study set 1 Flashcards

learn it (40 cards)

1
Q

What are the 4 codes of Ethics?

A
  1. Protect the Society, commonwealth and the infrastructure
  2. Act Honorably, honestly, justly, responsibly, and legally
  3. Provide Diligent and competent Service to principals
  4. Advance and protect the profession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Known as a Program Policy

A

Organizational security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISO 27002

A

Provides practical Advice for HOW TO implement Security controls, use 10 domain to Address ISMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO 27005

A

Approach To Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are The Risk control Frameworks?

A
  1. COSO
  2. COBIT
  3. ISO 27001
  4. NIST 800_53 (government agencies)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Long term focus on sustaining Operation of the business following a Disaster

A

Business Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of policy is Mandatory with High level statements that supports strategic Goals of the Organization.

A

Organizational security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Risk Methodologies that focuses on IT Systems not the Organizational Strategy

A

NIST SP 800-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A system meets the requirements of the Data Owner is called?

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A dollar figure that represents what the asset is worth to the organization

A

(AV) Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ITADA

A

Identity Theft and Assumption Deterrence Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ECPA

A

Electronic communication Privacy Act

Restricts Governments of interception of communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CISO

A

Chief Info Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SCI

A

Sensitive Compartmented Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which standard comes from ISACA?

A

COBIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Responding to a Risk is called?

A

Risk Mitigation

18
Q

The Key items in privacy protection for DATA Processors are?

A

Training and Auditing

19
Q

To identify Assets, threats and vulnerabilities

A

Risk Assessment

20
Q

The 7 phases of BCP

A
  1. Project Initiation
  2. Business Impact Analysis
  3. Recovery Strategy
  4. Plan Design and Development
  5. Implementation
  6. Testing
  7. Maintenance
21
Q

Will help you decide the correct risk mitigation Strategy?

A

Cost / Benefit Analysis

22
Q

ISO 27004

23
Q

TCO

A

Total cost of Ownership
The total cost of implementing a safeguard.
includes maintenance fees

24
Q

Ensures that the state holders needs conditions and options are evaluated.

25
How long is a trademark?
10 years
26
What are the Steps in Risk Management?
1. Risk Assessment 2. Risk Analysis 3. Risk Mitigation 4. Risk Monitoring
27
ESI
Electronically Stored information
28
Instance of a compromise
Exploit
29
System specific policy
Is Geared towards use of networks, systems, and approved software lists
30
A Risk assessment that use Qualitative analysis to calculate An Risk value
FRAP?
31
Vertical Control and Horizontal Control are?
(SCI) Sensitive Compartmented Information Government
32
Determining which portions of the a standard an organization will use?
Scoping
33
Who handles the Day to Day Data Governance
Data Steward
34
The 3 Risk Methodologies?
1. Octave 2. Frap 3. NIST 800-30
35
What process finds trust boundaries and data flow paths?
Reduction Analysis
36
ISO 27001
Establishment Implementation of controls and improvements of ISMS. Follow the PDCA
37
What are the 9 steps in NIST 800-30
1. System characterization 2. Threat Identification 3. Vulnerability Identification 4. Control Analysis 5. Likelihood Determination 6. Impact Analysis 7. Risk Determination 8. Control Recommendations 9. Results Documentation
38
A Scheme for classifying Data with Categories?
Taxonomy | HR, Executives, union, ETC...
39
An analysts to identify assets and their criticality, identify Vulnerabilities and threats and base the protection strategy to reduce Risk
OCTAVE
40
What are the 7 steps to implement a Classification Scheme?
1. Identity Custodian 2. Specify Evaluation Criteria 3. Classify and Label each Resource 4. Document Exceptions 5. Select Security Controls 6. Specify declassification Procedures 7. create Awareness Program