Section 3: Security Governance and Compliance Flashcards

1
Q

Due Care

A

Reasonable efforts made by an organization to prevent harm to individuals or assets
Encompasses the responsibility of an organization to protect its stakeholders from foreseeable risks, including implementing appropriate security measures that align with industry standards and best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Due Diligence

A

Activities used to ensure compliance with due care
Researching requirements and ensure due care obligations remain compliant with organization requirements
Requires ongoing assessments and evaluations of security practices to identify gaps and make necessary improvements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FTC Act

A

Federal Trade Commission Act protects consumers from unfair competition or deceptive acts or practices that affect commerce- includes the protection of PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GLBA

A

Gramm-Leach-Bliley Act focuses on safeguarding financial data and prevent sharing to third party organizations without customer consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECPA

A

Electronic Communications Privacy Act
Defines the collection of electronic communications and defines how the US government can access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPAA

A

Health Insurance Portability and Accountability Act
Creates federal requirements for the collection, management, and protection of certain health related information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HITECH

A

Health Information Technology for Economic and Clinical Health Act
Mandates how organizations must handle PHI on behalf of a HIPAA covered entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GINA

A

Genetic Information Non-Disclosure Act
Protects individuals from the unauthorized use, disclosure, or sale of genetic related information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SOX

A

Sarbanes-Oxley Act
Protects investors against accounting fraud and requires the reporting of financial information to company investors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PCI DSS

A

Payment Card Industry Data Security Standard
Global payment card industry standard aimed at protecting credit card theft and fraud of the cardholder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PCI DSS Requirements

A

Install and maintain firewall
Do not use vendor supplied default credentials for systems
Protect stored cardholder data
Encrypt transmission of cardholder data across open, public networks
Protect all systems against malware and regularly update AV software or programs
Develop and maintain secure systems and applications
Restrict access to cardholder data by business need-to-know
Identify and authenticate access to system components
Restrict physical access to cardholder data
Track and monitor all access to network resources and cardholder data
Regularly test security systems and processes
Maintain a policy that addresses information security for all personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GDPR

A

General Data Protection Regulation (European Union)
Went into effect 2018
Increased scope of previous data privacy regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Controller (GDPR)

A

Person, public authority, agency or other body which determines the purposes and means of the processing of personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Processor (GDPR)

A

Person, public authority, agency, or other body which processes personal data on behalf of the controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GDPR Subject Rights

A

Access to any collected information
Rectification (update or correct) information
Erasure or “to be forgotten”
Restriction of processing and how the data is used
Data portability to reuse the data as subject sees fit
Object to any further processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Patent

A

Provides exclusive legal rights of an invention
Creator has full ownership and can control how it may be used by others
Unique software code, hardware components, mechanical parts, exercise equipment

17
Q

Trademark

A

Identifies exclusive goods or services from an individual or organization
Purpose is to uniquely distinguish a good or service from competing products
Company name, slogan, symbol, logo, etc

18
Q

Copyright

A

Provides exclusive rights of artistic works
Author has full ownership and can control how the material may be used by others
Book, song lyrics, video, movie script, photograph, painting, etc

19
Q

Trade Secret

A

Provides exclusive protection of a secret method or technique that gives an organization an advantage
Something that gives an organization its edge in business over a competitor
Recipe, process, initial design

20
Q

Licensing

A

Provides a legal agreement that outlines the specific terms of use for a product
Permission from the license issuer to use their product in a specified manner

21
Q

Perpetual License

A

Authorized use for the lifetime of the product

22
Q

EULA

A

End User License Agreement
A binding agreement between the user and the license issuer

23
Q

Creative Commons (CC)

A

Free use of copyrighted materials license

24
Q

Wassenaar Arrangement

A

Export controls for conventional arms and dual-use goods and technologies
“The aim is also to prevent the acquisition of these items by terrorists”

25
Q

Wassenaar Category 5 Part 1

A

Telecommunications

26
Q

Wassenaar Category 5 Part 2

A

Information Security with a focus on cryptography and cyber weapons

27
Q

CFAA

A

Computer Fraud and Abuse Act

28
Q

NIIPA

A

National Information Infrastructure Protection Act of 1996

29
Q

FISMA

A

Federal Information Security Modernization Act
Security controls for government agencies

30
Q

Active Attacks

A

Attempt to exploit a vulnerability to cause damage or gain unauthorized access

31
Q

Passive Attacks

A

Attempt to gather information to attack the system without affecting operations

32
Q

Doxxing

A

Public release of sensitive information regarding an individual or organization

33
Q

Policy

A

Defines the high-level mandate to comply with external compliance requirements
Unlikely to change, while all other documents are typically fluid

34
Q

Standard

A

Consistent set or requirements to comply with the organizational policy

35
Q

Procedure

A

Highly detailed instructions on how to implement a standard

36
Q

Baseline

A

Defines the specific requirements necessary to comply with a standard

37
Q

Guideline

A

Best practice recommendation to implement a standard or baseline