CC6 - Chapter 6 Flashcards
(41 cards)
- :
Organizations must recognize the privacy and confidentiality needs of their stakeholders.
Yung mga stakeholders na yon is yung mga clients, patients, students, citizens, suppliers, or business partners. Everyone in an organization must be a responsible trustee of their stakeholders’ data.
Stakeholders
- : a
re in place to protect the interests of some stakeholders.
Regulations have different goals. Somerestrict access
to information, while others ensureopenness
, transparency, and accountability.
Government regulations
- :
Each organization has their own data to protect
. An organization’s data provides insight into its customers and, when used effectively, can provide a competitive advantage. If confidential data is stolen or breached, an organization can lose competitive advantage.
Proprietary business concerns
- : When securing data, organizations must also enable legitimate access.
Business processes require individuals in certain roles be able to access, use, and maintain data.
Legitimate access needs
- : Contractual and
non-disclosure agreements
also influence data security requirements. For example, the PCI Standard, an agreement among credit card companies and individual business enterprises, demands that certain types of data be protected in defined ways (e.g., mandatory encryption for customer passwords).
Contractual obligations
includes attaining and sustaining operational business goals
. Data security issues, breaches, and unwarranted restrictions on employee access to data can directly impact operational success.
Business growth
are the primary drivers of data security activities. Ensuring that an organization’s data is secure reduces risk and adds competitive advantage. Security itself is a valuable asset.
Risk reduction and business growth
: Depending on the industry and organization, there can be few or many assets, and a range of sensitive data (including personal identification, medical, financial, and more).
Identify and classify sensitive data assets
: The measures necessary to ensure security can vary between assets, depending on data content and the type of technology.
Determine how each asset needs to be protected
: Analysis of business processes is required to determine what access is allowed and under what conditions.
Identify how this information interacts with business processes
definition, planning, development and execution of security policies and procedures to provide proper authentication, authorization, access, and auditing of data and information assets
data security
- : Data Security is a collaborative effort involving IT security administrators, data stewards/data governance, internal and external audit teams, and the legal department.
Collaboration
- : Data Security standards and policies must be applied consistently across the entire organization.
Enterprise approach
- : Roles and responsibilities must be clearly defined, including the ‘chain of custody’ for data across organizations and roles.
Clear accountability
- : Success in data security management depends on being proactive and dynamic, engaging all stakeholders, managing change, and overcoming organizational or cultural bottlenecks such as traditional separation of responsibilities between information security, information technology, data administration, and business stakeholders.
Proactive management
is a weaknesses or defect in a system that allows it to be successfully attacked and compromised – essentially a hole in an organization’s defenses. Some vulnerabilities are called exploits.
vulnerability
- : Security classification for data elements is an essential part of data definitions.
Metadata-driven
- : Minimize sensitive/confidential data proliferation, especially to non-production environments.
Reduce risk by reducing exposure
is a potential offensive action that could be taken against an organization. Threats can be internal or external. They are not always malicious. An uniformed insider can take offensive actions again the organization without even knowing it. Threats may relate to specific vulnerabilities, which then can be prioritized for remediation. Each threat should match to a capability that either prevents the threat or limits the damage it might cause. An occurrence of a threat is also called an attack surface.
threat
- Probability that the threat will occur and its likely frequency
- The type and amount of damage created each occurrence might cause, including damage to reputation
Risk
describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.
Classifications are used to determine who (i.e., people in which roles) can access the data. The highest security classification of any datum within a user entitlement determines the security classification of the entire aggregation.
Risk classifications
-
Personal information aggressively sought for unauthorized use by both internal and external parties due to its high direct financial value
. Compromise of CRD would not only harm individuals, but would result in financial harm to the company from significant penalties, costs to retain customers and employees, as well as harm to brand and reputation.
Critical Risk Data (CRD):
- : is actively sought for
unauthorized use due to its potential direct financial value.
it provides the company with a competitive edge. If compromised,it could expose the company to financial harm through loss of opportunity
. Loss of HRD can cause mistrust leading to the loss of business and may result in legal exposure, regulatory fines and penalties, as well as damage to brand and reputation.
High Risk Data (HRD)
- : Company information that has
little tangible value to unauthorized parties
; however, the unauthorized use of this non-public information would likely have a negative effect on the company.
Moderate Risk Data (MRD)