Section 30: Policies and Procedures Flashcards

1
Q

Data Owner

A

Responsible for labeling the asset and ensuring that it is protected with appropriate controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Steward

A

A role focused on the quality of the data and associated metadata. Works for the data owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Custodian

A

A role responsible for handling the management of the system on which the data assets are stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Privacy Officer

A

A role responsible for the oversight of any PII, etc. assets managed by the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SOX

A

Affects publicly traded US corporations and requires certain accounting methods and financial reporting requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GLBA

A

Act that affects financial institutions and PII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FISMA Act of 2002

A

All about cybersecurity and to create more across the federal government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PCI DSS

A

Contractual obligation if you want to be in compliance for payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deidentification

A

Methods and technologies that remove identifying information from data before it is distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Masking

A

placing generic labels in place of the real stuff. It’s like covering it up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tokenization

A

A deidentification method where a unique token is substituted for real data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Acceptable Use Policy

A

Defines the rules that restrict how a computer, network, or other systems may be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Change Management Policy

A

Defines the structured way of changing the state of a computer system, network, or IT procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Separation of Duties

A

Sort of like a checks and balances system where you separate out different things so one person doesn’t have to much power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Job Rotation

A

Different users are trained to perform the tasks of the same position to help prevent and identify fraud that could occur if only one employee had the job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Due Care

A

Mitigation actions that an organization takes to defend against the risks that have been uncovered during due diligence.

17
Q

Due Process

A

A legal term that refers to how an organization must respect and safeguard personnel’s rights

18
Q

Security Awareness Training

A

Used to reinforce to users the importance of their help in securing the organization’s information

19
Q

Security Training

A

Used to teach the organization’s personnel the skills they need to perform their job in a more secure manner (more general in nature)

20
Q

Memorandum of Understanding (MOU)

A

Formal version of a gentleman’s agreement, except people sign it. Letter of intent.

21
Q

Service-Level Agreement (SLA)

A

An agreement concerned with the ability to support and respond to problems within a given timeframe and continuing to provide the agreed upon level of service to the user

22
Q

Five steps of Disposal

A

define what equipment will be disposed

pick a place for it to live

analyze equipment and what’s going to be done with it

sanitize the drives, etc.

Throw away or recycle the device

23
Q

Five steps of Disposal

A

define what equipment will be disposed

pick a place for it to live

analyze equipment and what’s going to be done with it

sanitize the drives, etc.

Throw away or recycle the device

24
Q

Center for Internet Security (CIS)

A

Tells us “What are the things we should be using in order to be up to snuff for security?”

25
Q

Risk Management Framework (RMF)

A

A process that integrates security and risk management activities into the system development life cycle through an approach to security control selection and specification.

26
Q

Cybersecurity Framework 5 steps

A

Identify

Protect

Detect

Respond

Recover

27
Q

ISO 27001

A

An international standard basic cybersecurity framework