Lesson 1 Flashcards

1
Q

Confidentiality

A

• Information should only be known to certain people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

• Data is stored and transferred as intended and that any modification is
authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

• Information is accessible to those authorized to view or modify it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

• Non-repudiation

A

• Subjects cannot deny creating or modifying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity Framework

A

Identify, protect, detect, respond, Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Security Roles and Responsibilities

A
• Overall responsibility
• Chief Security Officer (CSO)
• Chief Information Security Officer 
(CISO)
• Managerial
• Technical
• Information Systems Security 
Officer (ISSO)
• Non-technical
• Due care/liability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information Security Business Units

A
Security Operations Center (SOC)
• DevSecOps
• Development, security, and 
operations
• Incident response
• Cyber incident response team 
(CIRT)
• Computer security incident 
response team (CSIRT)
• Computer emergency response 
team (CERT)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Control Categories

A
• Technical
• Controls implemented in operating 
systems, software, and security appliances
• Operational
• Controls that depend on a person for 
implementation
• Managerial
• Controls that give oversight of the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Control Functional Types (1)

A

Preventive
• Physically or logically restricts
unauthorized access
• Operates before an attack

• Detective
• May not prevent or deter access, but 
it will identify and record any 
attempted or successful intrusion
• Operates during an attack
• Corrective
• Responds to and fixes an incident 
and may also prevent its 
reoccurrence
• Operates after an attack

• Physical
• Controls such as alarms, gateways, and locks that deter access to premises and
hardware

• Deterrent
• May not physically or logically prevent access, but psychologically discourages
an attacker from attempting an intrusion

  • Compensating
  • Substitutes for a principal control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CSF

A

(NIST) Cybersecurity Framework
(CSF) is a relatively new addition to the IT governance space and distinct from other
frameworks by focusing exclusively on IT security, rather than IT service provision more
generally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RMF

A

Risk Managemetn Framework - designed for federal agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FIPS

A

Federal Information Processing Standards (FIPS)

US Gov’t security standars for data and its

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISO 27k

A

Information Security Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISO 31k

A

Enterprise risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

• Cloud Security Alliance

A

Cloud Security Alliance
• Security guidance for cloud service providers (CSPs)
• Enterprise reference architecture
• Cloud controls matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSAE)

A

Statements on Standards for Attestation Engagements are audit
specifications developed by the American Institute of Certified Public Accountants

SOC2 evaluates service provider
• Type I report assesses system design
• Type II report assesses ongoing effectiveness
• SOC3 public compliance report

17
Q

CIS

A

Center for Internet Security (CIS)
• The 20 CIS Controls
• CIS-RAM (Risk Assessment Method)

18
Q

OWASP

A

publishes several secure application development resources, such as
the Top 10 list of the most critical application security risks (

19
Q

SOX

A

Sarbanes-Oxley Act (SOX)

mandates the implementation of risk assessments, internal controls, and
audit procedures.

20
Q

Computer Security Act (1987)

A

requires federal agencies to

develop security policies for computer systems that process confidential information.

21
Q

FISMA

A

Federal Information Security Management Act (FISMA) was introduced to
govern the security of data processed by federal government agencies.

22
Q

GDPR

A

Fairness and the right to privacy,
as enacted by regulations such as the European Union’s General Data Protection
Regulation (GDPR), means that personal data cannot be collected, processed, or
retained without the individual’s informed consent.

23
Q

GLBA

A

Gramm–Leach–Bliley Act (GLBA) - for financial services

24
Q

CCPA

A

California Consumer Privacy Act

25
Q

ISO 22301

A

security & resilience, business continuity management

26
Q

ISO 27001

A

information security rules and requirements (compliance/regulations)

27
Q

ISO 27701

A

Privacy Information Management

28
Q

IS 27002

A

Information Security Best Practices