Security And Risk Management Flashcards

1
Q

Due Care

A

Fulfilling legal responsibilities and professional best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Due Dilligence

A

Taking reasonable measures to investigate security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COBIT

A

Control Objective for IT Business-Focused control framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO 27001

A

Cybersecurity control objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISO 27002

A

Cybersecurity control implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO 27701

A

Privacy Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO 31000

A

Risk management programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST 800-53

A

Mandatory for federal agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSF

A

NIST Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST Cybersecurity Framework (CSF) functions

A

Identify, protect, detect, respond, recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PII

A

Personal Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PHI

A

Protected Health Information. Governed under HIPAA (Health Insurance and Accountability Act)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

GAPP

A

Generally accepted privacy principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GAPP Principles

A

Management, Notice, Choice and Consent, Collection, (Use, retention and disposal), Access, Disclosure with Third Parties, Security, Quality, (Monitoring and enforcement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISO / IEC 27018: 2019

A

Protection of PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CFAA

A

Computer Fraud and Abuse Act

Prohibits unauthorized access to computer systems in commerce

Prohibits the creation of malicious code

17
Q

ECPA

A

Electronic Communications Privacy Act

Restricts government interception of communications

18
Q

ITADA

A

Identity Theft and Assumption Deterrence Act

19
Q

Copyrights

A

Protect creative works (books, music, etc)

20
Q

Trademarks

A

Protect words and symbols (indefinite, 10 year renewal)

21
Q

Patents

A

Protect inventions

22
Q

Trade Secret

A

Not patented as you have to disclosed how it works

23
Q

ITAR

A

International Traffic in Arms Regulations

“Defense articles”

24
Q

EAR

A

Export Administration Regulations

“Dual use; Military and civil use”

25
Q

OFAC

A

Office of Foreign Assets Control

Cover sanctioned countries

26
Q

Security Policy Framework components

A

Policies, Standards, Guidelines and Procedures

27
Q

Security Policies

A

Provide a foundation for a security program
Are written carefully over a long period of time
Mandatory
Approved high level of the organization

28
Q

Security Standards

A

Specific details of security controls
Mandatory
Less rigorous approval process

29
Q

Guidelines

A

Advice for the organization
Follow best practices
Not Mandatory

30
Q

Procedures

A

Step by step

Can be mandatory or not