Sec+ Set E Security Program

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:51 PM on 3/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

45 Terms

1
New cards

Security Governance

Framework of policies, standards, procedures, and guidelines ensuring security aligns with business objectives. Defines roles and responsibilities, accountability structures, and decision-making processes.

2
New cards

Security Policy

High-level document stating management’s intent and direction for security. Mandatory compliance. Examples - Acceptable Use Policy (AUP), Information Security Policy, Password Policy.

3
New cards

Security Standard

Specific mandatory requirements derived from policy. More detailed than policy. Example - passwords must be minimum 12 characters with complexity requirements.

4
New cards

Security Procedure

Step-by-step instructions for implementing a policy or standard. Operational guidance. Example - procedure for onboarding a new employee including account creation steps.

5
New cards

Security Guideline

Recommended (not mandatory) best practices. Provides flexibility. Example - guidelines for working remotely securely.

6
New cards

AUP (Acceptable Use Policy)

Defines how users may use organisational technology resources. Covers internet use, email, software installation, and data handling. Users must acknowledge and sign before access is granted.

7
New cards

Risk Management

The process of identifying, assessing, and responding to risks to minimise their impact on the organisation. Components - risk identification, risk assessment, risk response, risk monitoring.

8
New cards

Risk Identification

Finding and documenting potential risks to the organisation. Sources - threat intelligence, vulnerability scans, business process analysis, historical incidents.

9
New cards

Risk Assessment

Evaluating identified risks by likelihood and impact. Qualitative (high/medium/low) or quantitative (monetary value). Produces risk register.

10
New cards

Risk Register

A document listing identified risks, their likelihood, impact, risk score, owner, and treatment plan. Living document updated as risks change.

11
New cards

Risk Tolerance

The level of risk an organisation is willing to accept. Varies by organisation and data type. Informs risk treatment decisions.

12
New cards

Risk Appetite

The amount and type of risk an organisation is willing to pursue or retain. Broader than tolerance - a strategic stance on risk-taking.

13
New cards

Risk Treatment Strategies

Accept (acknowledge and live with the risk), Transfer (insurance, contract), Avoid (stop the risky activity), Mitigate (implement controls to reduce likelihood or impact).

14
New cards

Risk - Accept

Consciously deciding to accept a risk without additional controls because the cost of mitigation exceeds the potential impact. Must be documented and approved.

15
New cards

Risk - Transfer

Shifting financial impact of a risk to a third party. Cyber insurance transfers financial risk of a breach. Contracts can transfer liability to vendors.

16
New cards

Risk - Avoid

Eliminating the risk by not performing the risky activity. Example - not storing credit card data eliminates PCI DSS compliance risk.

17
New cards

Risk - Mitigate

Implementing controls to reduce the likelihood or impact of a risk to an acceptable level. Most common response. Examples - patches, encryption, access controls.

18
New cards

BIA (Business Impact Analysis)

Identifies critical business functions and the impact of their disruption. Determines recovery priorities, RTO, and RPO for each function. Foundation of BCP and DRP.

19
New cards

Quantitative Risk Analysis

Assigns monetary values to risks. ALE (Annual Loss Expectancy) = ARO × SLE. ARO = Annual Rate of Occurrence. SLE = Single Loss Expectancy (asset value × exposure factor). Objective but requires accurate data.

20
New cards

Qualitative Risk Analysis

Uses descriptive scales (high/medium/low) rather than monetary values. Faster and easier than quantitative. More subjective. Used when data for quantitative analysis is unavailable.

21
New cards

ALE (Annual Loss Expectancy)

Expected monetary loss per year for an asset from a specific risk. ALE = ARO (Annual Rate of Occurrence) × SLE (Single Loss Expectancy). Used in cost-benefit analysis for security controls.

22
New cards

Third-Party Risk Management

Assessing and managing security risks introduced by vendors, suppliers, and partners. Steps - vendor assessment, due diligence, contract requirements, ongoing monitoring.

23
New cards

Vendor Assessment

Evaluating a vendor’s security posture before engagement. Methods - security questionnaires, on-site audits, third-party certifications (SOC 2, ISO 27001), penetration test results.

24
New cards

SOC 2 Report

Auditor assessment of a service organisation’s controls for security, availability, processing integrity, confidentiality, and privacy. Type I - design of controls at a point in time. Type II - operating effectiveness over a period.

25
New cards

Rules of Engagement (RoE)

Formal agreement defining the scope, timing, and methods for a security assessment or penetration test. Protects both the tester and the organisation legally.

26
New cards

MOU (Memorandum of Understanding)

Non-binding agreement between parties outlining mutual expectations and responsibilities. Precursor to a formal contract. Defines intent to cooperate.

27
New cards

SLA (Service Level Agreement)

Contractual commitment to minimum service levels including uptime, response times, and support. Includes penalties for non-compliance.

28
New cards

NDA (Non-Disclosure Agreement)

Legal contract preventing parties from disclosing confidential information. Required before sharing sensitive information with vendors or consultants.

29
New cards

MSA (Master Service Agreement)

Overarching contract governing the relationship between parties for multiple projects. Reduces need to renegotiate terms for each engagement.

30
New cards

Compliance

Adhering to laws, regulations, standards, and contractual obligations. Non-compliance results in fines, legal liability, reputational damage, and loss of business.

31
New cards

GDPR (General Data Protection Regulation)

EU regulation governing personal data collection, processing, and storage. Key requirements - lawful basis for processing, breach notification within 72 hours, right to erasure, data minimisation, privacy by design.

32
New cards

HIPAA (Health Insurance Portability and Accountability Act)

US regulation protecting health information (PHI). Requires administrative, physical, and technical safeguards. Breach notification required.

33
New cards

PCI DSS (Payment Card Industry Data Security Standard)

Security standard for organisations handling payment card data. 12 requirements including network segmentation, encryption, access control, monitoring, and regular testing.

34
New cards

CCPA (California Consumer Privacy Act)

California law giving consumers rights over their personal data - right to know, delete, opt-out of sale. Influenced by GDPR. Applies to businesses serving California residents.

35
New cards

Data Privacy vs Data Security

Privacy - the right to control how personal information is collected and used. Security - protecting data from unauthorised access. Privacy requires security but security does not guarantee privacy.

36
New cards

Security Awareness Training

Educating users about security threats and best practices. Topics - phishing recognition, password security, social engineering, physical security, incident reporting. Reduces human error risk.

37
New cards

Phishing Simulations

Sending simulated phishing emails to employees to test and improve awareness. Employees who click are given immediate training. Measures and tracks improvement over time.

38
New cards

Penetration Testing - Black Box

Tester has no prior knowledge of the target. Simulates an external attacker. Most realistic but most time-consuming. Also called blind testing.

39
New cards

Penetration Testing - White Box

Tester has full knowledge of the target including source code, architecture, and credentials. Most thorough. Also called crystal box or glass box testing.

40
New cards

Penetration Testing - Grey Box

Tester has partial knowledge. Simulates an insider or attacker who has done reconnaissance. Balance between realism and efficiency.

41
New cards

Audit - Internal

Conducted by the organisation’s own staff or internal audit team. Less independent but lower cost and better knowledge of environment. Identifies issues before external auditors.

42
New cards

Audit - External

Conducted by an independent third party. More credible. Required for regulatory compliance (SOC 2, PCI DSS, ISO 27001). More expensive but provides unbiased assessment.

43
New cards

NIST Cybersecurity Framework (CSF)

Voluntary framework providing standards and guidelines for managing cybersecurity risk. Five functions - Identify, Protect, Detect, Respond, Recover. Widely adopted in US.

44
New cards

ISO 27001

International standard for information security management systems (ISMS). Certifiable standard. Provides systematic approach to managing sensitive information. Demonstrates security commitment to customers and partners.

45
New cards

CIS Controls

Prioritised set of cybersecurity best practices developed by the Center for Internet Security. 18 controls ranging from basic (asset inventory) to advanced (penetration testing). Practical implementation guidance.

Explore top flashcards

flashcards
La maison
52
Updated 1177d ago
0.0(0)
flashcards
AP Biology - Unit 5
51
Updated 1159d ago
0.0(0)
flashcards
Unidad 4A Vocabulario - A Comer
32
Updated 758d ago
0.0(0)
flashcards
[ 2MID ] MIL - What is Media?
40
Updated 215d ago
0.0(0)
flashcards
African Civilization Test
65
Updated 1234d ago
0.0(0)
flashcards
Geometry 1.1-1.6
29
Updated 959d ago
0.0(0)
flashcards
¡Qué chévere! Unidad 6A
54
Updated 1044d ago
0.0(0)
flashcards
Comprehensive: Cardio
182
Updated 474d ago
0.0(0)
flashcards
La maison
52
Updated 1177d ago
0.0(0)
flashcards
AP Biology - Unit 5
51
Updated 1159d ago
0.0(0)
flashcards
Unidad 4A Vocabulario - A Comer
32
Updated 758d ago
0.0(0)
flashcards
[ 2MID ] MIL - What is Media?
40
Updated 215d ago
0.0(0)
flashcards
African Civilization Test
65
Updated 1234d ago
0.0(0)
flashcards
Geometry 1.1-1.6
29
Updated 959d ago
0.0(0)
flashcards
¡Qué chévere! Unidad 6A
54
Updated 1044d ago
0.0(0)
flashcards
Comprehensive: Cardio
182
Updated 474d ago
0.0(0)