CCSP Laws and Regulations

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

30 Terms

1
New cards

(ISC)2 - International Information System Security Certification

  • A security certification granting organization that has a long history of certifications that were difficult to get. 

  • This difficulty has made their certificates seen as having higher value in the industry.

2
New cards

American Institute of Certified Public Accountants (AICPA)   

Provides standards, guidance, and resources for the accounting profession

3
New cards

Biba Model

Focuses on preventing unauthorized modification of data

4
New cards

Capability Maturity Model (CMM)

a framework for assessing and improving the maturity of an organization’s processes, especially in software development and IT management.

5
New cards

Child Online Protection Act (COPA)

a U.S. federal law passed in 1998 that was designed to restrict access by minors to harmful material on the Internet.

6
New cards

Cloud Security Alliance (CSA)

a not-for-profit organization dedicated to promoting best practices for cloud computing security.

7
New cards

Control Objectives for Information and Related Technologies (COBIT)

  • Initially used to achieve compliance with Sarbanes-Oxley and focused on IT controls. 

  • Since 2019 the emphasis has shifted to information governance.

  • It is focused on these 5  principles: 

  • 1: Meeting Stakeholder Needs; 

  • 2: Covering the Enterprise End-to-End;

  • 3: Applying a Single Integrated Framework;

  • 4: Enabling a Holistic Approach; and

  • 5: Separating Governance from Management.

8
New cards

ENISA  - European Union Agency for Cybersecurity

  • Cybersecurity Expertise

    • Provides advice, guidance, and best practices on cybersecurity issues for the EU and member states

  • Risk Assessment and Threat Analysis

    • Conducts studies on cyber threats, incidents, and vulnerabilities

9
New cards

Family Education Rights and Privacy Act (FERPA)

  • It is a U.S. federal law passed in 1974

  • Protects the privacy of student education records

  • Applies to all schools and institutions that receive federal funding

10
New cards

Federal Information Processing Standard (FIPS) 140-2

  • It is a U.S. government standard that defines security requirements for cryptographic modules used to protect sensitive data

  • Published by NIST (National Institute of Standards and Technology)

  • Ensures that hardware and software that perform encryption meet strict security standards

Level

Description

1

Basic encryption with minimal physical security

2

Adds tamper-evident coatings or seals, role-based authentication

3

Adds tamper-resistant hardware and identity-based authentication

4

Highest level, detects and responds to environmental attacks (e.g., voltage, temperature)

11
New cards

Federal Information Systems Management Act (FISMA)

a U.S. law requiring federal agencies and contractors to implement risk-based information security programs, follow NIST standards, and report on the effectiveness of their security controls.

12
New cards

International Standards Organization (ISO)

a global body that develops and publishes standards to ensure quality, safety, efficiency, and best practices across industries, including IT and information security.

13
New cards

ISO/IEC 27001 

  • Specifies requirements for establishing, implementing, maintaining, and improving an ISMS.

  • Focuses on what an organization must do to manage information security.

14
New cards

ISO/IEC 27002 

  • Provides best-practice guidelines for selecting and implementing information security controls.

  • Focuses on how an organization should implement the controls.

15
New cards

Wassenaar Arrangement

An international agreement that regulates the export of dual-use technologies, including encryption and advanced computing tools.

16
New cards

National Institute of Standards and Technology (NIST)

a U.S. federal agency that develops technology standards, guidelines, and best practices, particularly for cybersecurity, IT risk management, and cryptography.

17
New cards

Open Web Application Security Project (OWASP)

a non-profit organization that provides free resources, tools, and guidance to improve the security of web applications, including the widely recognized OWASP Top 10 vulnerabilities list.

18
New cards

European Union Agency for Network and Information Security (ENISA)

the EU agency that provides guidance, expertise, and coordination to strengthen cybersecurity across member states and support EU cybersecurity policies.

19
New cards

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

  • allows U.S. law enforcement agencies to:

    • Request data from U.S.-based companies, even if the data is stored abroad

    • Override foreign laws that would prevent disclosure

  • Goal: Ensure federal officials can access evidence for investigations without waiting for complicated international agreements

20
New cards

Sarbanes-Oxley (SOX) Act

  • Purpose: Corporate financial accountability

  • Scope: Public companies in the U.S.

  • Requirements:

    • Accurate financial reporting

    • Internal controls for accounting systems

    • CEO/CFO must certify financial statements

21
New cards

General Data Protection Regulation (GDPR)

  • Purpose: Protect personal data of EU citizens

  • Scope: Any company processing data of EU residents, regardless of location

  • Requirements:

    • Obtain consent before processing personal data

    • Right to access, correct, or delete personal data

    • Restrictions on transferring data outside the EU without adequate safeguards

22
New cards

Gramm-Leach-Bliley Act (GLBA)

  • Purpose: Protect privacy of financial information in the U.S.

  • Scope: Financial institutions (banks, insurance, credit)

  • Requirements:

    • Inform customers about data collection and sharing practices

    • Implement safeguards for customer financial information

23
New cards

Generally Accepted Privacy Principles (GAPP)

a framework of privacy guidelines developed to help organizations collect, use, store, and disclose personal information responsibly.

24
New cards

Personal Information Protection and Electronic Documents Act (PIPEDA)

Canada’s federal law that regulates how private-sector organizations collect, use, and disclose personal information, emphasizing consent, accountability, and data protection.

25
New cards

Risk Management Framework (RMF) 

a NIST-defined process for managing information system risk by selecting, implementing, assessing, authorizing, and monitoring security controls throughout the system lifecycle.

26
New cards

STRIDE Model  

a threat modeling framework that classifies security threats into six categories—Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege—to help identify and mitigate risks in systems and applications.

27
New cards

NIST 800-53

a U.S. government security framework that defines standardized security and privacy controls for federal information systems and organizations.

28
New cards

Federal Risk and Authorization Management Program (FedRAMP)

  • a U.S. government program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud services

  • Ensures:

    • Cloud vendors meet federal security requirements

    • Data is handled according to federal regulations

    • Ongoing monitoring and compliance are maintained

  • Mandatory for any cloud service used by federal agencies

29
New cards

ECPA (Electronic Communication Privacy Act)

a U.S. law that protects the privacy of electronic communications while in transit or stored by service providers.

30
New cards

DMCA (Digital Millennium Copyright Act)

a U.S. law that protects copyrighted digital content and criminalizes circumventing digital rights management (DRM) technologies.

Explore top flashcards

PE - Body systems
Updated 62d ago
flashcards Flashcards (49)
Party factions
Updated 976d ago
flashcards Flashcards (25)
Vocab 2A
Updated 477d ago
flashcards Flashcards (47)
Bio Unit 3: DNA
Updated 849d ago
flashcards Flashcards (38)
1984 Vocabulary
Updated 107d ago
flashcards Flashcards (20)
PE - Body systems
Updated 62d ago
flashcards Flashcards (49)
Party factions
Updated 976d ago
flashcards Flashcards (25)
Vocab 2A
Updated 477d ago
flashcards Flashcards (47)
Bio Unit 3: DNA
Updated 849d ago
flashcards Flashcards (38)
1984 Vocabulary
Updated 107d ago
flashcards Flashcards (20)