IS4680 Chapter 5 Flashcards

1
Q

Audit frequency

A

The rate of occurrence for an audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Audit objective

A

The goal of an audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Audit scope

A

The range of the organization to be included in an audity within a defined time frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CPO - Chief Privacy Officer

A

Senior-level position responsible for the overall management of an organization’s privacy program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CAG - Consensus Audity Guidelines

A

A listing of the top 20 critical security controls, published by SANS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ERM - Enterprise risk management

A

The process organizations use to manage risks related to achieving their goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FIPS - Federal Information Processing Standards

A

Technical standards published by NIST and approved by the secretary of commerce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GAPP - Generally Accepted Privacy Principles

A

Set of principles developed to provide guidance for privacy audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ITL - Information Technology Laboratory Bulletins

A

NIST publications that provide in-depth coverage of important topics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISO/IEC 27005

A

A security risk-management framework developed by ISO/IEC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IT universe

A

All the resources or auditable components within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NCP - National Checklist Program

A

A government repository of baseline security checklists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIST 800-30

A

A guide developed by NIST for the management of risk for IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NISTIR - NIST Internal Reports

A

NIST publications that describe niche technical research.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Special Publications

A

A series of standards developed by NIST.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat actions

A

The methods of carrying out a particular threat.

17
Q

Threat identification

A

The process of identifying all threats and those with the ability to threaten the organization.

18
Q

Vulnerability analysis

A

The examination of weaknesses or flaws.