Section 10: Governance, Risk, and Compliance Flashcards
What is a vulnerability in relation to risk management?
A weakness that an attacker could exploit.
What is the purpose of BPA?
Business Partnership Agreement (BPA) is used by companies in a joint venture and lays out each party’s contribution, their rights and responsibilities, how decisions are made and who makes them.
What is a multiparty risk?
Where someone wins a contract and sub-contracts to a third party who could sabotage your systems.
What is IP theft?
Occurs when intellectual property has ben stolen, like trade secrets, copyright and patents.
What is the difference between an MOU and an MOA?
Memorandum of Understanding (MOU): formal agreement between two parties but is not legally binding
Memorandum of Agreement (MOA): same as MOU but is legally binding.
What is tokenization and why is it stronger than encryption?
Process by which data is replaced by a stateless token and the actual data is held in a vault by a payment provider. Because data is held in a remote location, it is stronger than encryption for which keys are held locally.
One of the junior members of the IT team installs more copies of a piece of software than are allowed by the licenses that the company has purchased. What have they just carried out?
Software licensing compliance violation.
What is the purpose of an ISA?
Interconnection Security Agreement (ISA) states how connections should be made between two business partners. They decide on the type of connection and how to secure it; for example, they may use a VPN to communicate.
How does the shadow IT threat actor operate and what type of attack could benefit from their actions?
Shadow IT connects their own computers to your network without your consent. Could lead to pivoting.
Could also steal a company laptop to gain access to the network.
What is an inherent risk?
A raw risk before it has been mitigated.
What are the four stages of the information life cycle?
- Created
- Use
- Retention
- Disposal
Why would you use STIX/TAXII?
They work together so that Cyber Threat Intelligence (CTI) can be distributed over HTTP.
What is the benefit of introducing a separation of duties in the finance department?
Ensures that nobody in the department carried out both parts of a transaction. For example, we would have one person collecting revenue and another person authorizing payments.
What is the purpose of a risk register?
Lays out all the risks a company faces; each risk will have a risk owner who specialized in that area and decides on the risk treatment.
What is an impact assessment?
Where you evaluate the risk of collecting big data and what tools can be used to mitigate the risk of holding so much data.
A company has a leak in the roof, and before it can be repaired, there’s heavy rain, resulting in 6 laptops being water-damaged. What type of disaster is this?
Environmental threat.
What is the purpose of job rotation?
Ensures that employees work in all departments so that if someone leaves at short notice or is ill, cover can be provided. Also ensures that any fraud or theft can be detected.
What is the purpose of a privacy notice?
Gives consent for data only to be collected and used for one specific purpose.
What is data masking?
When data is stored and only shows portions of the data. For example, might see only the last four digits of a credit card.
If a company suffered a data breach, what would be the impact if one of their customers suffered identity fraud?
Most likely would be sued by the customer.
What is a SOC type 2 report and what is its distribution?
Deals with the effectiveness of controls and has limited access as it provides a detailed report about a company,