q

7.4

A

Communications

70
Q

7.5

A

Documented Information

71
Q

6.1

A

Actions to Address risk and opportunities

72
Q

6.2

A

Information security objective and planning to achieve them

73
Q

5.1

A

Leadership and Commitment

74
Q

5.2

A

Policy

75
Q

5.3

A

Organizational roles, responsibilities, and authorities

76
Q

4.1

A

Understanding the organization and its context

77
Q

4.2

A

Understanding the needs and expectations of the interested parties

78
Q

4.3

A

Determining the scope

79
Q

4.4

A

Information Security Management System

80
Q

Performance Evaluation

A

Shall evaluate the information security performance and the effectiveness of the information security management system

81
Q

9.1

A

Monitoring, measurement, analysis, and evaluation

82
Q

9.2

A

Internal audit

83
Q

9.3

A

Management Review

84
Q

Improvement

A

Corrective actions shall be reasonable to the effects of the nonconformities encountered

85
Q

10.1

A

Nonconformity and corrective action

86
Q

10.2

A

Continual Improvement

87
Q

Documentation Requirements

A
Scope of ISMS
Information security policy
Information security risk assessment process
Information security risk treatment process
Statement of applicability
Information security objectives
Evidence of competence
Documented evidence
Operation planning and control
Risk assessments results 
Risk treatments results
Evidence of monitoring and measurement
Evidence of monitoring and measurement 
Evidence of audit programs and results
Evidence of management reviews/results
Evidence of nonconformities and subsequent actions
Evidence or results of corrective actions
88
Q

What is ISO 27002 designed for?

A

Reference for selecting controls within the process of implementing an ISMS based ISO 27001 or to guide for developing their own information security guidelines

89
Q

What does ISO 27002 discuss?

A
Information security requirements 
Selection of Controls
Developing guidelines
Lifecycle considerations 
Related Standards
90
Q

Security Control Clauses

A

Information Security Policies, Organization of Information Security, Human Resources Security, Asset Management, Access Control, Cryptography, Physical and Environmental Security, Operation Security, System Acquisition, Supplier Relationships, Information Security Incident Management, Information Security Aspects of Business Continuity Management

91
Q

Information security policies should include

A

Business strategy
Regulations, legislation, and contracts
Current and Projected Information Security Threat Environment

92
Q

Information Security Policies

A

To provide management direction and support for information security in accordance with business requirements

93
Q

Information Security Policy is approved by what?

A

The highest level of management and sets out the organization’s approach to managing its information security objectives

94
Q

Information Security Policies Controls what?

A

Policies for information security and the review of the policies for information security

95
Q

Who publishes DBR?

A

Verizon

96
Q

Which agency introduced CFR Part II?

A

FDA

97
Q

Categories for Identity

A

Asset Management, Business Environment, Governance, Risk Assessment, Risk Management Strategy, Supply Chain Risk Management

98
Q

Categories for Protect

A

Identify Management and Access Control, Awareness Control, Data Security, Information Protection Processes and Procedures, Maintenance, Protective Technology

99
Q

Detect categories

A

Anomalies and Events, Security Continuous Monitoring, and Detection Processes

100
Q

Respond categories

A

Response planning, communications, analysis, mitigation, and improvements

101
Q

Recover categories

A

Recovery planning, improvements, and communications