Governance and compliance Flashcards

1
Q

Governance

A

IT security governance determines who is authorised to make decisions about cybersecurity risks within an organisation. It demonstrates accountability and provides oversight to ensure that any risks are adequately mitigated and that security strategies are aligned with the organisation’s business objectives and are compliant with regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT security management

A

IT security management defines and implements the controls that an organisation needs to have in place to mitigate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Governance

A

Data governance determines who is authorised to make decisions about data within an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data owner

A

A person who ensures compliance with policies and procedures, assigns the proper classification to information assets and determines the criteria for accessing information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data controller

A

A person who determines the purpose for which, and the way in which, personal data is processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data processor

A

A person or organisation who processes personal data on behalf of the data controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data custodian

A

A person who implements the classification and security controls for the data in accordance with the rules set out by the data owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data steward

A

A person who ensures that data supports an organisation’s business needs and meets regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data protection officer

A

A person who oversees an organisation’s data protection strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybersecurity Policy

A

A high-level document that outlines an organisation’s vision for cybersecurity, including its goals, needs, scope and responsibilities.
Specifically, it:
- Demonstrates an organisation’s commitment to security.
- Sets the standards of behaviour and security requirements for carrying out activities, processes and operations, and protecting technology and information assets within an organisation.
- Ensure that the acquisition use and maintenance of system operations, software and hardware is consistent across the organisation.
- Defines the legal consequences of policy violations.
- Gives the security team the support they need from senior management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Master cybersecurity policy

A

The blueprint for an organisation’s cybersecurity program, their policy serves as the strategic plan for implementing cybersecurity controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System-specific policy

A

This type of policy is developed for specific devices or computer systems and aims to establish standardisation for approved applications, software, operating system configurations, hardware and hardening countermeasures within an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identification and authentication policy

A

Specifies who should be permitted access to network resources and what verification procedures are in place to facilitate this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password policy

A

Defines minimum password requirements, such as the number and type of characters used and how often they need to be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Acceptable use policy

A

Highlights a set of rules that determine access to and use of network resources. It may also define the consequences of policy violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Acceptable use policy

A

Highlights a set of rules that determine access to and use of network resources. It may also define the consequences of policy violations.

17
Q

Remote access policy

A

Sets out how to remotely connect to an organisation’s internal network and explains what information is remotely accessible.

18
Q

Network maintenance policy

A

Outlines procedures for updating an organisation’s specified operating systems and end-user applications.

19
Q

Incident handling police

A

Provides guidance on how to report and respond to security-related incidents within an organisation.

20
Q

Data policy

A

Sets out measurable rules for processing data within an organisation, such as specifying where data is stored, how data is classified and how data is handles and disposed of.

21
Q

Credential policy

A

Enforces the rules for composing credentials, such as the minimum and maximum length of a password