Overview of IT Security Governance and Management

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/109

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

110 Terms

1
New cards

IT Security Governance

Who is authorized to make decisions on cybersecurity risks within an organization. Ensures security strategies are aligned with an organization's business objectives and compliant with regulations.

2
New cards

IT Security Management

Defines and implements controls to mitigate risks in an organization.

3
New cards

Data Governance

Determines who is authorized to make decisions about data within an organization.

4
New cards

Data Owner

Ensures compliance with policies and procedures. Assigns proper classification to information assets. Determines criteria for accessing information assets.

5
New cards

Data Controller

Determines the purposes for which, and the way in which, personal data is processed.

6
New cards

Data Processor

Processes personal data on behalf of the data controller.

7
New cards

Data Custodian

Implements the classification and security controls for the data with rules set by the data owner. Technical control of data.

8
New cards

Data Steward

Ensures data is supported for business needs and meets regulatory requirements.

9
New cards

Data Protection Officer

Oversees an organization's data protection strategy.

10
New cards

Master Cybersecurity Policy

Blueprint. Strategic plan for implementing cybersecurity controls.

11
New cards

System-specific Policy

Establish standardization of specific devices or systems such as approved applications, software, operating system, configurations, hardware, and hardening countermeasures. Example: Setting Up Your Firewall Policy.

12
New cards

Issue-specific Policy

Developed for certain operational issues, circumstances or conditions. Example: Email and Internet Acceptable Use Policy.

13
New cards

Identification and authentication policy

Who should be permitted to network resources. Verification procedures.

14
New cards

Password policy

Minimum password requirements such as number and type of characters. How often passwords needed to be changed.

15
New cards

Acceptable use policy

Access to and use of network resources. Consequences of policy violations.

16
New cards

Remote access policy

How to remotely connect to an organization's internal network. Explains which remotely accessible information exists.

17
New cards

Network maintenance policy

Updating and organization's specified operating systems and end-user applications.

18
New cards

Incident handling policy

How to report and respond to security-related incidents.

19
New cards

Data policy

Measurable rules for processing data. Specifies data storage, classification, handling, and disposal.

20
New cards

Credential policy

Composing credentials, such as the minimum and maximum length of a password.

21
New cards

Organizational policy

How work should be carried out.

22
New cards

Security Awareness Training

Prevent employees from falling victim to social engineering attacks such as phishing scams.

23
New cards

User Access Controls

Restricting access to data on a "need to know principle". Access should only be given to those that need it for their job.

24
New cards

IDS/IPS Monitoring

Counter downloading unauthorized programs or files.

25
New cards

Tracking and monitoring abnormal employee behavior

Mitigate potential erratic job performance and security risks.

26
New cards

Common Good approach

Ethical actions should benefit the entire community

27
New cards

Computer-targeted crime

Computer is the target of crime activity. Examples: malware attack, hacking, DoS

28
New cards

Computer-assisted crime

Computer is used to commit a crime. Examples: theft, fraud

29
New cards

Computer-incidental crime

Computer provides information incidental to an actual crime. Example: storing illegally downloaded videos

30
New cards

Agencies working against cybercrime

Federal Bureau of Investigation Internet Crime Complaint Center (FBI IC3), InfraGard, Software and Information Industry Association (SIIA)

31
New cards

Statutory Law

Federal agencies and regulatory framework with civil and criminal penalties. Examples: Computer Fraud and Abuse Act

32
New cards

Administrative Law

Legal framework governing activities of administrative agencies of government. Example: Federal Communications Communication (FCC), Federal Trade Commission (FTC)

33
New cards

Common Law

Worked their way through the judicial system. Precedents and constitutional bases

34
New cards

Federal Information Security Management Act (FISMA)

Created in 2002. Covers federal agencies' IT systems

35
New cards

FISMA Requirements for Federal Agencies

Risk assessments, Annual inventory of IT systems, Policies and procedures to reduce risk, Security awareness training, Testing and evaluation of all IT system controls, Incident response procedures, Continuity of operations plan

36
New cards

Gramm-Leach-Bliley Act (GLBA)

Finance industry. Opt-out provisions for individuals. Restricts information sharing with third party organizations

37
New cards

Sarbanes-Oxley Act (SOX)

Corporate accounting industry. Financial and corporate accounting standards

38
New cards

Payment Card Industry Data Security Standard (PCI DSS)

Credit card industry. Contractual rules to protect cardholder payment data and improve confidentiality of network communications

39
New cards

Cryptography regulations

Certain regulations set by the Bureau of Industry and Security on the import and export of commercial encryption products

40
New cards

Electronic Communications Privacy Act of 1986 (ECPA)

Ensure workplace privacy and protection of electronic communications such as email and telephone

41
New cards

Computer Fraud and Abuse Act of 1986 (CFAA)

Amendment to the Comprehensive Crime Control Act of 1984. Prohibits unauthorized access to computer systems. Criminalizes trafficking of passwords and transmitting destroying programs or code

42
New cards

Privacy Act of 1974

Code of fair information practices. Governs the collection, maintenance, use and dissemination of personally identifiable information (PII) of individuals in federal agencies

43
New cards

Freedom of Information Act (FOIA)

Public access to US government records

44
New cards

Family Education Records and Privacy Act (FERPA)

Parents must approve the disclosure of a student's education information to public entities. Rights transfer from parent to student at 18 years old or upon enter of postsecondary institutions

45
New cards

US Children's Online Privacy Protection Action (COPPA)

Protect the privacy of children under 13 years of age. Parental consent to obtain and use information by an organization

46
New cards

US Children's Internet Protection Act (CIPA)

Protect children under 17 from offensive Internet content and obscene material

47
New cards

Video Privacy Protection Act (VPPA)

Concerns the sharing of videotape, DVD and video game rental information to other parties. Allows consented collection to be public for up to two years

48
New cards

Health Insurance Portability and Accountability Act (HIPAA)

Creation of national standards for safeguards to the storage, maintenance, transmission and access to an individual's health information

49
New cards

California Senate Bill 1386 (SB 1386)

Individuals should be given notice in the event of their personal information being lost or disclosed

50
New cards

Privacy policies

Organizational compliance with laws on privacy and data collection

51
New cards

Privacy impact assessment (PIA)

Process that helps ensure PII is properly handled. Generally involve the ff: Establish PIA scope, Identify key stakeholders, Document how the organization handles PII, Review legal and regulatory requirements, Document any potential issues when comparing requirements and current practices, Review findings with key stakeholders

52
New cards

Convention on Cybercrime

First international treaty on cybercrime. Particularly copyright infringement, computer-related fraud, child pornography and network security

53
New cards

Electronic Privacy Information Center (EPIC)

Nonprofit research center in Washington. Promote privacy and open government laws and policies

54
New cards

Risk Assessment

Quantitative and qualitative value of risk

55
New cards

Security Policy

Constraints and behaviors of individuals. Specifies how data can be accessed and by whom

56
New cards

Organization of Information Security

Governance model for information security

57
New cards

Asset Management

Inventory and classification scheme of information assets

58
New cards

Human Resources Security

Security procedures relating to employees joining, moving within, and leaving an organization

59
New cards

Physical and Environmental Security

Physical protection of facilities and information

60
New cards

Communications and Operations Management

Management of technical security controls

61
New cards

Information Systems Acquisition, Development and Maintenance

Security as an integral part of an organization's information systems

62
New cards

Access Control

Restriction of access rights to network systems, applications functions and data

63
New cards

Information Security Incident Management

Approach to the anticipation and response of security breaches

64
New cards

Business Continuity Management

Protect, maintain, and recover business-critical activities following disruptions

65
New cards

Compliance

Ensuring conformance with information security policies, standards and regulations

66
New cards

Control Objectives

High level requirements

67
New cards

Controls

How to accomplish the control objectives

68
New cards

CIA Triad (statement of applicability)

Confidentiality, Integrity, Availability

69
New cards

States of Data (controls to address states on)

Data in process, Data at rest / data in storage, Data in transit

70
New cards

Safeguards (technical direction for objectives)

People, Technology, Policy. Created by National Institute of Standards and Technologies (NIST)

71
New cards

Operate and maintain

Support, administration, maintenance

72
New cards

Protect and defend

Identifies, analyzes, and mitigates threats

73
New cards

Investigate

Investigates cybersecurity events and/or cyber attacks

74
New cards

Collect and operate

Provides specialized denial and deception operations. Collection of cybersecurity operation

75
New cards

Analyze

Highly specialized review and evaluation of incoming cybersecurity information

76
New cards

Oversee and govern

Provides leadership, management, direction or development and advocacy

77
New cards

Securely provision

Conceptualizes, designs, procures or builds secure IT systems

78
New cards

Basic controls

For organizations with limited resources

79
New cards

Foundational controls

For organizations with moderate resources

80
New cards

Organizational controls

For organizations with significant resources. Includes (inclusive of basic and foundational): Security awareness training program, Application software security, Incident response and management, Penetration tests and red team exercises

81
New cards

Cloud Controls Matrix

Provided by Cloud Security Alliance (CSA). Maps cloud-specific security controls to leading standards, best practices and regulations. Composed of 197 control objectives in 17 domains. De-facto standard for cloud security assurance and compliance

82
New cards

Statement on Standards for Attestation Engagements (SSAE) 18 Service Organization Control (SOC) 2 Audit

Independent audit. Security, availability, processing integrity, confidentiality and privacy of a system. Controls are in place at a specific point in time (Type I) or of a period of at least six months (Type II)

83
New cards

Cybersecurity Maturity Model Certification (CMMC)

Aimed at organizations providing a service to the US Department of Defense. Verifies organizations to have adequate cybersecurity practices with 'basic' cyber hygiene. Establishes five certification levels ranging from 'basic cyber hygiene practices' to 'enhanced practices that provide more sophisticated capabilities to detect and respond to APTs'

84
New cards

Cybersecurity Analyst

Manage and configure tools to monitor activities. Investigate cyber events and/or reports. Apply security patches

85
New cards

Cybersecurity Engineer

Create new solutions to solve security issues. Configure firewalls and security tools. Implement security policies

86
New cards

Penetration Tester

Apply tools for vulnerability testing. Perform social engineering tests. Make suggestions for security improvements

87
New cards

Vulnerability Scanners

Assess computers, computer systems, networks, or applications for weaknesses. Can help automate security auditing.

88
New cards

Vulnerabilities

Include the use of default or common passwords, missing patches, open ports, misconfigurations in operating systems and software, and active IP addresses.

89
New cards

Commonly used vulnerability scanners

Include Nessus, Retina, Core Impact, and GDI LanGuard.

90
New cards

Functions of vulnerability scanners

Ipconfig / ifconfig displays TCP/IP settings. Ping tests network connectivity using ICMP. Arp shows a table of known MAC addresses and their IP addresses. Tracert / traceroute traces a packet route for each hop to the destination. Nslookup queries a DNS server. Netstat displays all ports a computer is listening on to determine active connections. Nbstat troubleshoots NetBIOS name resolution problems.

91
New cards

Nmap

Used for security auditing and locating network hosts.

92
New cards

Netcat

Gathers information from TCP/UDP network connections, performs port scanning, monitoring, banner grabbing, and file copying.

93
New cards

Hping

Assembles and analyzes packets for port scanning, path discovery, OS fingerprinting, and firewall testing.

94
New cards

Security Information and Event Management (SIEM)

Aggregates log data from security devices, network devices, servers, and applications. Combines similar events to reduce data load, identifies deviations from the norm, and can be costly to purchase and maintain.

95
New cards

Security Orchestration Automation and Response (SOAR)

Collects data from security threats and responds to low-level events without human intervention. Can be integrated into a SIEM.

96
New cards

Security Test and Evaluation (ST&E)

Involves the examination of protective measures to assess the degree of consistency between system documentation and implementation. Should be repeated periodically and whenever changes are made to the system.

97
New cards

Penetration testing

Simulates attacks from malicious sources to determine the feasibility and consequences of a possible attack.

98
New cards

Network scanning

Involves pinging computers, scanning for listening ports, displaying available resources in the network, and may also detect usernames, groups, and shared resources.

99
New cards

Password cracking

Tests and detects weak passwords.

100
New cards

Log review

Involves reviewing security logs to identify potential security threats, which could involve filtering software to help discover abnormal activity.