Information and Data Security Flashcards

1
Q

What must be addressed in the written information security program?

When must it be updated?

A

Written information security program requires:
Ensure the security and confidentiality of member info

Protect against any anticipated threats or hazards to the security and integrity of the information

Protect against unauthorized use or access of that information that could result in harm to the member

Ensure proper disposal and destruction of information

FOCUS ON HARM TO THE MEMBER

Timing: at least on an annual basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does NCUA require from CUs in the event of a catastrophic act?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How should a credit union certify compliance with NCUA’s security program requirements?

A

§ 748.1 Filing of reports. (a) The president or managing official of each federally insured credit union must certify compliance with the requirements of this part in its Credit Union Profile annually through NCUA’s online information management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of the CUs board in the information security program?

What is their role with regard to IT oversight?

A

At the outset, the board,
or appropriate committee, should approve the written information security program.
Thereafter, the board or appropriate committee must oversee the implementation and
maintenance of the program. These duties include assigning specific responsibility for
implementing the program and reviewing reports prepared by management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What must be addressed in the response program for unauthorized access to member information?

When does the response program apply?
Is member notice required?

If so, what must be included in the notice?

A

Response program must:
assess the nature and scope of any incident
Identify what member information has been accessed
Contain & control the incident to prevent further unauthorized accesss
Preserve records and evidence
File SAR
Notify regulator

Timeline:
1. Investigation
2. Standard for Notice (notification where misuse of the information)
3. Timing of the Notice: Notification ASAP unless it is delayed by law enforcement
*Review state requirement

Member notice:
1.general terms and type of member compromised
2. Steps CU is taking to protect members from further unauthorized access
3. Steps members can take to protect themselves from harm
4, Notification must also provide some FTC guidance regarding steps member can take to stop ID theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When must a CU report a cyber incident to NCUA?

What information must be reported?

A

CU must report no later than 72 hours after it reasonably believes that a reportable cyber incident has occurred or being notified by a third-party, whichever is sooner.

CU must report:
1. Services that were impacted
2. If sensitive data or member information compromised?

Letter to CU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are IT audits required?

What is necessary for an IT audit to be valid?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the structure and purpose of the FFIEC Cybersecurity Assessment Tool?

A

The assessment tool asks you questions about how you manage cyber security for your business. Based on your answers, it will determine your current cyber security maturity level. It will then provide you with guidance on how to improve. You can download this guidance as a PDF, so you can track your progress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Info and Data Security Program requirements

A

Must be risk based

Authentication procedures and limited access
Clean desk policies and secure storage
Encrypting information while in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly