study set 2 Flashcards
What is it called when a data owner accepts the certification?
Accreditation
IAAA
A frame work: Identification Authentication Authorization Accountability
EF
Exposure Factor
the % of loss that is expected from an risk event
Privacy Act of 1974 applies to who?
applies only to federal Agencies
What are the 8 steps to EDRM
The Electronic Discovery Reference Model
- Identification
- Preservation
- Collection
- processing
- review
- Analysis
- Production
- Presentation
OEP
Occupant Emergency Plan
A privacy Policy needs to cover what 4 items?
- Collection
- Use
- Disclosure
- Protection
Vertical Control?
example Top secret, secret, etc…
Proactive Controls are?
Safeguards
‘IT’ logs and Documents are what type of Evidence?
Secondary Evidence
What is committee of sponsoring organizations of the treadway commission called?
COSO
Typosquatting
URL Hijacking
ISO 27799 standard is focused around?
Protecting PHI
Keylogger is a threat to what CIA
Confidentiality
GDPR
updated EU Law for 2018
“NEED TO KNOW” is what type of control?
Horizontal Control
Tangible and physical objects are what type of evidence
Real evidence
Hard drives, usb sticks but not the data on them.
What are 3 Corrective Controls
- anti-virus
- Patches
- IPS
What act is for Identity theft
(ITADA) Identity Theft and Assumption Deterrence Act