Cybersecurity Standards, Laws, and Policies Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/105

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

106 Terms

1
New cards

Security Framework

Set of policies, guidelines, and best practices designed to manage an organization's information security risks

2
New cards

Confidentiality

-Unauthorized disclosure;

-Access controls are the primary mechanism to restrict users from accessing sensitive information without permission;

-Human Error

3
New cards

Integrity

-Unauthorized alteration/modification;

-Protecting liability and the correctness of data;

-Clark Wilson Model;

-Digital Signatures

4
New cards

Clark Wilson Model

Separation of duties/separation of processes, no one person can compromise the integrity of a business process

5
New cards

Digital Signatures

Verify the signer, verify the data being signed, verify the date and time

6
New cards

Availability

-Denial attacks;

-Authorized subjects are granted timely and uninterrupted access to objects;

-Redundant Components, High Availability, Fault Tolerance

7
New cards

Redundant Components

Protects system against single point of failure

8
New cards

High Availability

Protects services against failure of single server

9
New cards

Fault Tolerance

Protects services against a disruption of a small failure

10
New cards

Criminal Law

Forms the bedrock of the body of laws that keep society safe

11
New cards

Civil Law

-Forms the bulk of the US body of laws;

-Trademarks, protecting intellectual property (IP)

12
New cards

Administrative Law

-Executive Branch is responsible;

-Federal regulations have regulatory laws

13
New cards

Search Warrant (4th Amendment)

Detailed description of the legal bounds of the search and seizure

14
New cards

Administrative Investigations

That are not operational in nature may require stronger information collection standard

15
New cards

Criminal Investigations

Standard of Evidence-Proof Beyond a Reasonable Doubt

16
New cards

Computer Crime

First computer security issues addressed by legislators

17
New cards

Privacy Act of 1974

-Set the standards for all information privacy and security laws that followed;

-Limits the ability of federal agencies to disclose private information of individuals to other people/agencies without prior written consent of those individuals;

-Mandates that agencies maintain only the records necessary for conducting their business and that those records are destroyed when they are no longer needed for a legitimate function of government

18
New cards

Electronic Communications Privacy Act (ECPA) of 1986

Makes it a crime to invade the electronic privacy of an individual

19
New cards

Computer Fraud & Abuse Act (CFAA) of 1984

-First major piece of cybercrime-specific legislation in the US;

-Written to cover computer crimes that crossed state boundaries to avoid infringing on states' rights;

-Access classified or financial information in a "federal interest system" without authorization

20
New cards

Computer Abuse Amendments Act of 1994

-Outlawed creation of malicious code that can cause damage to a system;

-Covers any computer use in interstate commerce rather than just "federal interest"

21
New cards

Federal Information Security Management Act (FISMA) of 2002

-Required agencies and their contractors to include activities around infosec management;

-National Institute of Standards and Technology (NIST) responsible for developing implementation guidelines

22
New cards

Children's Online Privacy Protection Act (COPPA) of 1998

-Makes a series of demands on websites that cater to children or knowingly collect information from children;

-Parents must be given verifiable consent to the collection of information about children younger than the age of 13 prior to collection

23
New cards

Graham-Leech-Bliley Act (GLBA) of 1999

-Relaxed the regulations concerning the services each organization could provide;

-Required financial institutions (banks) to provide written Privacy Policies to all customers

24
New cards

USA Patriot Act of 2001

-Greatly broadened powers of law enforcement organizations and intelligence agencies - including monitoring digital communication;

-Allows law enforcement agencies to obtain a blanket authorization for a person to be monitored for all communications

-Internet Service Providers (ISPs) may voluntarily provide the government with a big range of information

25
New cards

Family Educational Rights and Privacy Act (FERPA)

-Specialized privacy bill that affects any educational institution that accepts any form of funding from the federal government;

-Grants certain privacy rights to students older than 18 and parents of minor students;

-Parents/students have the right to inspect any educational records maintained by the institution on the student

26
New cards

Health Insurance Portability and Accountability Act (HIPAA) of 1996

Covers privacy and security regulations requiring strict security measures for hospitals, physicians, insurance companies, and other organizations

27
New cards

Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009

-Amended HIPAA - updating many of its privacy and security requirements;

-Changed how the law treats associate organizations that handle Personal Health Information (PHI) on behalf of a HIPAA-covered entity;

-Introduced Data Breach Notification Requirements

28
New cards

General Data Protection Regulation (GDPR)

-European Union passed new, comprehensive law covering protection of EU citizen Personal Information (PI) in 2016; -Replaced the Data Protection Directive (DPD);

-Applies to organizations based both in and outside of the EU that collect information on EU residents;

-Right to be Forgotten

29
New cards

EU/US Privacy Shield

Safe harbor agreement between the EU and US for data privacy.

30
New cards

Transatlantic Data Privacy Framework (DPF)

-Created to provide US organizations with reliable methods for PI data transfers to the US - from the EU, UK, and Switzerland while ensuring data protection that is consistent with EU, UK, and Swiss law;

-Requires US organizations to self-certify their compliance.

31
New cards

California Consumer Protection Act (CCPA)

-Sweeping privacy law passed in 2018, went into effect in 2020 - modeled after GDPR;

-Right to know what's being collected;

-Right to be forgotten;

-Right to opt out of the sale of their personal information;

-Right to exercise their privacy rights without fear of discrimination or retaliation for their use.

32
New cards

Federal Information Systems Modernization Act (FISMA)

-Centralizing federal cybersecurity responsibility within the Department of Homeland Security (DHS);

-Exception 1: Department of Defense (DoD) cyber issues remain Secretary of Defense's responsibility;

-Exception 2: Office of the Director of National Intelligence (ODNI) is responsible for intelligence-related issues.

33
New cards

Cybersecurity Enhancement Act

National Institute of Standards and Technology (NIST) charged with responsibility for coordinating nationwide work on voluntary cybersecurity standards.

34
New cards

International Organization for Standardization (ISO)

Flexible information security collection of standards that can be applied to all types and sizes of organizations.

35
New cards

National Cybersecurity Protection Act

New law that charged the Department of Homeland Security (DHS) with establishing a national cyber security and communications integration center.

36
New cards

Defense in Depth

Protections and more protections and more protections, and the closer to the goods, there are stronger protections.

37
New cards

Zero Trust

Security concept where nothing inside the organization is automatically trusted.

38
New cards

Intellectual Property (IP)

-Anything that you can't hold in your hand;

-Examples: brand names, secret recipes

39
New cards

Copyright

-Guarantees the creators of "original works of authorship" protection against the unauthorized duplication of their work;

-Protected until 70 years after the death of the last surviving author

40
New cards

Copyright-Software

Protection for software includes the source code

-Does not protect the ideas or process behind the software

41
New cards

Patents

Invention must be new, useful, and not obvious

42
New cards

Trade Secrets

-IP that is critical to an organization's business, disclosure to competitors and/or public would result in significant damage;

-Examples: Coca-Cola & KFC secret recipes;

-Any authorized personnel with a need-to-know who does have this type of access is bound by a Non-Disclosure Agreement (NDA)

43
New cards

Risk

Possibility or likelihood that a threat will exploit a vulnerability to cause harm to an asset and the severity of damage that could result

44
New cards

Asset

Anything that you use

45
New cards

Asset Valuation

Value assigned to that asset

46
New cards

Threats

Any potential occurrence that may cause an undesirable outcome

47
New cards

Threat Agent/Actor

Hackers, people, programs (hardware, software)

48
New cards

Threat Events

Accidental occurrences and intentional exploitations of vulnerabilities - natural or person-made

49
New cards

Threat Vector

Path or means by which an attack or attacker can gain access to a target in order to cause harm

50
New cards

Vulnerability

Weakness in an asset

51
New cards

Exposure

When you have something that is susceptible to loss

52
New cards

Safeguards

Protection mechanism-anything that removes or reduces a vulnerability

53
New cards

Attack

Exploit a vulnerability

54
New cards

Breach

Successfully exploits a vulnerability

55
New cards

Risk Management

-Identifying factors that could damage or disclose assets;

-Evaluating those factors in light of asset value and countermeasure cost;

-Implementing cost-effective solutions for mitigating or reducing risk

56
New cards

Qualitative Risk Analysis

Assigns subjective and intangible values to the loss of an asset

57
New cards

Quantitative Risk Analysis

Assigns real dollar figures to the loss of an asset

58
New cards

Risk Mitigation

Implementation of safeguards, security controls, countermeasures to eliminate vulnerabilities or block threats

59
New cards

Risk Assignment

Assigning or transferring risk

60
New cards

Risk Deterrence

Process of implementing deterrents to would be violators of security and policy

61
New cards

Risk Avoidance

Process of selecting alternate options or activities that have less associated risk than the default, common, expedient, or cheap option

62
New cards

Risk Acceptance

The result after a cost/benefit analysis shows countermeasure costs outweigh the possible cost of loss due to risk

63
New cards

Risk Rejection

Denying that a risk exists

64
New cards

Risk Appetite

The total amount of risk an organization is willing to carry across all assets

65
New cards

Risk Capacity

The level of risk an organization is able to carry

66
New cards

Risk Tolerance

The amount of risk an organization will accept per individual asset-threat pair

67
New cards

Risk Limit

Maximum level of risk above the risk target that will be tolerated before further risk management actions are taken

68
New cards

NIST Risk Management Framework

Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor

69
New cards

Technical/Logical Controls

Hardware or software mechanisms used to manage access, your virtual stuff

70
New cards

Physical Controls

If I can touch it, locks on a door

71
New cards

Administrative Controls

Policies, Standards, Procedures, Baselines, Guidelines

72
New cards

Policies

High-level of what the organization is trying to accomplish

73
New cards

Standards

Providing consistency in control

74
New cards

Procedures

Highly detailed task-oriented instructions to ensure the integrity through consistency

75
New cards

Baselines

Tailored version of a Standard

76
New cards

Guidelines

Best practices with flexibility

77
New cards

Security Control

Refers to a broad range of controls that perform such tasks as ensuring only authorized users can log on and preventing unauthorized users from gaining access to resources

78
New cards

Preventive Controls

-Stop unwanted or unauthorized activity from occurring

-Example: fences

79
New cards

Deterrent Controls

-Deployed to discourage security policy violations

-Example: security guards

80
New cards

Detective Controls

-Deployed to discover or detect unwanted or unauthorized activity

-Example: motion detectors

81
New cards

Compensating Controls

Deployed to provide various options to other existing controls to aid in enforcement and support of security policies

82
New cards

Corrective Controls

-Modifies the environment to return systems to normal after an unwanted or unauthorized activity has occurred

-Example: terminating malicious activity

83
New cards

Recovery Controls

-Extension of corrective controls but have more advanced or complex abilities

-Example: backups and restores

84
New cards

Directive Controls

-Deployed to direct, confine, or control the actions of subjects to force or encourage compliance with security policies

-Example: security policy requirements

85
New cards

Security Control Assessment (SCA)

Formal evaluation of a security infrastructure's mechanisms against a baseline or reliability expectation

86
New cards

Sensitive Data

Any information that isn't public or unclassified

87
New cards

Personally Identifiable Information (PII)

Any information that can identify an individual

88
New cards

Protected Health Information (PHI)

Any health-related information that can be related to a specific person

89
New cards

Proprietary

Ownership of it (think property)

90
New cards

Proprietary Data

Any data that helps an organization maintain a competitive edge

91
New cards

Government Data Classification

Top Secret, Secret, Confidential, Unclassified

92
New cards

Data at Rest

Any data stored on media such as system hard drives, solid-state drives (SSDs), external USB drives, storage area networks (SANs), and backup tapes

93
New cards

Data in Transit

Any data transmitted over a network

94
New cards

Data in Use

Data in memory or temporary storage buffers while an application is using it

95
New cards

Privacy by Design (PbD)

A guideline to integrate privacy protections into products during the early design phase rather than attempting to tack it on at the end of development

96
New cards

Bell-LaPadula Model (BLP)

-Prevents the leaking or transfer of classified information to less secure clearance levels;

-Deals with confidentiality;

-No read-up, read down, no write down, write up

97
New cards

Biba Model

-Was designed after the Bell-LaPadula model;

-Deals with integrity;

-No read down, read up, no write up, write down

98
New cards

Business Continuity Planning (BCP)

Provide a quick, calm, and efficient response in the event of an emergency and to enhance a company's ability to recover from a disruptive event promptly

99
New cards

Disaster Recovery Plan (DRP)

Should be set up so it can almost run on autopilot, everyone knows what they need to do, who to communicate

100
New cards

Cold Sites

Standby facilities large enough to handle the processing load of an organization and equipped with appropriate electrical and environmental support systems