5.1 Summarize elements of effective security governance

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key concepts and definitions related to security governance, compliance, and associated policies.

Last updated 12:21 AM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

15 Terms

1
New cards

Policies, standards, and procedures are three key components that form the foundation of an organization's __________ program.

security

2
New cards

Organizational policies provide a framework for operations, decision-making, and behaviors, establishing the rules for a compliant and __________ corporate culture.

ethical

3
New cards

The primary goal of an Acceptable Use Policy (AUP) is to ensure that users do not engage in activities that could harm the organization or its __________.

resources

4
New cards

The __________ outlines the processes to be followed after a security breach or cyberattack occurs.

Incident Response policy

5
New cards

Change management policies outline how changes to IT systems and software are __________, reviewed, approved, and implemented.

requested

6
New cards

____________ describe recommendations that steer actions in a particular job role or department.

Guidelines

7
New cards

Regular review of guidelines is important to ensure they remain __________ and relevant.

practical

8
New cards

Standards define the expected __________ of a task, such as a particular configuration state for a server.

outcome

9
New cards

____________ standards ensure that only authorized individuals can access the systems and data they need for their jobs.

Access control

10
New cards

Physical security standards protect data centers, computer rooms, and hardware, ensuring the safety of the __________ environment.

IT

11
New cards

____________ protects data from unauthorized access and is vital for securing data both at rest and in transit.

Encryption

12
New cards

____________ roles in data governance include owner, controller, processor, and custodian.

Security governance

13
New cards

The __________ provides California residents the right to know what personal information businesses collect about them.

California Consumer Privacy Act (CCPA)

14
New cards

Governance boards oversee the implementation of security controls and work closely with risk management teams to ensure compliance with relevant __________ and regulations.

laws

15
New cards

The __________ mandates the implementation of risk assessments, internal controls, and audit procedures.

Sarbanes-Oxley Act (SOX)