Compliance with Standards, Regulations, and Laws

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts, laws, and regulations surrounding compliance with standards in information security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

What is the fourth wave of information security management characterized as?

Governance

2
New cards

What key outcome drives information security governance?

Prevention of financial fraud through data manipulation.

3
New cards

Which organization publishes the COBIT guidelines?

ISACA, the Information Systems Audit and Control Association.

4
New cards

What does COBIT stand for?

Control Objectives for Information and related Technology.

5
New cards

What high-level specification does ISO 27001 provide for organizations?

Information Security Management System (ISMS).

6
New cards

What is the purpose of ISO 27002?

To provide a detailed set of information security controls based on risk assessment outputs.

7
New cards

What does NIST stand for?

National Institute of Standards and Technology.

8
New cards

What act applies to the protection of patient information in the healthcare sector?

Health Insurance Portability and Accountability Act (HIPAA).

9
New cards

What does PCI DSS stand for?

Payment Card Industry Data Security Standard.

10
New cards

What is one requirement of the Gramm-Leach-Bliley Act (GLBA)?

Financial institutions must develop and maintain a comprehensive information security program.

11
New cards

What must organizations do under the Sarbanes-Oxley Act (SOX) regarding financial reporting?

Establish and maintain adequate internal controls.

12
New cards

Which law governs the interception of electronic communications?

The Electronic Communications Privacy Act (ECPA).

13
New cards

What does the Computer Fraud and Abuse Act (CFAA) primarily target?

Unauthorized access to computers and the resulting damage or loss.

14
New cards

What is one key attribute defined by the CFAA for establishing a computer crime?

Access without or in excess of authorization.

15
New cards

What type of crimes can be defined under hacking laws?

Intrusions into computer networks resulting in fraud, theft, or damage.

16
New cards

What does the term 'duty of care' refer to in information security?

The responsibility of organizations to safeguard information adequately.

17
New cards

What significant change did the HITECH Act bring to HIPAA enforcement?

Increased penalties for willful neglect and breach notification requirements.

18
New cards

What are essential components of the HIPAA Security Rule?

Confidentiality, integrity, availability, and protection against anticipated threats.

19
New cards

Which agency is responsible for overseeing compliance with the NERC CIP standards?

North American Electric Reliability Corporation (NERC).

20
New cards

What is the primary focus of the PCI DSS?

To protect cardholder data and ensure secure credit card transactions.

21
New cards

What are the four general requirements outlined by the HIPAA Security Rule?

Ensure confidentiality, integrity, availability, protect against threats, ensure compliance.

22
New cards

What are the key indicators of liability for organizations regarding regulations?

Failure to apply requisite safeguards and prepare for security breaches.

23
New cards

What does the ECPA protect regarding electronic communications?

Unauthorized interception and access of e-mails and keystrokes.

24
New cards
25
New cards
26
New cards
27
New cards
28
New cards
29
New cards
30
New cards
31
New cards
32
New cards
33
New cards
34
New cards
35
New cards
36
New cards
37
New cards
38
New cards
39
New cards
40
New cards
41
New cards
42
New cards
43
New cards