Module 3 Flashcards

1
Q

is a critical process used across industries to identify, evaluate, and mitigate potential risk that could impact business operations, safety, and compliance.

A

Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common Risk Assessment Methodologies

A
  • Qualitative Risk assessment
  • Quantitative Risk Assessment (QRA)
  • Failure Modes and Effects Analysis
  • Hazzard and Operability Study(HAZOP)
  • Bowtie Analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A set of rules and procedures to protect organizational assets.

A

Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Established guidelines and frameworks to ensure consistent security measures.

A

Security Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reduces the likelihood of security breaches

A

Risk Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensures adherence to legal regulations

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Builds confidence among stakeholders, clients, and employees.

A

Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Facilitates efficient response and recovery from security incidents.

A

Incident Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key Elements of Security Policies

A
  • Access Control
  • Data Protection
  • Acceptable Use
  • Incident Response
  • Training and Awareness
  • Compliance Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Security Standards

A
  • ISO 27001
  • NIST (National Institute of Standards and Technology)
  • PCI DSS
  • CIS (Center for Internet Security)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

International Standard for Information security management systems (ISMS)

A

ISO 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cyber security Frameworks (CSF) for managing and reducing risks

A

NIST (NATIONAL INSTITUTE of Standards Technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Payment Card Industry Data Security Standard for payment data protection

A

PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Critical Security controls and benchmarks

A

CIS (Center for Internet Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

it refers to the framework, policies, and process established to ensure the organization’s security objectives align with business goals.

A

Information Security Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Steps to Establish Effective Governance

A
  • Assess Current State
  • Define Objectives
  • Develop Policies
  • Implement Frameworks
  • Monitor and Improve
17
Q

laws in Information Security

A
  • Protect sensitive data and privacy
  • Prevent Cybercrime
  • Ensure business continuity
  • Build trust with stakeholders
18
Q

Consequences of Non-compliance

A
  • Financial Penalties
  • Legal actions and lawsuits
  • Reputational Damage
  • Operational disruptions