Week 02 Flashcards

All flashcards for Week 02

1
Q

Risk Management

What is risk management?

A

The process of identifying, assessing, and mitigating potential threats to minimize their impact on an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybersecurity Governance:

What is meant by cybersecurity governance?

A

The framework and policies for managing and overseeing an organization’s security strategies and practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compliance

What is compliance?

A

Adhering to external regulations and standards to meet legal or industry-specific cybersecurity requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Incident handling

What is incident handling?

A

The process of responding to and managing a security breach or attack in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Investigation

What does investigation of cybersecurity incident mean?

A

The detailed analysis conducted after an incident to determine its cause, impact, and necessary actions for prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asset

What is an asset?

A

Anything that has a value and requires protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Analysis vs Risk Assessment

What is the difference between Risk analysis and risk assessment?

A

Risk Assessment: The process of identifying and evaluating potential risks to an organization.
Risk Analysis: The detailed examination of identified risks to understand their likelihood and potential impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Posture

How do you define the security posture of an entity?

A

The overall strength and readiness of an organization’s security measures to protect against and respond to cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PDCA vs SETA

PDCA vs SETA

A

PDCA (Plan-Do-Check-Act): A continuous improvement cycle used in management to plan, implement, monitor, and improve processes.
SETA (Security Education, Training, and Awareness): A program designed to educate employees on security policies, improve skills, and raise awareness of security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Audit

What is an audit?

A

A systematic evaluation of an organization’s compliance with policies, regulations, and standards, especially related to security and operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compliance

What do we mean by security compliance?

A

Ensuring that the organization meets external legal, regulatory, and industry requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Custodian

Who is a data custodian?

A

The entity responsible for maintaining and safeguarding data, including its storage, backup, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Owner/Controller

Who is a data owner?

A

The person or entity that owns the data and is responsible for defining access and use policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Subject

What does the term Data Subject refer to?

A

The individual to whom the data pertains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PII (Personally Identifiable Information)

What does PII (Personally Identifiable Information) mean?

A

Data that can be used to identify an individual, such as name, address, or social security number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Policy

Define policy

A

A formal set of rules and guidelines to manage and protect information systems and data.

17
Q

Security Control Framework

What does Security Control Framework mean?

A

A structured set of standards, guidelines, and practices to manage and reduce security risks.

18
Q

Standards

What does the term Standards mean?

A

Specific, detailed technical specifications and requirements that ensure security and operational consistency.

19
Q

Due Care vs due diligence

Whats the difference between due care and due diligence?

A

Due Care: The practice of ensuring that all necessary precautions are taken to protect assets and data.
Due Diligence: The continuous, proactive efforts to identify risks and vulnerabilities before they become a threat.

20
Q

RPO and RTO

Define RPO and RTO

A

RPO (Recovery Point Objective): The maximum acceptable amount of data loss measured in time before an incident.
RTO (Recovery Time Objective): The target time to restore operations after an outage or disaster.

21
Q

MAD vs MTD

What does MAD and MTD refer to?

A

MAD (Maximum Acceptable Downtime) or MTD (Maximum Tolerable Downtime): The longest period that an organization can tolerate system downtime before it severely impacts operations.

22
Q

Residual Risk

What is residual risk?

A

The remaining risk after security measures and controls have been applied.