Chapter 15,16,17

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/111

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

112 Terms

1
New cards

Legal hold or litigation hold

a notice that informs an organization that they must preserve data and records that might be destroyed or modified in the course of their normal operations

  •  backups paper documents and electronic files are all sorts must be preserved

2
New cards

 E-discovery 

is the process that allows each side of a legal case to obtain evidence from each other and other parties involved in the case and he Discovery is simply an electronic Discovery process

3
New cards

Electronic Discovery reference model (e d r m)

is a foundational framework for managing digital information throughout its lifecycle, crucial in cybersecurity for handling data from creation to potential litigation, outlining stages like Information Governance, Identification, Preservation, Collection, Processing, Review, Analysis, Production, and Presentation

4
New cards


 The edrm Uses nine stages to describe the discovery process

  1.  information governance

  2.  identification of electronically stored information

  3.  preservation of the information to ensure that it hasn't changed

  4.  collection of the information

  5.  processing of the data to remove unneeded or relevant information

  6.  review of the data to ensure it only contains what it's supposed to

  7.  analysis of the information to identify key elements

  8.  production of the data to provide the information to third parties

  9.  presentation of the data

5
New cards

Cloud vendors

provide services to many customers and will not permit you to place an intrusive legal hold and Discovery agent in their cloud service

6
New cards

 order of volatility

documents what data is most likely to be lost due to Systems Operations or normal procedures

7
New cards

Chain of custody  

forms are simple sign off and documentation forms

8
New cards

Admissibility

for an original forensics requires that the data the intact and unaltered to have probably remained unaltered before and during the forensic process 

9
New cards

checksum

is a small, fixed-size value (a "digital fingerprint") calculated from data, used to verify data integrity by detecting accidental changes or malicious tampering during storage or transmission

10
New cards

Write blockers

allow a driver image to be read and access without any allowing any writes to it

11
New cards

Forensic suits

are complete forensic Solutions sign to support forensic data accusation analysis and Reporting

12
New cards

Forensic acquisition

is the process of identifying, collecting, and preserving digital evidence from electronic devices

13
New cards

Prevention 

in forensics focuses on stopping security incidents before they happen and minimizing the risk of evidence loss. It’s part of the broader security lifecycle that includes prevention, detection, response, and recovery

14
New cards

Reporting in forensics 

For a solid forensic case report:

  • Start with a title page.

  • Create a detailed table of contents.

  • Write a concise case summary.

  • List and explain all evidence.

  • State clear objectives.

  • Outline investigation steps.

  • Mention analysis tools.

  • Present key findings.

15
New cards

Governance programs

are sets of procedures and controls put in place to allow an organization to effectively direct its work

16
New cards

 corporate governance programs

ensure that the organization sets in appropriate statistic Direction develops a plan to implement that strategy and the executes its strategic plan 

17
New cards

Board of directors

where a group of people elect a group of individuals to direct the action of the corporation on their behalf and have ultimate authority over the organization as the owners Representatives

18
New cards

Independent directors

meaning they have no significant relationship with the company other than their board membership

19
New cards

 CEO

manages the company

20
New cards

Governance, risk and compliance GRC

program carry out the work of governance through the creation and implementation

21
New cards

 GRC integrate three related task

  •  governance of organization

  •  risk management

  •  Compliance

22
New cards

there are two two major categories in governance structure

  •  centralized governance models

  •  decentralized governance models

23
New cards

 centralized governance models

use a top-down approach where a central Authority creates policies and standards which are then enforced through the organization

24
New cards

decentralized governance models

use a bottom of approach for individual business units are delegated the authority to achieve cyber security objectives and may do so in the manner they see fit 

25
New cards

Information security policy framework

which contains a series of documents designed to describe the organization's cybersecurity program

  •  information security policy that provides high level Authority and guidance for the security program

26
New cards

 policies

are high level statements of management intent compliance with policies mandatory 

27
New cards

Organizations

commonly include the following documents and their information security policy Library

  •  information security policy

  •  incident response policy

  •  acceptable use policy AUP

  •  business continuity and Disaster Recovery policies

  •  software development life cycle sdlc policy

  •  change management and change control policies

28
New cards

 incident response plan

that describes how the rotational respond to security incidence

29
New cards

 accessible use policy

that provides Network and system users with clear Direction on permissible uses of information resources

30
New cards

Business continuity and disaster recovery policy

that outlines the procedures and strategies to ensure that essential business functions continue to operate during and after disaster 

31
New cards

 software development life cycle (sdlc)

policy that establishes the processes and standards for developing invitation software

32
New cards

 change management and change control policy

that describes how the organization will review approve the Implement proposed changes to Information Systems

33
New cards

Standards

provide mandatory requirements describing how an organizational carry out its information security policies

34
New cards

their are four types of standards

  •  password standards

  •  Access Control standards

  •  physical security standards

  •  encryption standards

35
New cards

 password standards

set forth requirements for password length complexity reuse and similar issues

36
New cards

 Access Control status

describe the account life cycle from provisioning through active use and decommissioning

37
New cards

 physical security standards

establish the guidelines for securing a physical premise and asset of the organizations

38
New cards

 encryption standards

the specified the requirement for encrypting data both in transit and at rest

39
New cards

procedures

are detailed step by step process that individuals and organizations must follow in specific circumstances they ensure a consistent process for achieving a security objective

40
New cards


Organizations

commonly conclude the following procedures in their policy Frameworks

  •  change management procedures

  •  onboarding and off boarding procedures

  •  Playbook

41
New cards

change management procedures

that describe how the organization will perform change management activities that will comply with the organization change management policy including the possible use of Version Control and other tools

42
New cards

Onboarding and off boarding procedures

that describe how they're organization will add new user accounts as employees join the organization and how those accounts will be removed for no longer needed

43
New cards

playbooks

that describe the actions that the organizations incident response team will take one specific types of incidence

44
New cards

guidelines

provide best practices and recommendations related to a given concept technology or task

45
New cards

 the document begins with the purpose section that online three goals of the guideline

  1.  help agencies determine if and to what extent their agency will Implement and rely on electric records and electric signatures

  2.  provide agencies with information they can use to establish policy or rule governing their use and acceptance of digital signatures

  3.  provide direction to agencies for sharing and of their policies with the office of the Chief Information officer 

46
New cards

Enterprise risk management ERM

program organizations take a formal approach to risk analysis that begins with identifying risk continues with determining the severity of each risk that result set adopting one or more risk management strategies to address each risk

47
New cards

 risk management

Is the process of systematically addressing the risks facing an organization

48
New cards

 threats

any possible event that might have an adverse impact on the confidentiality integrity and are availability of our information or information systems

49
New cards

 vulnerabilities

are weaknesses in our systems or controls that could be exploited by a threat

50
New cards

 risk occur

at the intersection of a vulnerability that a threat that might exploit the vulnerability

51
New cards

risk identification

process requires identifying the threats and vulnerability that exists in your operation environment

52
New cards

 external risks

are those risks that originate from a source outside the organization this is an extremely broad category risk including adversary malicious code and natural disaster

53
New cards

 internal risks

are those risks that originate from within the organization they include malicious insiders mistakes made by unauthorized users equipment failure and similar risk

54
New cards

 multi-party wrists

are those that impact more than one organization

55
New cards

 Legacy systems

pose a unique type of risk organization these outdated systems often do not receive security updates and cyber security officials must take extraordinary messages to protect them

56
New cards

 intellectual property IP

theft risk occur when a company poses possesses Trade Secrets or other proprietary information that if disclosed could compromise organization's business advantage

57
New cards


 software compliance/Licensing risks

occur when an organization license software from a vendor and intentionally or accidentally runs a file of usage limitations that expose the customer to financial and legal risk

58
New cards

Risk assessment

a systematic process to identify potential hazards, analyze their likelihood and potential impact, and then prioritize actions to mitigate or control them

59
New cards

 high risk assessments

are conducted in response to a specific event or situation which as a new project technology implementation or a significant change in the business environment

60
New cards

reoccurring assessments

are performed at regular intervals such as annual or quarterly this assessments are meant to track the evolution of wrist over time modern changes in the risk profile and ensure that risk management practices are adapting to news threat and vulnerabilities

61
New cards

 Continuous risk assessments

involve ongoing monitoring and Analysis of risk. these can include automated systems that consistently scam for new threats or changes in the risk environment

62
New cards

 risk analysis

is a formalized approach to risk prioritization the last organizations to conduct their reviews and a structured manner

63
New cards

 qualitative risk analysis

uses numeric data in the analysis resulting in the assessments that allow the various straightforward prioritization of risks

64
New cards

qualitative risk analysis

substitutes subjective judgments and categories for strict numerical analysis allowing the assessment of risks that are difficult to quantify

65
New cards

 annualized rate of occurrence (a r o)

the number of times the risk is expected each year

66
New cards

 asset value AV

is expressed in dollars or other currency that may be determined using the cost to acquire the asset

67
New cards

 EF exposure factor

is expressed as a percentage of asset expected to be damaged

68
New cards

 SEL single loss expectancy

is the amount of financial damage expected at each time a risk materializes

69
New cards

annual loss expectancy a l e

is the amount of damage expected from a risk each year 

70
New cards

 risk mitigation

is the process of applying security controls to reduce the probability and or magnitude of a risk it is the most common risk management strategy

71
New cards

 risk avoidance

is a risk management strategy where we change our business practices to completely eliminate the potential that a risk will materialize. 

72
New cards

Risk transference

Shift some of the impact of a risk from the organization's experiencing the risk to another entity the most common example of it is purchasing an insurance policy that covers a risk

73
New cards

risk acceptance

is the final risk management strategy and it boils down to deliberately choosing to take no other risk management strategies and a simply continue operations as normal in the face of the risk

74
New cards

 exemptions are similar to exceptions

but are generally more formal 

Inherent risk facing an organization is the original level of risk that exists before implementing any controls

75
New cards

 residual risk

is the risk that remains after organization implements controls designed to mitigate avoid and or transfer the inherent risk

76
New cards

 risk appetite

is the level of risk that is willing to accept as a cost of doing business

77
New cards

 Risk threshold

is a specific level at which a risk becomes unacceptable

78
New cards

 risk tolerance

is the ability to withstand risk and his new operation without any significant impact

79
New cards

risk key indicators k r i

are metrics used to measure and provide early warning signals for increasing levels of risk

80
New cards

 risk owner

is an individual and it's irresponsible for managing and monitoring risks

81
New cards

experience scenario risk appetite

organizations with an expense story risk appetite are willing to take on higher levels of risk and the pursuit of potential higher Rewards

82
New cards

neutral risk appetite

organizations with a new tourist appetite take a balance approach they're willing to take on moderate levels of risk to achieve steady growth and returns

83
New cards

conservative risk appetite

organizations with a conservative respect I tend to avoid high risk and focus on maintaining Civility and protecting existing assets

84
New cards

risk Matrix or heat Maps

a visual tool that plots the likelihood (probability) of a threat occurring against its potential impact (severity) on an organization

85
New cards

risk reporting

is an essential component of the risk management process that involves communicating the status and evolution of risk to stakeholders within the organization

86
New cards

Regular updates routine reports

that provides stakeholders with the status of risk the effectiveness of controls in any recent changes are developments

87
New cards

 dashboard reporting

utilizes visual aids like graphics and charts to summarize risk data usually in real time

88
New cards

 ad h o c

creating security measures "as needed" for temporary, direct device-to-device (peer-to-peer) wireless connections,

89
New cards

strand analysis

this reporting form involves in analyzing historical data to identify patterns or Trends in the risk faced by the organization

90
New cards

risk event reports

focus on documenting specific risk events such as security breaches or instance their impacts and and the response taken

91
New cards

Disaster Recovery planning DRP

is the discipline of developing plans to recover operations as quickly as possible and the face of a disaster

92
New cards

business impact analysis Bia

is the formal process designed to identify the mission essential functions within organization and facilitate the identification of the critical systems that support those functions

93
New cards

 meantime between failures MTBF

is a measure of the reliability of a system it is expected amount of time that will elapse between system failures

94
New cards

 mean time to repair MTTR

is the average amount of time to restore a system to its normal operating state after a failure

95
New cards

 recovery time objective RTO

is the amount of time that the organization can tolerate assistant being down before it is repaired

96
New cards

 recovery Point objective RPO

is the amount of data that the organization can tolerate losing during an outage

97
New cards

 single points of failure(SPOF)

is any component in a system—physical, software, or process—whose failure causes the entire system to stop working, usually because there's no backup or redundant part to take over

98
New cards

personal identical information p i i

includes any information that you uniquely identifies an individual person including customer employees or third parties

99
New cards

protected health information Phi

includes medical records maintained by healthcare providers

100
New cards

 financial information

includes any personal financial records maintained by the organizations

Explore top flashcards