Lessons 25-29 Flashcards

1
Q

THIRD-PARTY RISK MANAGEMENT

A

Is a composite of activities used to research and source third parties, conduct due diligence investigations, negotiate contracts, manage relationships, evaluate performance, and make payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

THIRD-PARTY OVERSIGHT

A

The implementation of strategies to manage uncertainty, identify vulnerabilities, and ensure compliance and continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RIGHT TO AUDIT

A

A “right to audit” contract provision (clause) grants the contract holder the right to conduct or oversee an audit of the service provider’s facilities and practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MOU

A

memorandum of understanding is a non-binding document that outlines the intentions and areas of cooperation between parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MOA

A

memorandum of agreement is a legally enforceable document that establishes a contractual relationship between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BPA

A

business partner agreement is a comprehensive legal document that outlines the terms and conditions of a relationship between two or more businesses or entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SLA

A

a service-level agreement codifies service and support requirements and may include incentives and or penalties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MSA

A

a master services agreement outlines general terms and conditions. It serves as a framework for future agreements or projects between the parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SOW

A

a statement of work that defines tasks, deliverables, timelines, and performance expectations for a particular project or engagement between a client and a service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WO

A

a work order is transactional and used for individual service requests, often within the context of ongoing business relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data minimization-

A

approach limits data collection to only what is required to fulfill a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RIGHT TO BE FORGOTTEN

A

Pertains to an individual’s right to have their personal information removed or deleted from online platforms, search engine results, or other publicity accessible sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data controller-

A

determines the purposes for which, and the means by which, personal data is processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data processor

A

processes personal data on behalf of the data controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data protection officer

A

ensures that an organization is in compliance with privacy regulations as defined in the GDPR: independence is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data masking

A

a technique used to protect sensitive data by replacing it with fictional or de-identified data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tokenization

A

a technique to secure and desensitize data by replacing the original data with an unrelated value of the same length and format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Anonymization

A

the process in which individually identifiable data is altered in such a way that it no longer can be related back to a given individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Pseudo-anonymization-

A

a method to substitute identifiable data with a reversible consistent value.

20
Q

PRIVACY IMPACT ASSESSMENT (PIA)

A

is a process used to evaluate how an organization’s projects, systems, or practices affect the privacy of individuals’ personal data. It helps identify and mitigate privacy risks, ensuring that data handling complies with privacy laws and regulations.

21
Q

PRIVACY STATEMENT

A

Describes how an organization collects, uses, shares, and protects personal information collected from individuals

22
Q

INFORMATION SECURITY ASSESSMENT

A

Is the process of determining how effectively the entity being evaluated meets specific security criteria

23
Q

Examination

A

the process of interviewing, reviewing, inspecting, studying, and observing to facilitate understanding, comparing to standards or baselines, or to obtain evidence (audit)

24
Q

Testing-

A

the process of exercising objects under specified conditions to compare actual and expected behavior (penetration testing)

25
Q

Assurance

A

is the measure of confidence that intended controls, plans, and processes are effective in their application. An audit is to provide independent assurance based on evidence.

26
Q

Audit evidence

A

all the information that is used by the auditor in arriving at the conclusions on which the auditor’s opinion is based.

27
Q

AUDIT PLAN

A

A high-level description of audit work to be performed in a specific time frame

28
Q

Evidence sampling-

A

applying a procedure to less than 100% of the population

29
Q

PENETRATION TESTING

A

To evaluate the security of a target by identifying and attempting to exploit vulnerabilities, improper configurations, and hidden points of entry (ethical hacking)

30
Q

Known environment-

A

the testers have much knowledge about the target system or network. With this level of knowledge, the testing team can do an in-depth analysis, target assessments, and explore potential attack vectors.

31
Q

Partially known environment

A

the organization provides restricted or selective information to the testers this approach can simulate scenarios where an attacker gains partial information through recon, or social engineering

32
Q

Unknown environment-

A

no information is provided to the testers. The testers need to discover vulnerabilities, conduct recon, identify potential entry points, and perform exploitation attempts.

33
Q

RULES OF ENGAGEMENT

A

ROE agreement details the parameters and expected assessor conduct of the penetration test.

34
Q

OFFENSIVE AND DEFENSIVE PENETRATION TESTING

A

It’s designed to simulate an attack and evaluate preventive and deterrent controls, detection, and response capability

35
Q

Offensive team

A

offensive penetration testing teams emulate the behaviors and techniques of likely attackers.

36
Q

Defensive team

A

teams are tasked with detective and defensive activities.

37
Q

Integrated team-

A

teams actively engage in monitoring, detection, and response activities during the testing process with a focus on information sharing and cooperation ( feedback bridge)

38
Q

Passive Recon

A

information gathering using publicly available resources. The target has no knowledge of the activity. Examples: IP addresses, external relationships, people/personnel info, content of interest, web, email, remote access portals

39
Q

Active Recon.

A

using technical tools to probe and discover information. Active recon may be intrusive and discovered. Examples- network connections, open ports, enumeration, vulnerabilities.

40
Q

Escalation of privilege

A
  • the act of exploiting a vulnerability to gain elevated access to a resource.
41
Q

Pivoting

A

the act of using a weakness in one system to access a better-protected system

42
Q

Proof-of-concept (POC) exploitation

A

is the process of providing evidence that the vulnerability is exploitable

43
Q

Compromise exploitation

A

the process of fully exploiting the vulnerability without regard to potential damage

44
Q

NIST SETA MODEL [SP800-50]

A

Security Education, Training, and Awareness (SETA)

This model is designed to enhance an organization’s information security by educating and training employees about security policies, procedures, and practices.

45
Q

BRIEFING

A

Is insight and understanding for the long-term

46
Q

SECURITY AWARENESS

A

Security awareness programs should be inclusive of all levels of the organization and extend to consultations, and contractors. The objective is to influence behavior.

47
Q

ad hoc

A

something created or done for a specific purpose as needed, without prior planning or a fixed structure.