Policies and Procedures Flashcards

1
Q

Policies

A

Defines the role of security in an organisation and establishes the desired end state of the security program

They may be regulatory, advisory or informative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Organisational Policies

A

Provide general direction and goals, a framework to meet business goals, and define the roles, responsibilities and terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System-Specific Policies

A

Address the security of a specific technology, application, network or computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Issue-Specific Policies

A

Built to address a specific security issue, such as email privacy, employee termination, procedures, or other specific issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Standards

A

Standards are used to implement a policy in an organisation.

E.g.: Mandatory actions, steps or rules to achieve a level of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Baselines

A

Baselines are created as reference points which are documented for use a method of comparison during an analysis conducted in the future.

E.g.: A server baseline configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Guidelines

A

Guidelines are used to recommend actions. Guiding actions that can be broken as the situation necessitates.

E.g.: All employees get 1TB of storage for personal files on the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Procedures

A

Detailed step-by-step instructions that are created to ensure personnel can perform a given action.

E.g.: Creating a new user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sensitive Data

A

Any information that can result in a loss of security, or a loss of advantage to a company if used by an unauthorized individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the four common “Commercial Data Classifications”?

A
  • Public (No impact to a company if released)
  • Sensitive (Might have a minimal impact if released)
  • Private (Data that should only be used in the organisation)
  • Confidential (Trade secrets, IP, source code and other types of data that would affect the business if disclosed).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the five common “Government Data Classifications”?

A

Unclassified

Sensitive but Unclassified

Confidential

Secret

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the five common “Government Data Classifications”?

A

Unclassified (Can be released to the public)

Sensitive but Unclassified (Items that wouldn’t hurt national security, but could impact those whose data is contained in it)

Confidential (Seriously affect the government on disclosure,

Secret (Serious damage to national security)

Top Secret (Gravely damage national security if known to those who are not authorized to see the data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Owner

A

A senior or executive role that has ultimate responsibility for the CIA of the asset.

The data owner is responsible for labelling the asset and ensuring that is it protected with appropriate controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Steward

A

A role focused on the quality of the data and associated meta data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Custodian

A

A role responsible for handling the management of the system on which the data assets are stored. (E.g.: a system administrator)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Privacy Officer

A

A role responsible for the oversight of any PII/SPI/PHI assets managed by the company

17
Q

What is PII?

A

Personally Identifiable Information

A piece of data that can be used either by itself or in combination with some other data to identify a single person.

For example. Your full name, date of birth, social media user names.

18
Q

Federal Privacy Act of 1974

A

Affects U.S. government computer systems that collects, stores, uses or disseminates personally identifiable information

19
Q

What does HIPPA stand for and who does this standard affect?

A

Health Insurance Portability and Accountability Act

US standard that affects healthcare providers, facilities, insurance companies, and medical data clearing houses.

20
Q

Who does the Sarbanes-Oxley standard affect?

A

Publicly traded U.S. corporations. Sarbanes-Oxley (SOX) requires certain accounting methods and financial reporting requirements.

21
Q

What does GLBA stand for and for and who does this standard affect?

A

Gramm-Leach-Bliley Act

Affects banks, mortgage companies, loan offices, insurance companies, investment companies and credit card providers.

22
Q

What is FISMA?

A

FISMA is the Federal Information Security Management Act of 2002.

It is a requirement that American federal agencies must comply with.

This act requires each agency to develop, document, and implement an agency-wide information systems security program to protect their data

23
Q

What is PCI DSS?

A

PCI DSS is the Payment Card Industry Data Security Standard.

PCI-DSS is a contractual obligation that any organisations take credit card transactions must meet.

24
Q

What is SB1386?

A

SB1386 is a Californian regulation that states organisations must inform users of a data breach.

25
Q

What is the difference between “privacy” and “security”?

A

Security focuses on the CIA attributes of the data processing system.

Privacy is a data governance requirement that arises when collecting and processing personal data to ensure the rights of the subject’s data.

26
Q

What is GDPR?

A

GDPR is the General Data Protection Regulation.

It’s an EU standard that states data cannot be collected, processed, or retained without the individual’s informed consent.

27
Q

What is deidentification (data privacy)?

A

The removal of identifying information from data before it is distributed.

28
Q

What is data masking (data privacy)?

A

A deidentification method where generic or placeholder labels are substituted for real data while preserving the structure of original data.

E.g.:
Card Number: ** ** ** ** ** 5412

29
Q

What is Tokenization (data privacy)?

A

A deidentification method where a unique token is substituted for real data.

E.g. A patient I.D. in place of a patients name.

30
Q

What is Aggregation/Banding (data privacy)?

A

A deidentification technique where data is generalised to protect the individuals involved.

E.g.: 90% of clinical trial participants tested positive

31
Q

What is reidentification?

A

An attack that combines a deidentified dataset with other data sources to discover how secure the deidentification method used is.

32
Q

What is “separation of duties”?

A

Separation of duties is a preventative type of administrative control that prevents fraud and abuse by distributing approval task among users.

33
Q

What is job rotation?

A

Job rotation is where different users are trained to perform the tasks of the same position to help prevent fraud that could occur if only one employee had that job.

34
Q

What is security awareness training?

A

Used to reinforce to users the importance of their help in securing the organisation’s valuable resources.

All employees should attend security awareness training at least once a year. The training should be aimed at a particular group within an organisation and include a discussion of company policies.

Studies have shown this is by far the best investment a company can make in terms of security.

35
Q

what is security training?

A

Used to teach the organisations personnel the skills they need to perform their job in a more secure manner.

36
Q

what is security education?

A

Security education is generalised training like Security+