Security And risk Management Flashcards
(144 cards)
Need to know access
Confidentiality
Information processed correctly and not modified by unauthorized persons and protecting data in transit
Integrity
Ensuring systems are up and running so that persons can use them when they need them
Availability
Who get access- who is authorized to speak behave access to the system
Availability
Lashes, digital signatures, parity bits, separation of duties
Integrity
Remote sites, backups, high availability, RAID levels,
Availability
Validates appropriate policies, procedures and standards and guidelines are implemented to ensure business operations
Information Security Management
Things measured on a long-term trends and illustrate the day-to-day workload
Metrics
Who is responsible for Security
Everyone
Who is ultimately responsible for Security
Executive Management/Executive Level
Who does security report too?
Chain of command
Detecting- pre-emptive measure made to avoid harm to other persons or their property
Due Diligence
Caring is correcting
Due Care
Legal term used to describe the care a “reasonable person” would exercise under given circumstances
Due Care
Examples: Background checks of employee credit checks of business partners Information security assessments Penetration testing Contingency testing of backup systems
Due Diligence
Dual use goods
Wassenaar Arrangement
3 types of access control
Administrative
Physical
Technical
Name 2 types of Risk
Likelihood
Impact
What is C.I.A?
Confidentiality; Availability and Integrity
idea that is certified and made public
Patent
Expression of an idea
Copyright
What organization concisely defines intellectual property?
World Intellectual Property Organization (WIPO)
What laws explain what is an export?
International Traffic in Arms Regulations Act (ITAR:1976)
What laws explain What is deemed export?
Export Administration Regulations Act Security (EAR:1979)