Module 4: Governance Elements Flashcards
Procedures
Are the detailed steps to complete a task that support departmental or organizational policies.
Policies
Are put in place by organizational governance, such as executive management, to provide guidance in all activities to ensure that the organization supports industry standards and regulations.
Standards
Are often used by governance teams to provide a framework to introduce policies and procedures in support of
Regulations.
Regulations
Are commonly issued in the form of laws, usually from the government ( not to be confused with governance) and typically carry financial penalties for noncompliance.
Regulations and laws :
The Health insurance Portability and Accountability Act (HIPPA) of 1996
Is an example of a law that governs the use of protected health information (PHI) in the United States.
Violation of the HIPPA rule carries the possibility of fines and/or imprisonment for both individual and companies.
The General Data Protection Regulation (GDPR)
Was enacted by the European Union ( EU) to control use of Personally Identifiable information (PII) of its citizens and those in the EU.
IETF
Internet Engineering Task Force
NIST
National institute of Standards and Technology
ISO
International Organization for Standardization
(ISC)2 code of ethics Preamble
The safety and welfare of society and the common good, duty to our principals, and to each other , requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
The preamble states the purpose and intent of the (ISC)2 Code of Ethics.
(ISC)2 Code of Ethics Canons
The Canons represent the important beliefs held in common by the members of (ISC)2.
Cybersecurity professionals who are members of (ISC)2 have a duty to the following four entities in the Canons:
- Protect society, the common ground, necessary public trust and confidence, and infrastructure.
- Act honorably, honestly, justly, responsibly and legally.
- Provide diligent and competent service to principals.
- Advance and protect the profession.
Adequate security
Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information.
Administrative Controls
Controls implemented through policy and procedures. Examples include access control processes and requiring multiple personnel to conduct a specific operation.
Artificial intelligence
The ability of computers and robots to simulate human intelligence and behavior.