Domain 5.0 Governance/Compliance

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 87

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

88 Terms

1

Reputation Damage

Occurs when a company's brand is tainted due to a data breach, leading to a loss of public respect and potentially reduced sales.

New cards
2

Identify Theft

Involves stolen customer data being used for identity theft, which can result in the company being sued for damages.

New cards
3

Fines

Data breaches may lead to regulatory fines, such as under the EU GDPR, where fines can reach up to 20 million Euros or 4% of the company's annual global turnover.

New cards
4

IP Theft

Involves competitors stealing copyrighted material, trade secrets, and patents, resulting in a loss of revenue for the company.

New cards
5

Classifications

The first stage of risk management involves classifying assets, determining how data is handled, accessed, stored, and destroyed based on different data classifications.

New cards
6

Data Minimization

Refers to collecting only necessary data and holding it in accordance with regulations, as reflected in the data retention policy.

New cards
7

Data Masking

Involves leaving only partial data in a field to prevent the theft of original data, such as showing only the last four digits of a credit card number.

New cards
8

Tokenization

Replaces meaningful data with a randomly generated token stored in a remote location, enhancing security compared to encryption.

New cards
9

Anonymization

Involves rendering data anonymous to prevent identification of individuals, typically by removing identifiers like names.

New cards
10

Data Owners

Responsible for classifying data and determining who can access it within the organization.

New cards
11

Data Controller

Ensures legal collection and storage of all data, following compliance regulations and investigating data breaches.

New cards
12

Data Processor

Operates on behalf of the data controller, ensuring data collection, storage, and analysis comply with regulations.

New cards
13

Data Custodian / Steward

Responsible for labeling, storing, and managing data securely, including encryption and regular backups.

New cards
14

DPO (Data Privacy Officer)

Ensures handling, storage, and disposal of personally identifiable information comply with national laws and regulatory frameworks.

New cards
15

Information Lifecycle

Involves the stages of data creation, use, retention, and disposal, ensuring compliance with regulatory frameworks.

New cards
16

Impact Assessment

Evaluates risks associated with collecting large amounts of data and implements tools to reduce those risks effectively.

New cards
17

Terms of Agreement

Outlines the agreement between data collectors and individuals whose data is being collected, specifying the purpose of data collection.

New cards
18

Privacy Notice

Obtaining consent to collect personal data for specific purposes and not using it for other unintended purposes.

New cards
19

External Threats

Include various threat actors like competitors, criminal syndicates, and foreign governments, with different levels of sophistication and funding.

New cards
20

Internal Threats

Include malicious insiders and human errors as potential risks to data security within an organization.

New cards
21

Risk Transference

Insurance of any kind, whether for a car or CyberSecurity, is considered a Risk Transference.

New cards
22

Risk Register

A list of all potential risks a company could face, with specific risk owners responsible for assessing and managing them.

New cards
23

Risk Assessments

Qualitative identifies risks as High, Medium, or Low, while Quantitative assigns numeric values by multiplying Probability x Impact.

New cards
24

Risk Matrix / Heat Map

Visual representation of risks, with severity indicated by colors like red for severe, pink for high, and green for low risk.

New cards
25

Risk Control Self Assessment

Process where employees evaluate existing risk controls to ensure adequacy, reporting back to management.

New cards
26

Inherent Risk

Raw risk before any mitigation strategies are applied.

New cards
27

Residual Risk

Risk remaining after mitigation efforts, as risk cannot be completely eliminated.

New cards
28

Control Risk

Measurement of risk control effectiveness over time.

New cards
29

Risk Appetite

Amount of risk mitigation a company is willing to undertake to comply with regulations and protect itself.

New cards
30

Single-Loss Expectancy (SLE)

The loss of one item, calculated as SLE = ALE / ARO.

New cards
31

Annualized Loss Expectancy (ALE)

Total loss in one year, calculated as ALE = SLE x ARO.

New cards
32

Recovery Point Objective (RPO)

Duration a company can function without its data before operations are affected.

New cards
33

Recovery Time Objective (RTO)

Time needed to return a company to an operational state.

New cards
34

Mean Time to Repair (MTTR)

Average time taken to repair a system.

New cards
35

Mean Time Between Failures (MTBF)

Shows the reliability of a system.

New cards
36

Functional Recovery Plans (FRP)

Plans using structures, walkthroughs, and simulations for incident response.

New cards
37

Disaster Recovery Plans (DRP)

Plans for various disasters to recover quickly and minimize financial impact.

New cards
38

Site Risk Assessment

Evaluation of risks and hazards on a construction site.

New cards
39

Acceptable Use Policy (AUP)

Guidelines on using company computers and devices, specifying allowed and forbidden practices.

New cards
40

Separation of Duties

Internal control where multiple individuals are involved in completing a task to prevent fraud or errors.

New cards
41

Off-Boarding Policy

Ensures removal of business data from BYOD devices when an employee leaves to prevent data breaches.

New cards
42

Non-Disclosure Agreements (NDA)

Legally binding contracts preventing disclosure of trade secrets to competitors without authorization.

New cards
43

Background Checks

Process involving criminal records, employment history, and more to verify information provided by job applicants.

New cards
44

Least Privilege Policy

Restricts data access to employees based on job requirements, following the "Need to know" principle.

New cards
45

Clean-Desk Policy

Requires employees to clear desks daily to prevent unauthorized access to sensitive information.

New cards
46

Social Media Analysis

Establishes company policies to prevent attackers from accessing valuable information shared on social media.

New cards
47

User Training

Essential for reducing the risk of cyber exploitation by educating employees on security measures.

New cards
48

Capture the Flag

Exercise where Red and Blue teams engage in exploitation-based challenges to enhance cybersecurity skills.

New cards
49

Phishing Campaigns

Simulated phishing emails sent to employees to assess their responses and provide training on phishing attacks.

New cards
50

Computer Based Training (CBT)

Training method involving videos and questions to ensure understanding, a form of gamification.

New cards
51

Role Based Training

Ensures employees receive security awareness training tailored to their specific job roles.

New cards
52

3rd Party Risk Management

Involves assessing risks associated with interactions with external companies or service providers.

New cards
53

Supply Chain

Companies rely on suppliers for materials; disruptions in the supply chain can impact business operations.

New cards
54

Vendors

Emphasizes the importance of trustworthy software vendors to prevent malware installation or backdoors.

New cards
55

Service Level Agreement (SLA)

Contract between a service provider and a company detailing service expectations and metrics.

New cards
56

Memorandum of Understanding (MOU)

Formal agreement between parties indicating a serious commitment, though not legally binding.

New cards
57

Measurement Systems Analysis (MSA)

Tool for evaluating the quality of measurement systems to minimize variation.

New cards
58

Business Partnership Agreement (BPA)

Governs the relationship between companies in a business venture, outlining contributions and responsibilities.

New cards
59

End of Life (EOL)

Occurs when a vendor discontinues a product, limiting support and availability of replacement parts.

New cards
60

End of Service (EOS)

Vendor ceases support for a product, leaving users vulnerable without security updates or technical assistance.

New cards
61

Data

Crucial company asset requiring proper classification, handling, storage, and disposal in compliance with regulations.

New cards
62

Classification

Labeling data with relevant security classifications to determine how it should be handled.

New cards
63

Governance

Oversight and management of security controls throughout the data handling process to ensure compliance.

New cards
64

Retention

Balances data storage needs with liability concerns, requiring companies to retain data as necessary for compliance.

New cards
65

Personnel

Involves shared or user accounts subject to the principle of least privilege for security.

New cards
66

Third Party

Utilizes credentials like SAML tokens or SSH keys from external providers for secure access.

New cards
67

Devices

Require changing default settings to enhance security, especially generic accounts with default passwords.

New cards
68

Service Accounts

Used to run applications like antivirus, with different levels of privilege for system and local service accounts.

New cards
69

Administrator / Root Accounts

Need protection as they grant extensive system access, restricting their use to authorized IT personnel.

New cards
70

Credential Policies

Establish guidelines to safeguard credentials and prevent unauthorized system access.

New cards
71

Change Management

Process for amending existing procedures to enhance security controls and address vulnerabilities.

New cards
72

Change Control

Involves managing requests for changes to existing controls, ensuring they are beneficial and approved by the Change Advisory Board.

New cards
73

Asset Management

Process of tagging and recording company assets in a register to ensure accountability and tracking.

New cards
74

Comparing Security Control Types

Categorizes security controls into managerial, operational, and technical types to mitigate risks effectively.

New cards
75

Preventative Controls

Measures put in place to deter attacks, like disabling user accounts or operating system hardening.

New cards
76

Detective Controls

Tools used to investigate incidents, such as CCTV for recording events or log files for tracking trends.

New cards
77

Corrective Control Types

Actions taken to recover from incidents, like replacing lost data from backups or using fire suppression systems.

New cards
78

Deterrent Controls

Methods like CCTV and motion sensors used to discourage potential threats, such as triggering lights to deter intruders.

New cards
79

Compensating Control Types

Secondary controls used when primary controls fail, like using temporary login methods while waiting for smart cards.

New cards
80

GDPR

General Data Protection Regulation by the EU to safeguard individuals' data privacy, enforced by the Information Commissioner's Office.

New cards
81

ISO Standard 27001

Focuses on security techniques for information security management systems.

New cards
82

ISO Standard 27002

Aims to improve information management through a code of practice for information security controls.

New cards
83

ISO Standard 27701

Extension to 27001/27002 for privacy information management requirements and guidelines.

New cards
84

ISO Standard 31000

Manages risk for company organizations and general management.

New cards
85

CSA CCM

Helps assess the overall risk of a cloud provider for potential customers.

New cards
86

CSA Reference Architecture

Contains best security practices for Cloud Service Providers (CSPs) to promote secure and trusted cloud environments.

New cards
87

Role of Web Servers

Microsoft's Internet Information Server and Apache are the main web servers used by commercial companies, providing security guides for enhanced protection.

New cards
88

Network Infrastructure Devices

Cisco produces high-end network devices and offers Infrastructure Upgrade Guides for best practices in upgrading network devices.

New cards
robot