Extra Practice Flashcards
Due Care
A legal concept pertaining to the duty owed by a provider to a customer.
practicing the individual activities that maintain the due diligence effort.
I’m doing care
Due diligence
“Actions taken by a vendor to demonstrate/provide due care.
establishing a plan, policy, and process to protect the interests of an organization.”
Control Objectives for Information and Related Technologies (COBIT)
“Documented set of best IT security practices crafted by the Information Systems Audit and Control Association (ISACA).
Sy. 22
Controls orbit our technologies
Provide Stakeholder Value
Holistic Approach
Dynamic Governance System
Governance Distinct from Management
Tailored to Enterprise Needs
End-to-End Governance System”
STRIDE
A Microsoft threat categorization scheme composed of spoofing, tampering, repudiation,
information disclosure, denial of service, and elevation of privilege.
Steps of Decomposition Process
“Trust boundaries, where levels of security changes
dataflow paths, movement of data between locations
input points, where external input is received
Privileged operations, any activity that requires greater privileges, making changes to security or system changes.
Details of security stance, mapping to security policy and assumptions”
authorization to operate (ATO)
Often related to government or military agencies or contractors, an ATO is the formal approval to perform business functions once compliance with a contract, standard, framework, or regulation is confirmed. An ATO is often issued for a limited period of time and can be lost or canceled by the approving authority at any time based on any significant change to the environment.
Authorizing Official (AO)
“An authorized entity who can evaluate an IT/IS system, its operations, and its risks, and potentially issue an ATO. Aka designated approving authority (DAA), Approving Authority (AA), Security Control Assessor (SCA), and Recommending Official (RA).
5 years”
Annualized Loss Expectancy
“the possible yearly loss of all instances of a specific realized threat against a specific asset.
ALE = ARO * SLE (ale is arousal)”
Single-loss expectancy (SLE)
“percentage of loss that an organization would experience if a specific asset were violated by a realized risk.
SLE = Asset Value * Exposure Factor”
Risk
The possibility of damage or harm and the likelihood that damage or harm will be realized.
Threat* Vulnerability
Residual Risk
“The risk remaining after security controls have been put in place as a means of risk mitigation.
Risk that remains “
Inherent risk
The level of natural, native, or default risk that exists in an environment, system, or product prior to any risk management efforts being performed.
Security professional
Has the functional responsibility for security, including writing the security policy and implementing it.
Senior management
Ultimately responsible for the security maintained by an organization and should be most concerned about the protection of its assets.
Business Continuity(BC) Steps
- Project Scope and planning: review the organization, create a bcp team, assess resources available, get legal information.
- Business Impact Analysis: Identify processes, critical tasks, assess likelihoods, find priorities, MTD, RTO, RPO, Identify risks and likelihood.
- Continuity Planning: Strategy development and provisions and processes, Continuity of Operations Plan (COOP)
- Approval and Implementation:
Disaster recovery(DR)
Those tasks and activities required to bring an organization back from contingency operations and reinstate regular operations. Disaster recovery plans pick up where business continuity plans leave off. After a disaster strikes and the business is interrupted, the disaster recovery plan guides response teams in their efforts to quickly restore business operations to normal levels.
Bureau of Industry and Security
within the Department of Commerce sets regulations on the export of encryption products outside of the United States. The other agencies listed here are not involved in regulating exports.
Federal Information Security Management Act (FISMA)
includes provisions regulating information security at federal agencies. It places authority for classified systems in the hands of the National Security Agency (NSA) and authority for all other systems with the National Institute for Standards and Technology (NIST).
Communications Assistance for Law Enforcement Act (CALEA)
required that communications carriers assist law enforcement with the implementation of wiretaps when done under an appropriate court order. CALEA only applies to communications carriers and does not apply to financial institutions, healthcare organizations, or websites.
Fourth Amendment
sets the “probable cause” standard that law enforcement officers must follow when conducting searches and/or seizures of private property. It also states that those officers must obtain a warrant before gaining involuntary access to such property.
Privacy Act of 1974
limits the ways government agencies may use information that private citizens disclose to them under certain circumstances.
HIPAA Relationships with 3rd Party
Organizations subject to HIPAA may enter into relationships with service providers as long as the provider’s use of protected health information is regulated under a formal business associate agreement (BAA). The BAA makes the service provider liable under HIPAA.
Gramm–Leach–Bliley Act (GLBA)
provides, among other things, regulations regarding the way financial institutions can handle private information belonging to their customers.
Data Destruction
the final stage in the life cycle of backup media