Security and Risk Management Flashcards

1
Q

What are the four main types of compliance obligations?

A

Criminal law, Civil Law, Administrative Law, Private Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What sets Criminal law apart from the other types of law?

A

Violations of criminal law may be punishable by jail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the most common results of Civil law cases?

A

Monetary payments, or refraining from an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Administrative law provide?

A

Procedural rules and regulations where missing from civil or criminal law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What gives Private regulations their power?

A

Contractual obligations such as PCI compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the most common intersection of security and the constitution?

A

The fourth ammendment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the fourth amendment state?

A

A person has a right against unlawful searches and seizures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three HIPAA covered entities?

A

Healthcare providers, health insurers, and health information clearinghouses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FERPA regulations protect what?

A

Handling of student records, provides right of inspection, right to request corrections, restricts release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Gram-Leach Billey Act (GLBA) cover?

A

Financial services sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does GLBA require?

A

Written information security program, designated security officer, limitations of file sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Children’s online privacy protection act (COPPA) protects children under 13 how?

A

Requires websites have a privacy policy, provides for parental inspection and deletion, as well as consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy act of 1974 restricts the sharing of information for who?

A

Federal organizations only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer Fraud and Abuse ACT (CFFA) makes what a federal offense?

A

Unauthorized access to any machine that is engaged in interstate commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Electronic Communications Privacy Act (ECPA) does what?

A

Restricts government interception of communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What act makes it a federal crime to steal an identity?

A

Identity Theft and Asumption Deterrence Act (ITADA)

17
Q

Software licenses commonly contain provisions for what?

A

Number of users, amount of information that may be processed, locations of use, number of servers

18
Q

What are the types of agreements?

A

Negotiated contracts, Click-through agreements, Shrink-wrap agreements

19
Q

Types of intellectual property protection

A

Copyrights, trademarks, patents, trade secrets

20
Q

What does copyright protect?

A

Creative works such as music, art, computer software, and more

21
Q

How long does a copyright last?

A

For 70 years beyond creator’s death

22
Q

What do trademarks protect?

A

Words, branding, slogans

23
Q

How long do trademarks last?

A

Renewed every 10 years, and can last indefinitely

24
Q

What three criteria must an inventor meet for a patent?

A

Novelty (newness), Usefulness, Nonobvious

25
Q

How long do patents last?

A

20 years

26
Q

What is the first step in risk assessment?

A

Identify the risks facing your organization

27
Q

What is a common term for an external force jeopardizing security?

A

A Threat

28
Q

What is the method an attacker uses to exploit a vulnerability?

A

Threat Vector

29
Q

What step of the risk assessment process ranks by likelihood and outcome?

A

Step 2

30
Q

How does qualitative risk assessment rank items?

A

Low, Medium, High

31
Q

How does quantitative risk assessment rank items?

A

Dollars and numbers