Information Security and Data Breach Flashcards

1
Q

Controls

A
  1. Physical controls: locks, security cameras, and fences
  2. Administrative controls: incident response procedures and employee training
  3. Technical controls: firewalls, antivirus software, and access control lists and logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Measures

A
  • Designate an individual who is responsible
  • Anticipate risks and take appropriate steps to mitigate such risk
  • Develop program
  • Impose penalties for violations of the program rules
  • Appropriate employee access to information (access controls)
  • Contractually obligate third-party service providers to maintain similar procedures
  • Monitor effectiveness of the program
  • Review the program at least once a year
  • Document responses to incidents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption

A

It is a way of scrambling data so that only authorized parties can understand the information. It requires the use of a cryptographic key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Data Breaches and Remedies

A
  1. Unintended disclosure- Counsel on methods of data sharing
  2. Hacking, malware, social engineering (phishing)- Identify responsible individual for ensuring best practices
  3. Insider breach- Access controls/logs, balance business need with data retention
  4. Physical records or device loss- Implement remote wipe technology and prohibit local storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Incident Management

A
  1. (a) Preparation and Prevention
  2. Determine whether a breach has occured
  3. Containment (stop the bleeding)
  4. Investigation
  5. Notification/Remediation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly