CS340 GRC terms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/144

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:56 AM on 4/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

145 Terms

1
New cards

What is GRC

An integrated collection of capabilities that organizations use to achieve objectives, address uncertainty, and act with integrity. It is integrated with the entire business.

2
New cards

Governance

The means by which and organization is directed and controlled (who we are and how we operate).

3
New cards

Risk

Taking measures to limit the chances of bad outcomes, the center of GRC in practice

4
New cards

People, processes, and technology

GRC involves this, and it takes input from this to ensure companies are protected from risk

5
New cards

Control risk

Develop treatment & response plans for each risk

6
New cards

Compliance

Act of ensuring a standard or set of guidelines is being followed, provides direction when starting GRC

7
New cards

Risk (as a concept)

Likelihood that a loss will occur; loss occurs when a threat exposes a vulnerability

8
New cards

Threat

Any activity that represents a possible danger, external or internal, natural or manmade, intentional or accidental

9
New cards

Vulnerability

A weakness in a system

10
New cards

Loss

Results in a compromise to business functions or assets, tangible or intangible

11
New cards

Tangible loss

Easy to quantify, physical, and has direct financial impact

12
New cards

Intangible loss

Harder to represent, non physical, example is a hit to reputation

13
New cards

Tangible Asset

Physical assets, are present in person

14
New cards

Intangible asset

Assets that are digital but still worth protecting

15
New cards

Principle of proportionality

Amount spent on controls should be proportional to the value of the risk

16
New cards

Residual Risk

Risk after risk management is applied

17
New cards

Inherent risk

Full risk of a vulnerability

18
New cards

Contingent risk

Low likelihood, high impact

19
New cards

Significant risk

High likelihood, high impact

20
New cards

Minor risk

Low likelihood, low impact

21
New cards

High incidence risk

high likelihood and low impact

22
New cards

Risk formula

Probability * impact

23
New cards

Unintentional threats

Environmental threats, human error threats, accidental threats, failures

24
New cards

Intentional threats

Greed, Anger, Desire to damage, individuals or organizations with malicious intent

25
New cards

Threat-vulnerability pair

Occurs when a threat exploits a vulnerability, the vulnerability provides a path for the threat

26
New cards

Exploit

The act of taking advantage of a vulnerability

27
New cards

Hubs of vulnerabilities and exploits

Blogs/forums, CVE list, Reverse engineering, dark web

28
New cards

NIST

creates publications and sets standards about topics and technologies

29
New cards

CISA

Gives guidance to companies to help with their security

30
New cards

HIPAA

Passed in 1996 as federal law, creates national standards to protect patient health info.

31
New cards

HIPAA covered entity

Health plans, healthcare clearing houses, healthcare providers

32
New cards

HIPAA business associate

Any person/org using or disclosing individually identifiable health info to perform or provide functions, activities, or services for a covered entity. Can include anyone that interacts with covered entities.

33
New cards

HHS Office of Civil Rights

Responsible for enforcement of HIPAA and imposes penalties on non-compliant companies

34
New cards

PCI-DSS

Set of standards that any company dealing with credit cards must abide by. Levels based on how many transactions are processed yearly

35
New cards

PCI-DSS Level 1

Applies to companies doing 6 million or more transactions yearly, required to have an internal audit resulting in a report on compliance, as well as submitting a PCI scan quarterly

36
New cards

PCI-DSS Levels 2-3

Must complete self assessment once a year and is also up for a quarterly PCI scan from an approved vendor

37
New cards

PCI-DSS Level 4

Self assessment and may have a quarterly scan, less than 20000 transactions yearly.

38
New cards

Six principles of PCI-DSS

  1. Build and maintain secure network

  2. Protect cardholder data

  3. Maintain vulnerability management program

  4. implement strong access control measures

  5. regular monitoring of networks should occur

  6. Maintain an infosec policy

39
New cards

SOX

Passed to protect public from fraudulent or erroneous practices by corporations and other business entities

40
New cards

SOX cyber application

Keep data safe from insider threats, cyber attacks, and security breaches

41
New cards

SOX data security framework

  • Ensure financial data security

  • Prevent malicious tampering of financial data

  • Track data breach attempts and remediation efforts

  • Keep logs available for auditors and demonstrate compliance in 90 day cycles

42
New cards

GDPR

Designed to harmonize data privacy laws across EU countries

43
New cards

Personal data

Any info allowing a living person to be directly or indirectly ID’d

44
New cards

Data controller

Maintains control over provided data; can update, modify, or delete data.

45
New cards

Data processors

Acts on behalf of the data controller, no control over data

46
New cards

GDPR principles

  • Lawfulness, fullness, transparency

  • Purposeful limitation

  • Data minimization

  • Accuracy

  • Storage limitation

  • Integrity and confidentiality

  • Accountability

47
New cards

NIST 800-37

Nist Risk Management Framework for information systems & organizations

48
New cards

NIST 800-30

NIST Guide for conducting Risk assessments

49
New cards

NIST 800-53

NIST Security & privacy controls for information systems & organizations

50
New cards

NIST RMF Prepare step

  • Ready to execute NIST RMF framework by establishing context and priorities for managing enterprise wide security and privacy risk

  • Goals include communication, prioritizing requirements and resource allocation, recognizing common controls and baselines, and focusing resources on high value assets

51
New cards

Risk context

All facets of how a risk impacts an organization and how to resolve it

52
New cards

NIST RMF categorize stage

Requires a full review of IT systems in use, system characteristics, and impact of an attack on confidentiality, integrity and availability

53
New cards

NIST RMF select stage

Select controls and allocate them to systems, document the controls in a system security plan, and continuously monitor them.

54
New cards

NIST RMF assess stage

Assess the selection based on candidate qualifications and knowledge, develop the assessment plan, assess the controls, report on effectiveness, remediate the findings, and develop a plan of action for more easily-remediable findings

55
New cards

NIST RMF authorize stage

Provides organizational accountability

56
New cards

NIST RMF monitoring stage

Provides situational awareness and privacy of the information system and organization

57
New cards

Risk owner

Usually the person who would be most affected if the risk manifested, has to decide what to do about the risk

58
New cards

RMP Scope

Identify the boundary of the plan and be crystal clear of what the objective is in order to avoid scope creep. Identify stakeholders and draft scope statement.

59
New cards

Cost benefit analysis formula

Loss before recommendation - loss after recommendation - cost of recommendation

60
New cards

Plan of action and milestones

A POAM is a document tracking progress and assigning responsibility allowing management to follow up on progress.

61
New cards

Steps of RMF

Prepare → Categorize → select → implement → assess → authorize → monitor

62
New cards

Members of risk assessment team

IT department, Auditors, Business Unit leaders, Legal, HR, Management

63
New cards

Administrative controls

Management oriented, tells you what you are/aren’t allowed to do, enforced but can’t physically stop you

64
New cards

Administrative controls examples

Employee management, information classification, Awareness training

65
New cards

Logical controls

Software or hardware components that prevent/allow access to the network

66
New cards

Physical controls

Prevent things from happening in the real world, things like bollards, fencing, cameras

67
New cards

Preventative controls

Keep undesirable events from happening

68
New cards

Detective controls

Identify undesirable events that are taking place

69
New cards

Corrective controls

Correct undesirable events that have already taken place

70
New cards

Single Loss Expectancy

How much the estimated impact of a single event occurring would be in $

71
New cards

Annual Rate of Occurrence

Numerical quantification of impact (number of times annually)

72
New cards

Annual Loss Expectancy

Cost quantification of impact over a year

73
New cards

Data collection methods

Surveys, Interviews, Vulnerability testing, pen testing

74
New cards

SLE formula

Asset value x exposure factor (10000 × 50% =5,000)

75
New cards

ALE Formula

SLE * ARO

76
New cards

Cost Benefit Analysis

The cost of a countermeasure against losses should not exceed the value of the losses

77
New cards

Value of countermeasure

ALE - cost of countermeasure

78
New cards

Security control

Countermeasure to avoid, detect, counteract, or minimize security risk

79
New cards

Measure

Proof of action to achieve a purpose

80
New cards

Security measure

Precaution against threats

81
New cards

Control

Process that addresses or lowers a risk

82
New cards

In place control

In place in operational system, supported by associated documentation

83
New cards

Planned controls

Identified in planning documentation , specific implementation date

84
New cards

Defense in depth

Don’t depend on a single security mechanism, have multiple mechanisms to fall back on

85
New cards

Assumption of breach

Design your system to be secure even as value rises and breaches are expected to occur

86
New cards

Fail-safe state

If a control fails, it should still deny the attacker access rather than allowing it

87
New cards

Simplicity

If you don’t understand how a control works, then you don’t know if its actually secure

88
New cards

Purpose of a risk assessment

Help management quantify risks and identify and evaluate the effectiveness of controls

89
New cards

Policy

A high-level document that provides overall direction without details

90
New cards

Procedure

Provides the detailed steps needed to implement a policy

91
New cards

Audit location

Normally done by an outside, independent party

92
New cards

Assessment location

Normally done by management team internally

93
New cards

FISMA

Requires federal agencies, contractors, and grantees to implement risk-based, cost-effective security controls to protect information systems

94
New cards

GLBA

Federal law requiring financial institutions to explain their information-sharing practices and protect sensitive customer data

95
New cards

FERPA

Protects privacy of student academic records, including education and health data

96
New cards

CIPA

Requires schools to filter internet access to prevent bad content on school devices

97
New cards

COPPA

Protects the information of children under 13 that use the internet

98
New cards

Identity governance

Securing identities for all users, applications, and data

99
New cards

Identity governance and administration

  • Managing user accounts from beginning to end

  • Grouping user access into roles that make sense for various jobs

  • Allowing users to make requests for things they need

  • Perform reviews of the access that had been granted

100
New cards

Privileged access management

Allow users to check out privileges rather than hold them 24/7, and holding non-user credentials in a “vault”