Accg

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Information Assurance (IA)

Protecting and managing information to ensure its confidentiality, integrity, and availability (CIA).

2
New cards

Australian Red Cross Data Leak (2016)

A significant data breach compromising personal information of over 550,000 blood donors.

3
New cards

IA Strategy Principle

Holistic Approach, Inclusive Mechanisms, Security Across Domains.

4
New cards

Embracing Independence in IA

Flexibility and Vendor Neutrality, Merit-Based Solution Evaluation, Advocating for Open Standards.

5
New cards

Legal and Regulatory Requirements

Understanding Laws and Standards, Compliance as Strategy Cornerstone, Consequences of Non-Compliance.

6
New cards

Living Document

Regular Updates, Feedback Loops, Stakeholder Engagement.

7
New cards

Risk-Based Approach

Risk Identification, Analysis, and Evaluation, Strategic Prioritization of Resources, Engaging in Risk Management.

8
New cards

Organizational Significance

Strategic Planning and Operations, Alignment with Business Objectives, Competitive Advantage.

9
New cards

Strategic, Tactical, and Operational

Strategic Level, Tactical Level, Operational Level.

10
New cards

Concise, Well-Structured, and Extensible

Conciseness, Well-Structured, Extensibility.

11
New cards

Protecting Sensitive Assets

Prioritizing Risks, Effective IA Strategy.

12
New cards

MSR Model of Information Assurance

Holistic framework integrating technology, policies, and people for resilience against cyber threats.

13
New cards

CIA Triad

Confidentiality, Integrity, Availability of information.

14
New cards

Information Security vs

Information Security focuses on CIA triad, Cybersecurity defends against cyber threats.

15
New cards

Information Assurance Principles

Business Enabler, Protect Interconnecting Elements, Cost-Effective, Establish Responsibilities, Robust Method, Periodic Assessment, Social Obligations.

16
New cards

ISMS Cycle

Plan-Do-Check-Act.

17
New cards

Security and Privacy in Technology

Collaboration, Key Security Products and Standards.

18
New cards

ISO/IEC 27001:2013

Internationally Recognized Standard, Auditable/Certifiable Framework, Aligned with Annex SL.

19
New cards

ISO/IEC 27000 Family

27000 (Fundamentals), 27001 (Requirements), 27002 (Code of Practice), 27003 (Implementation Guidance), 27004 (Security Metrics), 27005 (Risk Management), 27006 (Audit Requirements).

20
New cards

Compliance and Legal Frameworks

HIPAA, PCI DSS, NIST 800-53, FedRAMP, FAR/DFAR.

21
New cards

Benefits of Incorporating Security in System Development

Early identification and mitigation of vulnerabilities, awareness of engineering challenges, shared security services, informed executive decision-making, documented security decisions, improved confidence, better system integration.

22
New cards

Traditional SDLC Phases

Requirements gathering, design, implementation, verification/testing, deployment/maintenance.

23
New cards

Importance of Security from the Beginning in SDLC

Minimizes 'test-patch-retest' cycle, integrates best practices, ensures proper security design, aligns with budget and scheduling goals.

24
New cards

Physical Security Controls for IT Assets

Locking server rooms, setting up surveillance, securing vulnerable devices, using rackmount servers, securing printers, maintaining HVAC systems.

25
New cards

Impact of Human Error on Cybersecurity

Human error causes 95% of cybersecurity breaches.

26
New cards

Implementation Phase Steps in SDLC

Code reviews, secure coding standards, defect management.

27
New cards

CISO's Role in SDLC Security Integration

Oversees security measures, educates personnel, assigns security responsibilities, ensures comprehensive risk management.

28
New cards

Deployment Plan Components in SDLC

Deployment environment details, configuration steps, change management, rollback plans, disaster recovery.

29
New cards

Importance of Physical Security in IT Asset Management

Prevents unauthorized access, damage, theft, ensures system integrity and availability.

30
New cards

Secure Disposal Plan for IT Assets

Offsite/onsite technology use policies, clear desk policy, professional document shredding, sensitive information destruction.

31
New cards

Proper Framework for BCMS

Involves management commitment, risk evaluation, business impact analysis, recovery strategy determination, data collection, test criteria development, training, and continuous improvement.

32
New cards

Common Mistakes in BCMS

Lack of Business Impact Analysis, Technology Focus, Failure to Involve Business, Overly Complex Documentation, Lack of Training, and Reliance on Templates.

33
New cards

ISO 22301 Objectives

Aim to protect against disruptions, reduce incident likelihood, respond efficiently, recover quickly, and continuously improve plans.

34
New cards

Disaster Recovery (DR)

Focuses on restoring critical IT systems and data within the first 30 days using solutions like hot site recovery.

35
New cards

Business Continuity (BC)

Ensures the continuation of essential business functions beyond 30 days, involving new equipment and buildings.

36
New cards

PDCA

Plan-Do-Check-Act

37
New cards

Business Impact Analysis (BIA)

To identify critical business functions and their dependencies

38
New cards

Common mistakes in business continuity and disaster recovery planning

No Business Impact Analysis, technology focus, failure to involve the business, overly complex documentation, lack of training, and reliance on templates

39
New cards

Crisis Management Team

To manage the overall response and communication strategy during and after a disruption

40
New cards

Common pitfalls in business continuity planning

Lack of understanding, viewing compliance as a mere exercise, inadequate planning, false sense of security, and procrastination

41
New cards

Recovery Time Objective (RTO)

The targeted timeframe for system recovery after a disruption

42
New cards

Recovery Point Objective (RPO)

The acceptable amount of data loss measured in time

43
New cards

Regular training in business continuity planning

To ensure all employees understand their roles and responsibilities in maintaining business continuity

44
New cards

Management commitment in BCMS

Ensures top-down support, improves follow-through, and assists with communicating the importance of business continuity and disaster recovery planning