QUIZ 6 7 reset to pag exam na. gawa bago Flashcards

(51 cards)

1
Q

A branch of economics that studies how information is produced, distributed, and consumed in various markets, examining how information asymmetry affects market outcomes and how information availability influences buyer/seller behavior and market prices/quantities.

A

Economics of Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A key input used to produce goods and services, the effective collection, analysis, and use of which often leads to greater company success and economic value creation.

A

Information as a valuable resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A method for valuing information assets that involves looking at the prices for which similar information assets have sold in the past.

A

Market Approach / Market-based approaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A method for valuing information assets that involves estimating the cost of creating or acquiring the information asset.

A

Cost Approach / Cost-based approaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A method for valuing information assets that involves estimating the future income the information asset is likely to generate.

A

Income Approach / Income-based approaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The collective attributes such as accuracy, completeness, timeliness, relevance, uniqueness, and demand that determine the worth of information.

A

Factors influencing information’s value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of managing information from its creation to its final disposition, serving as a key factor in a company’s risk management strategy.

A

Information Lifecycle Management (ILM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The five major phases information must go through and be managed during its lifespan, consisting of acquisition/creation, storage/maintenance, processing/use, disposition, and archival.

A

5 stages of information life cycle (ILM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The first phase in the information lifecycle where information is created and produced by a company or individuals, and information sources are identified.

A

Acquisition and creation (ILM phase)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The second stage in the information lifecycle where organizations define storage locations, backup schedules, maintenance procedures, and security measures for their information.

A

Storage and maintenance (ILM phase)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The third stage in the information lifecycle where information is received, organized, and evaluated, such as processing CRM data for business decisions.

A

Processing and use (ILM phase)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The fourth stage in the information lifecycle involving the disposal or retention of information, often guided by a retention schedule to comply with rules and regulations.

A

Disposition (ILM phase)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The final stage in the information lifecycle where organizations define how information will be archived, the hardware to be used, and the format and technologies for long-term preservation.

A

Archival (ILM phase)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The set of difficulties in managing information effectively throughout its lifespan, including dealing with outdated data, deletion decisions, risk reduction, managing sensitive data, and keeping up with industry trends.

A

Challenges of an Effective Information Lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The advantages gained from implementing a structured approach to managing information from creation to disposition, including reduced risks, cost savings, improved security, better governance, enhanced performance, and increased agility.

A

Benefits of Information Lifecycle Management (ILM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A field studying the intersection of cybersecurity and economics, addressing budgeting, governance, risks, and sustainability in socio-technical systems, and providing policy recommendations, regulatory options, and practical solutions for enhancing cybersecurity posture.

A

Cybersecurity Economics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The economic field often defined with a focus on achieving maximum asset protection at minimal cost.

A

Cybersecurity Economics (common definition focus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The core issue in cybersecurity economics concerning the efficient allocation of financial resources for cybersecurity.

A

Budgeting (in Cybersecurity Economics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The core issue in cybersecurity economics where security decisions made by one entity impact other interconnected entities within digital ecosystems.

A

Interdependent Risks (in Cybersecurity Economics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The core issue in cybersecurity economics where unequal security knowledge among parties leads to adverse selection, moral hazards, and potentially market failure.

A

Information Asymmetry (in Cybersecurity Economics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The core issue in cybersecurity economics that involves establishing structured decision-making processes and security coordination among various organizations.

A

Governance (in Cybersecurity Economics)

22
Q

The core issue in cybersecurity economics related to the financial impact of malicious digital activities, assessed at global, national, or organizational levels, affecting financial stability.

A

Cybercrime Costs (in Cybersecurity Economics)

23
Q

The core issue in cybersecurity economics concerning the long-term viability of cybersecurity providers, which depends on a balanced distribution of value among all stakeholders.

A

Sustainability (in Cybersecurity Economics)

24
Q

The collective elements such as industry, number of employees, technology used, existing security measures, past attack analysis, potential attack cost, and current security protocols that influence a company’s cybersecurity expenditures.

A

Factors that Affect Cybersecurity Costs

25
A security strategy and process designed to protect sensitive information by viewing operations from an adversary’s perspective, identifying actions that could expose critical data, and detecting and mitigating vulnerabilities before exploitation.
Operational Security (OPSEC)
26
The collective benefits of OPSEC, including helping organizations recognize overlooked risks, preventing unintentional data exposure, strengthening defenses against various threats, and safeguarding future plans and capabilities.
Importance of OPSEC
27
The five-stage process in operational security that includes identifying sensitive information, identifying threats, analyzing vulnerabilities, assessing risks, and devising a plan to mitigate threats.
The 5 Steps Of Operational Security
28
The first step in OPSEC, involving understanding and listing critical data such as customer details, financial records, and intellectual property.
Identify Sensitive Information (OPSEC Step 1)
29
The second step in OPSEC, involving recognizing internal and external entities that could target an organization's sensitive data.
Identify Threats (OPSEC Step 2)
30
The third step in OPSEC, involving assessing weak points in an organization's current security practices and infrastructure.
Analyze Vulnerabilities (OPSEC Step 3)
31
The fourth step in OPSEC, involving prioritizing identified vulnerabilities based on their threat level and potential impact.
Assess Risk (OPSEC Step 4)
32
The fifth step in OPSEC, involving the implementation of countermeasures such as hardware upgrades, updated policies, and staff training to minimize identified risks.
Devise a Plan to Mitigate Threats (OPSEC Step 5)
33
The characteristics of an effective OPSEC mitigation plan, which should be straightforward, adaptable, and involve updating equipment, implementing strict data policies, conducting employee training, and continuous revision.
Effective OPSEC Mitigation Planning
34
A set of recommended guidelines for operational security, including logging network changes, allowing only essential devices, granting minimal necessary access, separating network management from security policy, using technology to reduce human error, and developing incident response strategies.
Best Practices For OPSEC
35
An OPSEC best practice that involves logging and controlling all changes made to a network.
Change Management (OPSEC)
36
An OPSEC best practice that involves permitting only essential and authorized devices to connect to networks.
Restrict Device Access (OPSEC)
37
An OPSEC best practice ensuring that users and systems are granted only the minimal levels of access necessary to perform their functions.
Least Privilege Access (OPSEC)
38
An OPSEC best practice that involves separating the responsibilities for network management from those for setting security policies.
Dual Control (OPSEC)
39
An OPSEC best practice that involves leveraging technology to perform tasks and thereby minimize the potential for human error.
Automation (OPSEC)
40
An OPSEC best practice that involves developing comprehensive incident response strategies to enable recovery from cyberattacks or other disruptive events.
Disaster Planning (OPSEC)
41
A comprehensive evaluation of an organization’s information systems, designed to measure its security posture against established best practices, standards, and regulations.
Security Audits
42
The key areas typically examined during a security audit, including physical infrastructure, software management, network vulnerabilities, human factors, and security policies.
Aspects Assessed by Security Audits
43
The function of security audits in confirming adherence to specific industry standards and regulations such as HIPAA, SOX, ISO, and NIST.
Role of Security Audits in Compliance Verification
44
The typical detailed findings presented in a security audit report, including identified vulnerabilities, gaps in compliance, and recommendations prioritized by risk.
Content of a Security Audit Report
45
Specific technical and procedural domains scrutinized in security audits, such as access controls, network security measures, endpoint protection, data encryption, and incident response capabilities.
Key Areas Examined in Security Audits (Detailed)
46
The practice of adhering to applicable laws, industry standards, and internal policies, with the goal of avoiding legal, financial, and reputational damage.
Compliance with Laws and Regulations
47
Notable regulatory or industry standards that organizations may need to adhere to, such as GDPR for data privacy, HIPAA for healthcare, Sarbanes-Oxley for finance, and PCI DSS for payment security.
Examples of Compliance Frameworks
48
The elements typically reviewed to ensure adherence to laws and regulations, including controls, policies, procedures, documentation, and evidence, which can be assessed internally or by third parties.
Review Inclusions for Compliance
49
The supportive role security audits play in enabling organizations to achieve and sustain adherence to legal and regulatory requirements.
Relationship Between Security Audits and Compliance
50
The advantages for an organization that result from conducting security audits and maintaining compliance, including legal adherence, improved risk management, better governance, enhanced trust, and cost savings.
Benefits of Security Audits and Compliance
51
Recommended guidelines for conducting effective security and compliance audits, such as defining clear scope, involving stakeholders, collecting comprehensive data, performing risk assessments, creating remediation plans, and conducting regular reviews.
Best Practices for Security and Compliance Audits