GRC Concepts Flashcards

1
Q

Information Flow model

A

A model that focuses on the flow of information to ensure that security is maintained and enforced no matter how information flows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Noninterference model

A

A model that seeks to ensure that objects and subject of different levels don’t interfere with objects and subjects of other levels. The noninterference model can be used to avoid convert channel attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lattice Model

A

Subjects are assigned security clearances. Objects are assigned security labels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Take-Grant model

A

A model that dictates how rights can be passed from one subject to another or from a subject to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bell–LaPadula model

A

A confidentiality focused security model built on a state machine model employing no read up, no write down mandatory access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biba model

A

An integrity focused security model employing no read down, no write up mandatory access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Simple Security Axiom

A

Subjects cannot read information at a higher classification level (no read up)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Star Security Axiom

A

Subjects cannot write information at a lower classification level (no write down)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Simple Integrity Axiom

A

subjects cannot read information at a lower classification (no read down)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Star Integrity Axiom

A

subjects cannot write information at a higher classification (no write up)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Clark-Wilson model

A

An integrity focused security model enforced through well-formed transactions. It uses a relationship of subject, program and object. Subjects do not have direct access to objects. Objects must be accessed through programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brewer and Nash model (aka Chinese Wall)

A

A security model designed to avoid conflicts of interest. It creates a conflict class that defines which security domains are potentially in conflict and prevents any subject with access to one domain that belongs to a specific conflict class from accessing other domains that belong to the same conflict class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Graham–Denning model

A

A security model focused on the secure creation and deletion of both subjects and objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fourth Amendment

A

Protection from unreasonable search and seizure by the government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer Fraud and Abuse Act (CFAA)

A

A US law enacted in 1984 to exclusively cover computer crimes that cross state boundaries to avoid infringing on states’ rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Federal Information Security Management Act (FISMA)

A

A US law passed in 2002 that requires that federal agencies implement an information security program. The National Institute of Standards and Technology (NIST), is responsible for developing the FISMA implementation guidelines, outlining the elements of an effective information security program.

17
Q

Digital Millennium Copyright Act

A

A law that establishes the prohibition of attempts to circumvent copyright protection mechanisms placed on a protected work by the copyright holder and limits the liability of Internet service providers when their circuits are used by criminals violating the copyright law.

18
Q

Economic Espionage Act of 1996

A

A law that states that anyone found guilty of stealing trade secrets from a US corporation with the intention of benefiting a foreign government may be fined up to $500,000 and imprisoned for up to 15 years and that anyone found guilty of stealing trade secrets under other circumstances may be fined up to $250,000 and imprisoned for up to 10 years.

19
Q

Copyrights

A

Law that guarantees the creators of “original works of authorship” protection against the unauthorized duplication of their work (70 years after creator’s death or 95 years after creator’s death for corporations).

20
Q

Trademark

A

A registered word, slogan, or logo used to identify a company and its products or services–renew every 10 years.

21
Q

Patent

A

Allows invention’s creator the sole right to make and sell that invention for a set period of time (20 years).

22
Q

Trade Secret

A

Intellectual property that is absolutely critical to a business and would cause significant damage if it were disclosed to competitors and/or the public. To preserve trade secret status, you must implement adequate controls within your organization to ensure that only authorized personnel with a need to know the secrets have access to them. You must also ensure anyone with type of access is bound by a non-disclosure agreement (NDA) that prohibits them from sharing the information with others.

23
Q

Privacy Act of 1974

A

A law that mandates that government agencies maintain only records that are necessary to conduct their business and destroy those records when they are no longer needed for a legitimate function of government. It provides a formal procedure for individuals to gain access to records the government maintains about them and to request that incorrect records be amended.

24
Q

Electronic Communications Privacy Act (ECPA)

A

The law that makes it a crime to invade an individual’s electronic privacy. It protects against the monitoring of email and voicemail communications and prevents providers of those services from making unauthorized disclosures of their content.

25
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

A law passed in 1996 that made numerous changes to the laws governing health insurance and health maintenance organizations (HMOs). Among the provisions of HIPAA are privacy regulations requiring strict security measures for hospitals, physicians, insurance companies, and other organizations that process or store private medical information about individuals.

26
Q

Health Information Technology for Economic and Clinical Health Act (HITECH)

A

A law passed in 2009, updating many of HIPAA’s privacy and security requirements. One of the changes mandated by the new regulations is a change in the way the law treats business associates (BAs), organizations that handle protected health information (PHI) on behalf of a HIPAA-covered entity. Under the new regulation, business associates are directly subject to HIPAA. HITECH also introduced new data breach notification requirements.

27
Q

Identity Theft and Assumption Deterrence Act

A

An act that makes identity theft a crime against the person whose identity was stolen and provides severe criminal penalties (up to a 15-year prison term and/or a $250,000 fine) for anyone found guilty of violating it.

28
Q

General Data Protection Regulation (GDPR)

A

European Union law that provides a single, harmonized law covering data security and privacy. The directive outlines key rights of the individual about whom data is held and/or processed:

           Right to access the data
           Right to know the data’s source
           Right to correct inaccurate data
           Right to withhold consent
           Right of legal action should they be violated
29
Q

USA Patriot Act

A

An act implemented after the September 11, 2001, terrorist attacks. It greatly broadened the powers of law enforcement organizations and intelligence agencies across a number of areas, including the monitoring of electronic communications.

30
Q

Gramm–Leach–Bliley Act (GLBA)

A

A law passed in 1999 that mandates confidentiality and integrity of consumer financial information for financial institutions.

31
Q

Sarbanes-Oxley Act of 2002

A

A law passed in 2002, in response to accounting scandals in the late 90s, that created regulatory compliance mandates for financial reporting of publicly traded companies.

32
Q

Payment Card Industry Data Security Standard (PCI-DSS)

A

A set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment.