SY0-701: 5.0 (Security Program Management and Oversight) Flashcards
(152 cards)
Social Engineering Motivational Triggers (5.6)
Authority
Urgency
Social Proof
Scarcity
Likability
Fear
Soc Eng Trigger- Authority (5.6)
The power or right to give orders, make decisions, and enforce obedience
Soc Eng Trigger- Urgency (5.6)
Compelling sense of immediacy or time-sensitivity that drivers individuals to act swiftly or prioritize certain actions
Soc Eng Trigger- Social Proof (5.6)
Psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions or actions in similar situations
Soc Eng Trigger- Scarcity (5.6)
Psychological pressure people feel when they believe a product, opportunity, or resource is in limited or in short supply
Soc Eng Trigger- Likability (5.6)
Associated with being nice, friendly, and socially accepted by others
Soc Eng Trigger- Fear (5.6)
Feeling afraid of someone or something, as likely to be dangerous, painful, or threatening
Data Ownership (5.1)
Process of identifying the person responsible for the confidentiality, integrity, availability, and privacy of the information assets
Data Owner (5.1)
Senior executive role who has the responsibility for maintaining the confidentiality, integrity, and availability of the information asset
Data Controller (5.1)
Entity that holds responsibility for deciding the purposes and methods of data storage, collection, and usage and for guaranteeing the legality of processes
Data Processor (5.1)
Group or individual hired by the Data Controller to help with tasks like collecting, storing, or analyzing data
Data Steward (5.1)
Focused on the quality of the data and the associated metadata
Data Custodian (5.1)
Responsible for handling the management of the system on which the data assets are stored (e.g. SysAdmin)
Privacy Officer (5.1)
Role that is responsible for the oversight of any kind of privacy-related data, like PII (Personally Identifying Information), SPI (Sensitive Personal Information), PHI (Personal Health Information)
Risk Management (5.2)
Fundamental process that involves identifying, analyzing, monitoring, and reporting risks
Risk Management Lifecycle (5.2)
- Risk identification
- Risk analysis
- Risk treatment
- Risk monitoring
- Risk reporting
Risk Assessment Frequency (5.2)
Refers to how often the risk assessment process is conducted within an organization
Risk Assessment Frequency Types (5.2)
Ad-hoc
Recurring
One-Time
Continuous
Ad-hoc (5.2)
Conducted as and when needed, often in response to a specific event or situation that has the potential to introduce new risks or change the nature of existing risks; associated with specific events or situations
Recurring (5.2)
Conducted at regular intervals, such as annually, quarterly, or monthly
One-Time (5.2)
Conducted for a specific purpose and are not repeated; associated with a specific project or initiative
Continuous (5.2)
Ongoing monitoring and evaluation of risks
Risk Identification (5.2)
Recognizing potential risks that could negatively impact an organizations ability to operate or achieve its objective
RTO (5.2)
Recovery Time Objective- Represents the maximum acceptable length of time that can elapse before the lack of a business function severely impacts the organization