Misc Governance, Risk, and Compliance Flashcards

1
Q

SLA

A

Service level agreement - defines the level of service the customer expects from the service provider. The level of service definitions should be specific and measurable in each area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MOU

A

memorandum of understanding - a legal document that describes a mutual agreement between parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISA

A

interconnection security agreement - an agreement that specifies the technical and security requirements of the interconnection security requirements of the interconnection between organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BPA

A

business partnership agreement - a legal agreement between partners. It establishes the terms, conditions, and expectations of the relationship between the partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk severity = X*Impact

A

likelihood of occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RPO

A

Recovery point objective - specifies the allowable data loss. It is the amount of time that can pass during an interruption before the quantity of data lost during that period surpasses business continuity planning’s maximum acceptable threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MTTR

A

Mean time to repair - the average time it takes for a failed device or component to be repaired or replaced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MTBF

A

mean time between failures - the rating on a device or component that predicts the expected time between failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ARO

A

annual rate of occurrence - is the ratio of an estimated possibility that a threat will take place within a one-year time frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AUP

A

acceptable use policy - describes the limits and guidelines for users to make use of an organization’s physical and intellectual resources. This includes allowing or limiting the use of personal email during work hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIA

A

Business Impact Analysis - helps to identify critical systems by determining which systems will create the largest impact if they are not available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO 27002

A

a global standard that outlines guidelines for creating and sustaining information security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISO 27017

A

a standard for cloud security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST 800-12

A

a general security standard that is specific to the United States, not recognized internationally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST 800-14

A

a U.S. standard that focuses on policy development rather than information security management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PCI-DSS

A

Payment Card Industry Data Security Standard - a security standard that is mandated by credit card vendors. The Payment Card Industry Security Standards Council is responsible for updates and changes to the standard

17
Q

GDPR

A

General Data Protection Regulation - a standard for data privacy and security in the European Union (EU)

18
Q

SSAE

A

Standard for Attestation Engagements

19
Q

SSAE-18 SOC 2

A

SOC 2 engagement assesses the security and privacy controls that are in place

20
Q

SSAE-18 Type 2 report

A

Type 2 report provides information on the auditor’s assessment of the effectiveness of the controls that are in place

21
Q

SSAE-18 SOC 1

A

SOC 1 report assesses the controls that impact the accuracy of financial reporting

22
Q

SSAE-18 Type 1 report

A

Type 1 reports a review auditor’s opinion of the description provided by management about the suitability of the controls as designed. They do not look at the actual operating effectiveness of the controls.

23
Q

data controller

A

sometimes called a data owner. He determines the reasons for processing personal information and how it is processed

24
Q

Data steward

A

carries out the intents of the data controller

25
Q

data custodian

A

charged with safeguarding information

26
Q

Control risk

A

a term used in public accounting. It is the risk that arises from a potential lack of internal controls within an organization that may cause a material misstatement in the organization’s financial reports. In this case, the lack of controls that would validate the financial system’s data and function is a control risk