Unit 5 - Module 2 - Safeguards Flashcards
What do you call safeguards designed to reduce specific security risks?
Security Controls
What are the 3 types of security controls?
Technical
Operational
Managerial
What is the protection of unauthorized access and distribution of data?
Information Privacy
Who do you call the person that decides who can access, edit, use, or destroy their information?
Data Owner
Anyone or anything that’s responsible for the safe handling, transport, and storage of information, what do you call them?
Data Custodian
What do you call the concept in which a user is only granted the minimum level of access and authorization required to complete a task or function?
Principle of Least Privilege
What are 3 ways of minimum lever of access inplemented?
1) Limiting access to sensitive information
2) Reducing the chances of accidental modification, tampering, or loss
3) Supporting system monitoring and administration
What are the 4 most common user accounts and what do they do?
Guest Account - Provided to external users who need to access an internal network, like customers, clients, contractors, or business partners
User Account - Assigned to staff based on their job duties
Service Account - Granted to application or software that needs to interact with other software on the network
Priviledge Accounts - Elevated permissions or administative access
When auditing accounts, what 3 common approaches are there?
Usage Audits
Privilege Audits
Account Change Audits
What are the 5 stages of a data lifecycle? In order
Collect
Store
Use
Archive
Destroy
What are the **3 data governance policies **that commonly categorize individuals into a specific role?
Data Owner - The person that decides who can access, edit, use, or destroy their information.
Data Custodian - Anyone or anything that’s responsible for the safe handling, transport, and storage of information.
Data Steward - The person or group that maintains and implements data governance policies set by an organization.
What are the 3 catagories or peoples sensitive information?
PII ( Personal Identifiable Information ) - Any information used to infer an individual’s identity. Info that can be used to contact or locate someone.
**PHI - ( Protected Health Information ) **- Information that relates to peoples health.
**SPII - (Sensitive Identifiable Personal Information) **- Bank account info, login information, ect.
What do you call the protection of unauthorized access and distribution of data?
Information Privacy
What do you call the practice of keeping data in all states away from unauthorized users?
Information Security ( InfoSec )
What regulations are developed by the EU and puts data owners in total control of their personal information?
GDPR
( General Data Protection Regulation )
What do you call the security standards formed by major organizations in the financial industry? Securing credit and debit card transactions.
**PCI DSS **
( Payment Card Industry Data Security Standard )
What U.S law requires the protection of sensitive patient health information?
HIPAA
( Health Insurancce Protability and Accountability Act )
What do you call the review of an organization’s security controls, policies, and procedures against a set of expections?
Security Audit
What do you call seeing how resilient the current security implementation are against threats?
Security Assessment
What do you call the process of transforming information into a form that unintended readers can’t understand?
Cryptography