Security And Risk Management Flashcards

(30 cards)

1
Q

Due Care

A

Fulfilling legal responsibilities and professional best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Due Dilligence

A

Taking reasonable measures to investigate security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COBIT

A

Control Objective for IT Business-Focused control framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO 27001

A

Cybersecurity control objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISO 27002

A

Cybersecurity control implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO 27701

A

Privacy Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO 31000

A

Risk management programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST 800-53

A

Mandatory for federal agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSF

A

NIST Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST Cybersecurity Framework (CSF) functions

A

Identify, protect, detect, respond, recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PII

A

Personal Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PHI

A

Protected Health Information. Governed under HIPAA (Health Insurance and Accountability Act)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

GAPP

A

Generally accepted privacy principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GAPP Principles

A

Management, Notice, Choice and Consent, Collection, (Use, retention and disposal), Access, Disclosure with Third Parties, Security, Quality, (Monitoring and enforcement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISO / IEC 27018: 2019

A

Protection of PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CFAA

A

Computer Fraud and Abuse Act

Prohibits unauthorized access to computer systems in commerce

Prohibits the creation of malicious code

17
Q

ECPA

A

Electronic Communications Privacy Act

Restricts government interception of communications

18
Q

ITADA

A

Identity Theft and Assumption Deterrence Act

19
Q

Copyrights

A

Protect creative works (books, music, etc)

20
Q

Trademarks

A

Protect words and symbols (indefinite, 10 year renewal)

21
Q

Patents

A

Protect inventions

22
Q

Trade Secret

A

Not patented as you have to disclosed how it works

23
Q

ITAR

A

International Traffic in Arms Regulations

“Defense articles”

24
Q

EAR

A

Export Administration Regulations

“Dual use; Military and civil use”

25
OFAC
Office of Foreign Assets Control Cover sanctioned countries
26
Security Policy Framework components
Policies, Standards, Guidelines and Procedures
27
Security Policies
Provide a foundation for a security program Are written carefully over a long period of time Mandatory Approved high level of the organization
28
Security Standards
Specific details of security controls Mandatory Less rigorous approval process
29
Guidelines
Advice for the organization Follow best practices Not Mandatory
30
Procedures
Step by step | Can be mandatory or not