Information Security and Legal Issues Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts related to information security maintenance, legal issues, and ethical considerations.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Why is there a need to maintain the Info Sec program?

Because of changes arising from sale and purchase of assets, creation of new vulnerabilities, shifting business priorities, new alliances, end of long-standing relationships, personnel changes, technology, and processes.

2
New cards

What are the areas of Info Sec covered by NIST SP 800-100?

Information Security Governance, SDLC, Awareness and Training, Capital Planning & Investment Control, Interconnecting systems, Performance measures, Security Planning, IT Contingency Planning, Risk Management, Certification, Accreditation, and Security Assessments, Security Services and Products Acquisition, Incident response, and Configuration (or Change) Management

3
New cards

What are the activities monitored under Information Security Governance according to NIST SP 800-100?

Ongoing initiatives, updated policies and procedures, and whether the aim of controls is being met.

4
New cards

What areas are monitored within SDLC according to NIST SP 800-100?

Configuration management (CM) and control, and continuous monitoring and assessment.

5
New cards

List monitoring activities for Awareness and Training based on NIST SP 800-100.

Monitor compliance and effectiveness, automated tracking system, follow-up and corrective action, and updated training and awareness materials.

6
New cards

What is the Select-Control-Evaluate process related to?

Capital Planning & Investment Control (CPIC)

7
New cards

What NIST document provides guidance for interconnecting systems?

NIST SP 800-47

8
New cards

What is evaluated during IT Contingency Planning according to NIST SP 800-100?

Regular review of contingency plans to ensure these are up to date and evaluation and updating of business impact analysis (BIA).

9
New cards

What are the Monitoring Activities in Incident Response based on NIST SP 800-100?

Incident response life cycle (Preparation -> Detection & Analysis -> Containment, Eradication & Recovery -> Post-Incident Activity), Help desk, and Problem management

10
New cards

What are the steps in the Security Maintenance Model?

External monitoring, Internal monitoring, Planning and risk assessment, Vulnerability assessment and remediation, and Readiness and review

11
New cards

What are the elements of External Monitoring?

Monitoring, Escalation, Incident Response

12
New cards

What actions constitute Internal Monitoring?

Inventory, IT governance process, Real-time monitoring of IT activity (IDPS, Difference analysis), and Monitoring internal state of networks and systems

13
New cards

What activities occur during Planning and Risk Assessment?

Formal information security program review process, Follow-up activities, Coordination with IT project teams, and Integrating a mindset of risk assessment

14
New cards

What are key actions during Vulnerability Assessment and Remediation?

Documented vulnerability assessment procedures, Background information and tested recommendation procedures, Tracking vulnerabilities until remediation, Communicating vulnerabilities, Reporting, and Decision to accept risk of loss

15
New cards

What areas are assessed during vulnerability assessments?

Internet, Intranet, Platform security validation, Wireless, and Modem

16
New cards

What types of Penetration testing are there?

White box, Black box, and Grey box

17
New cards

What elements are part of Readiness and Review?

Policy review, Program review, and Rehearsals

18
New cards

What are the possible causes of Unethical Behavior?

Ignorance, Accident, and Intent

19
New cards

List Federal Security Laws to Combat IT Crimes

Sarbanes–Oxley Act of 2002, Computer Fraud and Abuse Act, 1984, Computer Security Act, 1987, Homeland Security Act of 2002 with the Cyber Security Enhancement Act, Payment Card Industry Data Security Standards of 2004, Federal Information Security Management Act of 2002, Electronic Signature Laws – Uniform Electronic Transactions Act of 1999 and Electronic Signatures in Global and National Commerce Act of 2000

20
New cards

List Federal Privacy Laws to Combat IT Crimes

Privacy Act of 1974, Electronic Communications Privacy Act, 1986, Communications Decency Act, 1996, Children's Online Privacy Protection Act, 1998, Health Insurance Portability & Accountability Act, 1996, The Health Information Technology for Economic and Clinical Health, 2009, Gram-Leach-Bliley Act, 1999, USA PATRIOT Act, 2001