Information Security and Data Breach Flashcards
1
Q
Controls
A
- Physical controls: locks, security cameras, and fences
- Administrative controls: incident response procedures and employee training
- Technical controls: firewalls, antivirus software, and access control lists and logs
2
Q
Measures
A
- Designate an individual who is responsible
- Anticipate risks and take appropriate steps to mitigate such risk
- Develop program
- Impose penalties for violations of the program rules
- Appropriate employee access to information (access controls)
- Contractually obligate third-party service providers to maintain similar procedures
- Monitor effectiveness of the program
- Review the program at least once a year
- Document responses to incidents
3
Q
Encryption
A
It is a way of scrambling data so that only authorized parties can understand the information. It requires the use of a cryptographic key.
4
Q
Types of Data Breaches and Remedies
A
- Unintended disclosure- Counsel on methods of data sharing
- Hacking, malware, social engineering (phishing)- Identify responsible individual for ensuring best practices
- Insider breach- Access controls/logs, balance business need with data retention
- Physical records or device loss- Implement remote wipe technology and prohibit local storage
5
Q
Incident Management
A
- (a) Preparation and Prevention
- Determine whether a breach has occured
- Containment (stop the bleeding)
- Investigation
- Notification/Remediation