Memorization Flashcards
(93 cards)
4th Amendment
Basis for privacy rights in the US
ALE
Annualized Loss Expectancy
(Cost of losses per year)
SLE x ARO
(Single Loss Expectancy X Annual Rate of Occurrence)
ARO
Annual Rate of Occurence
Number of Losses per Year
EF
Exposure Factor
Percentage of Asset Value Lost
SLE
Single Loss Expectancy
(Cost of One Loss)
AV x EF
(Asset Value X Exposure Factor)
AV
Asset Value
Risk Formula
Threat X Vulnerability
multiplied by Impact sometimes
ECPA
Electronic Communications Privacy Act
Prohibits eavesdropping or interception without distinguishing private/public.
Protects from warrant-less wiretapping.
OECD
Organization for Economic Cooperation and Development
Provides for data collection, specifications, and safeguards.
1974 US Data Privacy Act
Protection of PII on Federal databases.
GLBA
Gramm-Leach-Bliley Act
Credit related PII.
ISC2 Code of Ethics Canons
- Protect society, the commonwealth, and the infrastructure.
- Act honorably, justly, responsibly, and legally.
- Provide diligent and competent service to principals.
- Advance and protect the profession.
EU Data Protection Directive
Notify individuals how personal data is collected and used.
Allow Individuals to opt out of sharing data with 3rd parties.
Require individuals to opt into sharing most sensitive personal data.
Providing reasonable protections for personal data.
ISO 27005
Risk Management Framework
CIA Triangle
Confidentiality
Integrity
Availability
IAAA
4 Key Principles of Access Control
Identification
Authentication
Authorization
Accountability
Private Sector Classification Labels
Public - used by public or employees
Private - EX. SSN, CC# (could cause damage)
Confidential - Cause exceptionally grave damage
Proprietary - trade secrets
Sensitive - internal business
Government Classification Labels
Confidential - Some Damage
Secret - Serious Damage
Top Secret - Grave Damage
NIST 800-14
Securing IT Systems
NIST 800-88
Guidelines for sanitization and disposal
NIST 800-122
PII Definitions
NIST 800-145
Cloud Computing
International Safe Harbor Tenets
- Notice
- Choice
- Onward Transfer
- Security
- Data Integrity
- Access
- Enforcement
International Common Criteria
EAL1: Functionally Tested
EAL2: Structurally Tested
EAL3: Methodically tested and checked
EAL4: Methodically designed, tested, and received
EAL5: Semi-formally designed and tested
EAL6: Semi-formally verified, designed, and tested
EAL7: Formally verified, designed, and tested