ISC Deck 1 Flashcards

1
Q

HIPAA Components

A

Privacy Rule - Standards
Security Rule - Protect/Safeguards
Breach Notifications - Notify, no more than 60 days
Enforcement - civil/criminal punishment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Framework Tiers

A

Tier 1 - Partial - No integration/formal processes; ad-hoc
Tier 2 - Awareness; basis understanding company-wide but NOT formal
Tier 3 - Repeatable - Formal processes and integration
Tier 4 - Adaptable - Tier 3 plus prioritization of continuous improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIPAA Covered Entities

A

Must transmit protected health information (PHI) electronically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three Components of NIST Framework

A

Framework Core (ID, protect, detect, respond, recover)
Framework Tiers -Assess current risk mgmt
Framework Profile - establish baseline for current and find desired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST Privacy Framework Additions

A

Govern
Control
Communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPAA for Treatment

A

Normally PHI should only be the minimum necessary, but for TREATMENT, this does not apply and the provider can view all of it to better understand patient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GDPR Objectives

A

Give EU individuals more control over personal data
Harmonize data protection laws across EU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GDPR Rights

A

Right of Access
Right of Erasure
Right to Object
Right to Data Portability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GDPR Principles

A

Lawfulness: legal basis, transparent
Purpose Limitation: defined purpose
Data Minimization: minimum necessary data
Storage Limitation: retention
Integrity and Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Gateway vs Router

A

Gateway and routers do similar things in that they transmit packets across networks. Gateways are more advanced in that they translate protocols which is when packets are not in the same format and need to be understood in order to be transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DSI Layers

A

Path of data in a network to a receiving device
Application (7): interface with data
Presentation (6): converts data in correct form; encryption
Session (5): communication is established
Transport (4); rules on how data is transferred
Network (3): address to ensure proper destination
Data Link (2): formatted for transmission; data packets
Physical (1): converts to bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IaaS vs PaaS

A

Both reduce cap exp, increase scalability of business
IaaS allows control over OS, firewalls and uptime
PaaS is normally focused on one function, which in many cases is developing an application and not having to worry about the underlying infrastructure management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AIS Audit Trail

A

Invoice - Journal - Ledger - TB - F/S Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud Computing Deployment Models

A

Public
Private
Hybrid
Community - purpose is to share with industry peers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disaster Recovery Plan

A

Focus on IT disruptions
1. Assess Risk
2. ID
3. Develop
4. Determine Responsibilities
5. Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cold Site vs Hot Site

A

Hot site is the most available in event of disaster. Both software and hardware are available almost immediately
Cold site takes a few days since not all hardware/software is readily available

17
Q

Business Continuity vs DRP

A

Encompasses all critical business functions, not jus IT.

18
Q

Types of Backups

A

Full - all data; backup is time consuming but recovery is most simple
Differential - all data that has changed since last full backup; backup can be most time consuming; recovery is in the middle.
Incremental - only data that has been altered; recovery is most complicated but backup is least time consuming.

19
Q

Change Management Conversion Methods

A

Direct - most risky
Parallel - Least Risky
Pilot
Phased

20
Q

System Description in SOC 1 and SOC 2 report

A

Comprehensive overview of services organizations system. Includes details about
Software
Infrastructure
People
Procedures
Data

21
Q

SOC 2 vs SOC 3

A

Both are concerned with the trusted services criteria.
SOC3 provides less detail since they are summary reports for GENERAL use. Can be used for marketing and provide assurance at a high level.
SOC2 provides more detail since it is for a specific audience with knowledge

22
Q

Database Management System

A

Set of programs that manages a database (creates, accesses, modifies) - PRIMARY Function

23
Q

Management Assertion in SOC Engagement

A

From service org management asserting accuracy and completeness of the system description and operating effectiveness of controls (Type 2 only)

24
Q

Data Mining

A

distilling previously unknown relationships in an existing database. Uses pattern recognition and statistical methods

25
Q

Presentation of Test Results for SOC report

A

Should be very specific, showing results, number of exceptions out of total population. Describe the nature (what is being tested for) and the extent (number of exceptions) in a clear and precise way.

26
Q

What is a primary key?

A

a field that uniquely identifies a row or record in a database table. Cannot be null and every table must have one. Done in order to maintain file integrity.
Example. a record is a row of info. lets say for a customer table, there are customer addresses, dates of sale, balances and customer ID. The customer ID would be a primary since it uniquely identifies the record as there is only ONE customer ID for that customer.

27
Q

Trusted Services Criteria

A

Security
Privacy
Confidentiality
Availability
Processing Integrity

28
Q

Distributed Data Processing system

A

A system where there are are many different users with access to the main computer in different locations. Can be risky since control is now decentralized

29
Q

Validity Checks

A

ensures that only authorized data is entered into and accepted by the system. For example, if someone mistype a sales order, the validity check will detect the transposition.

30
Q

Outsourcing Data Processing

A

Pros: lower cap exp, predictability, superior service quality, and greater expertise supplied by specialists.
Cons: inflexibility, lack of control, and concerns about confidentiality.