Chapter 1 - Understanding Cybersecurity Policy and Governance Flashcards
(131 cards)
What is the significance of cybersecurity policies?
Cybersecurity policies protect individuals, economies, critical infrastructure, and countries from harm due to misuse or compromise of information and systems.
What role does policy play in corporate culture and civil society?
Policy provides direction, structure, and order, influencing behavior within organizations and society.
What is the objective of cybersecurity-related policies?
To establish guidelines for protecting information and information systems from threats.
List the characteristics of successful cybersecurity policies.
- Clear objectives
- Comprehensive scope
- Adaptability
- Stakeholder involvement
- Regular updates
- Effective communication
- Implementation strategies
Define the life cycle of a cybersecurity policy.
The life cycle includes stages such as development, implementation, evaluation, and revision.
How does the U.S. Department of Homeland Security define critical infrastructure?
As assets, systems, and networks vital to the economy, security, and health of the nation, whose incapacitation would have a debilitating effect.
What did Presidential Policy Directive 7 establish in 2003?
A national policy requiring federal entities to identify and protect critical infrastructure from attacks.
What is the key focus of Presidential Policy Directive 21 issued in 2013?
To strengthen and maintain secure and resilient critical infrastructure through shared responsibility.
What does Executive Order 13800 require from federal agencies?
Adoption of the Framework for Improving Critical Infrastructure Cybersecurity developed by NIST.
What is the main goal of Executive Order 14028 issued by President Biden?
To improve the cybersecurity defenses of the U.S. government and private sector.
Fill in the blank: The Cyber Resilience Act (CRA) and AI Act are regulations released by the _______.
[European Union]
What are the three classifications of corporate culture?
- Negative
- Neutral
- Positive
What is the difference between information security and cybersecurity policies?
Information security focuses on protecting data within an organization, while cybersecurity encompasses broader protection against attacks across all connections.
What is the primary purpose of the Torah from a social perspective?
To articulate a codified social order and provide guidance for behavior and interactions within society.
True or False: The U.S. Constitution was designed to be a static document without provisions for change.
False
How can corporate culture be shaped within an organization?
Both informally through individual treatment and formally through written policies.
What is a key lesson learned from the U.S. Constitution regarding policy?
Policies need to be dynamic enough to adjust to changing environments.
What role does policy play in protecting individual liberties?
Policy provides direction and structure to safeguard rights and freedoms.
What are some examples of business-related rules from the Torah?
- Not to use false weights and measures
- Not to charge excessive interest
- To be honest in all dealings
- To pay wages promptly
- To fulfill promises to others
What is a common impact of negative corporate culture?
A hostile environment where employees do not feel safe and customers are not valued.
What is the focus of the EU CRA Roadmap?
Strengthening the European cybersecurity ecosystem and enhancing resilience against cyber incidents.
What does cybersecurity encompass beyond traditional information security?
- Cyber risk management
- Threat intelligence
- Supply chain security
- Incident response
- Vulnerability management
What is the role of guiding principles in corporate culture?
They synthesize the fundamental philosophy and beliefs of an organization.
What is the difference in response between Company A and Company B after a data breach?
Company A blames management and avoids customer notification, while Company B seeks feedback, improves controls, and informs customers timely.
This illustrates the impact of corporate culture on incident response.