S3, M3-M5 Flashcards
(133 cards)
What is the key difference in vulnerability assessments and security assessments, in terms of scope?
Vulnerability assessment focuses on technical weaknesses, and security assessment is more comprehensive.
Security assessment engagements result in the issuance of what type of report?
Security Assessment Report (SAR)
What is the first step in a security assessment engagaement?
defining assessment procedures, objectives, objects, and methods
What is an assessment object?
identifies items being assessed as part of a specific control
What is an assessment method?
define nature of action to take
What two things does a security assessment report document?
- findings, and
- reccomendations for correcting issues/vulnerabilities
What are determination statements in a SAR?
assign a grade to each procedure performed
What are the two possible grades for a determination statements?
- Satisfied, S
- Other than Satisfied, O
Elements that have more evidence/depth require (less/more) testing.
less
If training to employees is provided in-house, what otehr tools will the organization need?
teaching tools aka content creation tools
What should be done with trainings over time?
revisions to stay updated
What are the three relevant categories of personell with differing levels of responsibility, when it comes to employee training?
management, specialized IT personnel, all other employees
How often should refresher training courses be administered to employees?
annually
What is a security program champion?
lead the effort of implementing a security plaform
What is the definition of privacy?
- protects the rights of an individual, and
- gives the individual control over what information they are willing to share with others
What is confidentiality?
protects unauthorized access to information gathered by the company
How can privacy and confidentiality be represented in a two step process?
- Gather information according to privacy requirements.
- Protect the confidentiality of gathered information.
What is the definition of PII?
all data that can be used to identify an individual
Is an address PII?
Yes.
Is a photographic image considered PII?
Yes.
How much personal information should be collected and retained?
minimal
What two items are included within the broader umbrella of “confidential data”?
- PII
- proprietary information
What does pseudonymization do?
replace the name of someone with a fake name (Patient 123)
Should the ability to access personal info from mobile devices be more strict or less strict?
More strict, because of the increased risk of mobile devices.