Legal Framework & Risk Flashcards

1
Q

A private organization that oversees the development of voluntary consensus standards for various industries in the U.S.

Example: A manufacturer adheres to a widely recognized safety standard for its equipment to meet compliance requirements.

A

ANSI - American National Standards Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An independent international organization that develops and publishes global standards to ensure quality, safety, efficiency, and interoperability across various industries.

A

ISO (International Organization for Standardization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A European Union regulation designed to protect individuals’ privacy and personal data, imposing strict rules on how organizations collect, store, and process personal information.

A

GDPR (General Data Protection Regulation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A U.S. federal agency that develops and promotes standards, guidelines, and best practices for technology, including cybersecurity.

Example: An organization uses a widely adopted framework to strengthen its information security policies.

A

NIST - National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A professional organization focused on advancing technology through standards, education, and research in areas like computing and telecommunications.

Example: A company follows a standard for wireless communication protocols to ensure interoperability between devices.

A

IEEE - Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A set of security standards created to protect cardholder data and ensure secure payment processing for organizations handling credit and debit card transactions.

A

PCI DSS (Payment Card Industry Data Security Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Individuals or groups with an interest in the success, failure, or direction of a project, system, or organization.

Example: A group provides input on a new software system because its performance directly affects their daily work.

A

Stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Governing bodies responsible for overseeing an organization’s direction, policies, and compliance with legal and ethical standards.

Example: A group reviews an organization’s cybersecurity strategy to ensure it aligns with industry regulations.

A

Boards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Groups formed within an organization to focus on specific tasks, goals, or decision-making processes.

Example: A team develops a new set of policies to enhance data security and mitigate risks.

A

Committees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Agencies or departments at the federal, state, or local level that regulate, enforce, or influence standards and practices.

Example: A department issues compliance requirements for businesses handling sensitive public information.

A

Government Entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A group of individuals assembled to discuss, decide, or advise on specific organizational, policy, or operational matters.

Example: A team meets regularly to propose updates to security protocols for the organization.

A

Council

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A panel of experts or stakeholders that provides non-binding strategic guidance and advice to an organization or project.

Example: A group recommends adopting new industry standards to enhance the company’s compliance efforts.

A

Advisory Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A temporary group established to address a specific problem, issue, or initiative, often with a defined deadline.

Example: A team is created to investigate a recent security breach and propose solutions within 30 days.

A

Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Agencies or organizations at federal, state, or local levels that perform administrative, regulatory, or enforcement roles.

Example: An organization enforces environmental regulations for industries to protect public health.

A

Government Entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Organizations formed by businesses within the same industry to promote collective interests, standards, or policies.

Example: A group lobbies for favorable legislation affecting data privacy in the technology sector.

A

Trade Associations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Organizations created by law to carry out specific functions, often with regulatory or enforcement authority.

Example: A body monitors compliance with labor laws in the workplace to ensure legal standards are met.

A

Statutory Bodies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Specialized government entities responsible for creating and enforcing rules within specific industries or sectors.

Example: An agency imposes fines on companies that fail to adhere to data protection laws.

A

Regulatory Agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Responsible for the technical storage and security of data,

A

Data Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Determines the purpose and means of processing personal data, essentially deciding “why and how” data is used

A

Data Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Holds ultimate responsibility for the data itself, including its accuracy, usage, and compliance

A

Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An entity that performs specific data processing tasks under the direction of the Data Controller

A

Data Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A role within an organization that ensures the quality and governance of data assets

A

Data Steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An individual whose personal data is collected, stored, or processed by an organization.

A

Data Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The overall process of identifying potential hazards, analyzing their likelihood and severity, and then evaluating the level of risk they pose

A

Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The initial step of recognizing potential threats or hazards

A

Risk Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Involves breaking down identified risks to understand their potential impact and probability

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Encompasses the entire process of identifying, analyzing, evaluating, and taking action to mitigate or control identified risks.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The decision to knowingly accept a risk without actively attempting to mitigate it, usually because the potential impact is considered low or the cost of mitigation is too high.

A

Risk Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A spontaneous or impromptu process of identifying potential risks, meaning it’s not part of a structured, planned risk management process but rather a quick assessment done on an as-needed basis to address a specific situation or concern, often with a focused approach to identify relevant risks in the moment

A

Ad Hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A method of evaluating risk by assigning numerical values to the likelihood and potential impact of a risk, allowing for a more precise analysis using data and statistical methods.

A

Quantitative Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The level of risk an organization or individual is willing to accept, defining the threshold where a risk becomes too significant to ignore.

A

Risk Tolerance

32
Q

A method of evaluating risk using descriptive terms and subjective judgments to assess the likelihood and impact of a potential risk, often using a matrix system.

A

Qualitative Risk Assessment

33
Q

Represents the monetary value expected to be lost if a specific risk event occurs once; calculated by multiplying the asset value by the exposure factor.

A

SLE (Single Loss Expectancy)

34
Q

Indicates how often a specific risk event is expected to happen within a year.

A

ARO (Annual Rate of Occurrence)

35
Q

The estimated yearly cost of a risk, calculated by multiplying the SLE by the ARO.

A

ALE (Annualized Loss Expectancy)

36
Q

A comprehensive list of all identified risks with detailed information about each one, acting as a central repository for risk data

A

Risk Register

37
Q

A visual representation of risks using color-coding to indicate their severity based on likelihood and impact, essentially a graphical display of a risk matrix

A

Risk Heat Map

38
Q

A grid that plots the likelihood of a risk occurring against its potential impact, allowing for easy prioritization of risks

A

Risk Matrix

39
Q

A central location to store and manage all risk-related information across an organization.

A

Risk Repository

40
Q

The maximum amount of time a business can tolerate before normal operations are restored after a disaster. A forward-looking metric that helps define how to allocate resources for business continuity.

A

RTO (Recovery Time Objective)

41
Q

The maximum amount of data a business can tolerate losing during a disaster. A backward-looking metric that helps define how often to back up data.

A

RPO (Recovery Point Objective)

42
Q

A metric that measures the total lifespan of a system, including non-repairable failures. Useful for anticipating when to replace systems.

A

MTTF (Mean Time to Failure)

43
Q

A key performance indicator (KPI) that measures how long a system or product is expected to operate before it fails.

A

MTBF (Mean Time Between Failures)

44
Q

Measures how long it takes to repair a system or product after it fails.

A

MTTR (Mean Time to Repair)

45
Q

A contractual provision granting an organization the right to review or inspect a vendor’s operations, processes, or records to ensure compliance.

Example: A company examines a vendor’s security controls to confirm adherence to agreed-upon data protection standards.

A

Right-to-Audit Clause

46
Q

A provision that establishes the authority to monitor and manage the activities of a party or process to ensure proper execution.

Example: An organization includes regular reporting requirements to track progress on a cybersecurity project.

A

Oversight Clause

47
Q

A contractual term requiring one party to demonstrate adherence to specific standards, laws, or policies.

Example: A cloud service provider submits an annual report showing alignment with industry security certifications.

A

Compliance Verification Clause

48
Q

A provision that requires clear and open communication about activities, decisions, or processes to build trust and accountability.

Example: A company must disclose all third-party subcontractors involved in handling sensitive customer data.

A

Transparency Clause

49
Q

A contract outlining the general terms and conditions between two parties for future agreements, typically covering long-term relationships or projects.

Example: A company signs an agreement with a vendor that defines the terms for all future purchases of services.

A

MSA - Master Service Agreement

50
Q

A document that specifies the work to be performed under a contract, including deliverables, timelines, and specific requirements.

Example: A client and contractor agree on a detailed document that outlines project milestones, deadlines, and expectations.

A

SOW - Statement of Work

51
Q

A formal document that outlines the specific terms and details of a partnership or agreement between two or more parties.

Example: Two organizations sign an agreement to jointly develop a new software tool, specifying each party’s contributions.

A

MOA - Memorandum of Agreement

52
Q

A non-binding agreement that expresses the intent of parties to cooperate on a specific project or initiative.

Example: Two companies sign an understanding to collaborate on research, though no legal obligations are set at this stage.

A

MOU - Memorandum of Understanding

53
Q

A document that outlines the tasks or services to be performed, typically in a business or industrial context, including timelines and pricing.

Example: A contractor receives a document outlining the specific repairs to be made to a building, including materials and deadlines.

A

WO - Work Order

54
Q

A document that defines the security requirements for the interconnection of two or more systems or networks to ensure protection of sensitive data.

Example: A company and a third-party provider sign an agreement that outlines encryption protocols and access controls for their shared network.

A

ISA - Interconnection Security Agreement

55
Q

A legally binding contract that prevents parties from disclosing confidential information to others.

Example: An employee signs an agreement to ensure that proprietary company information is not shared with competitors.

A

NDA - Non-Disclosure Agreement

56
Q

A long-term agreement between a buyer and a supplier to provide goods or services at predetermined prices over a specified period.

Example: A company enters into an agreement with a vendor to supply office supplies on a recurring basis at fixed prices for the next year.

A

BPA - Blanket Purchase Agreement

57
Q

The process of thoroughly investigating and evaluating a business or project to identify potential risks, liabilities, or compliance issues.

Example: A company conducts a detailed background check on a potential partner to ensure they comply with industry regulations.

A

Due Diligence

58
Q

The level of caution and concern an ordinary person would exercise in a given situation, often used to determine negligence.

Example: A hospital implements strict hygiene practices, following industry norms to prevent infection during surgeries.

A

Standard of Care

59
Q

The obligation to take reasonable steps to avoid harm or risk, reflecting the care expected in a specific context.

Example: A manager ensures that sensitive customer data is encrypted before being transmitted to a third-party vendor.

A

Due Care

60
Q

A legal or ethical responsibility to act in the best interest of another party, typically in financial or management contexts.

Example: A financial advisor must recommend investment options that align with a client’s best interests, rather than personal gain.

A

Fiduciary Duty

61
Q

The process of removing or altering personal information from a dataset so that individuals cannot be easily identified.

A

De-identification

62
Q

A legal right that allows individuals to request the removal of their personal data from an organization’s records, under certain conditions.

A

Right to be Forgotten

63
Q

A declaration or statement, often made by an external party, confirming the accuracy or authenticity of a specific fact or document.

A

Attestation

64
Q

The process of confirming that a system or product meets specific requirements or standards before being used or deployed.

A

Validation

65
Q

A statement or claim made, typically in the context of security or compliance, about the state or condition of a system or process.

A

Assertion

66
Q

The formal recognition or approval granted by an authorized body that a system, individual, or organization meets specified standards or qualifications.

A

Certification

67
Q

A group of security professionals hired to simulate real-world cyberattacks in order to test and improve an organization’s defenses.

A

Red Team

68
Q

A group of cybersecurity professionals responsible for defending an organization’s systems and networks from attacks.

A

Blue Team

69
Q

A group that oversees and facilitates cybersecurity exercises or simulations, ensuring they are conducted fairly and according to the rules.

A

White Team

70
Q

A collaborative group combining members of both the red team (offensive) and blue team (defensive) to improve overall security posture through shared insights and tactics.

A

Purple Team

71
Q

Malicious hacking activities performed with the intent to exploit systems, steal data, or cause harm, often for personal or financial gain.

A

Black-Hat Hacking

72
Q

A testing method where the tester has full knowledge of the system’s internal workings, such as code and architecture, to identify vulnerabilities.

A

White-Box Testing

73
Q

A testing method where the tester has no prior knowledge of the system’s internal workings, focusing on input and output to identify security weaknesses.

A

Black-Box Testing

74
Q

Ethical hacking performed by professionals who are authorized to test systems for vulnerabilities and strengthen security.

A

White-Hat Hacking

75
Q

A testing method where the tester has partial knowledge of the system, typically access to some internal components, but not complete details, to identify vulnerabilities.

A

Gray-Box Testing