Domain 1 Flashcards

1
Q

Corporate Governance

A

System of rules and practices directing and controlling an organization to achieve its goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Governance

A

System directing and controlling the security function to align with organizational goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accountability

A

Ownership and ultimate answerability for actions, cannot be delegated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Responsibility

A

Execution of tasks and obligations, can be delegated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Due Diligence

A

Demonstration of care and attention to stakeholders’ interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ITAR

A

International Traffic in Arms Regulations, restricts export of defense-related articles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Export Administration Regulations (EAR)

A

Regulates export of dual-use items and certain defense-related products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wassenaar Arrangement

A

Voluntary export control regime among 42 signatory countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trans-Border Data Flow Laws

A

Regulations governing movement of data across physical borders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privacy

A

Protection of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ethics

A

Principles guiding morally acceptable behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Policies

A

Rules directing behavior within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standards

A

Specific mandatory requirements for hardware and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Procedures

A

Step-by-step actions to achieve a specific task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Baselines

A

Minimum security configurations for systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Guidelines

A

Recommended actions, not mandatory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk Management

A

Process of identifying, assessing, and mitigating risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Procurement

A

Process of acquiring goods or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Awareness

A

Informal communication to increase understanding of security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Training

A

Formal instruction to develop specific skills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Education

A

Teaching fundamental concepts and principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Risk Management

A

An essential component of any comprehensive security program that focuses on the identification assessment prioritization and treatment of risks to minimize monitor and control their probability and/or impact.

23
Q

Asset Valuation

A

Assigning a value to each asset in an organization to understand its importance and prioritize them accordingly.

24
Q

Quantitative Analysis

A

Assigning monetary values to assets or risks to quantify their impact or value.

25
Q

Qualitative Analysis

A

A relative ranking system where assets or risks are compared to each other based on their importance or value.

26
Q

Threats

A

Potential dangers or events that have the potential to cause harm or damage to an organization’s assets operations or reputation.

27
Q

Vulnerabilities

A

Weaknesses or gaps in an organization’s security or control systems that can be exploited by threats to cause harm or damage.

28
Q

Likelihood

A

The chance or probability of a particular risk event occurring indicating the likelihood of a potential risk turning into an actual event.

29
Q

Impact

A

The potential harm or damage that could result from a particular risk occurring including downtime reputational damage data integrity issues etc.

30
Q

Risk Analysis

A

The process of identifying and understanding the risks associated with each asset including threats vulnerabilities likelihood and impact.

31
Q

Risk Treatment

A

Determining how to address or handle the risks identified through risk analysis including methods such as avoidance transfer mitigation or acceptance.

32
Q

Risk Avoidance

A

Implementing measures to prevent a risk from occurring or choosing not to engage in activities that would cause the risk to occur.

33
Q

Risk Transfer

A

Transferring the financial burden of a particular risk to an insurance policy or another party while still maintaining accountability for the risk.

34
Q

Risk Mitigation

A

Implementing controls or measures to reduce the likelihood or impact of a risk such as administrative technical or physical controls.

35
Q

Residual Risk

A

The risk that remains after mitigating controls have been implemented representing the remaining level of risk exposure.

36
Q

Safeguards

A

Controls or measures put in place to prevent or reduce the likelihood of a risk occurring including directive preventative detective corrective recovery and compensating controls.

37
Q

Countermeasures

A

Actions or measures taken to counteract or respond to a risk or threat typically implemented as part of risk mitigation strategies.

38
Q

Assurance

A

The confidence or certainty that a control is working correctly and effectively often achieved through monitoring testing or auditing.

39
Q

Privacy

A

The state or condition of being free from being observed or disturbed by other people

40
Q

Intellectual Property

A

Legal rights protecting creations of the mind such as inventions works of art symbols designs and so forth these rights allow the owners to have exclusive control over the use distribution and commercialization of their creations and to prevent others from using or exploiting them without permission.

41
Q

Data Controller

A

Individual or entity responsible for managing personal data and ensuring compliance with privacy regulations within an organization

42
Q

Personal Data

A

Information that can identify an individual such as personally identifiable information (PII) which includes various identifiers like names social security numbers and biometric data

43
Q

Data Life Cycle

A

The stages through which data passes from creation to destruction including creation storage use sharing archiving and disposal

44
Q

OECD Privacy Principles

A

A set of guidelines from the Organization for Economic Cooperation and Development outlining best practices for privacy protection

45
Q

GDPR

A

General Data Protection Regulation a European Union regulation governing data protection and privacy for individuals within the EU and the European Economic Area

46
Q

Supervisory Authorities

A

Independent public authorities established in each EU member state to enforce GDPR compliance and handle data protection issues

47
Q

Trade Secrets

A

Confidential information giving a business a competitive advantage protected by law from unauthorized disclosure or use

48
Q

Patents

A

Legal protection granted to inventors giving exclusive rights to their inventions for a set period

49
Q

Copyright

A

Legal protection of original works of authorship fixed in any tangible medium of expression granting exclusive rights to the creator

50
Q

Trademarks

A

Symbols words or designs distinguishing and identifying products or brands in the marketplace protected by law from unauthorized use

51
Q

Data Destruction

A

Secure disposal of data when it is no longer needed ensuring it cannot be accessed or recovered by unauthorized parties

52
Q

Data Classification

A

Categorization of data based on its sensitivity value and handling requirements throughout its life cycle

53
Q

Encryption

A

Process of encoding information to make it unreadable without the proper decryption key enhancing data security and confidentiality