Week 1 Flashcards

(24 cards)

1
Q

What is GRC?

A

Governance, Risk and Compliance is a set of processes and procedure that help organizations achieve their business objective, address uncertainty, and act with integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Governance?

A

Involves setting rules, strategies and policies to ensure IT system align with business goals.

It defines structure, policies and practices that make sure controls are clearly communicated, properly implemented, and supported at organizational level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why should we check for Risk?

A

Ensuring proper controls are in place and functioning.

It involves identifying threats assessing potential losses and applying strategies to reduce risks to levels acceptable to the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Compliance?

A

Compliance means following legal, regulatory standards applicable to organization’s IT systems.

By conforming these stated requirements, it helps reduce risks and ensures alignment with organization goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Steps to Compliance?

A

Adapt - Compliance framework

Audit - Internal/ external security audit

Monitor - Monitoring process/ system changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

8 Functions of GRC

A
  1. Organize and oversee - Set outcomes, roles, responsibilities, approach, and accountability
  2. Assess & Align - Identify, analyze, and optimize risk mitigation
  3. Prevent & Promote - Establish code of conduct, policies, controls, training, and stakeholder engagements
  4. Detect & Discern - Set up hotlines, reporting systems, surveys, and detective controls.
  5. Respond and Resolve - Conduct investigations, manage crisis, ensure recovery
  6. Monitor and measure - Track context and performance for continuous improvement
  7. Inform and Integrate - Manage info, communication, tech, infrastructure
  8. Context and Culture - Align with business goals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the relationship between laws, regulations, standards, and security frameworks?

A

Laws and regulations state what must happen to protect information. Standards and security frameworks provide structured steps to plan, implement, test, and monitor those requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some examples of sectors with different regulatory requirements?

A

Finance, credit card, healthcare, etc.

Government vs Private Sector
(Government must comply with IM8)

Regulated industries (Banks, medicine, power plant) have stricter regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Laws & Regulations - Finance

A

Sarbanes-Oxley Act (SOX) of 2002 - US law that was created to protect investors from fraudulent accounting activities by corporations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Section 302

A

Purpose: To make company leaders accountable for truthful financial reporting and strong internal control systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Laws & Regulations - Healthcare

A

HIPAA (Health Insurance Portability and Accountability Act)
It is a US law that ensures data privacy and security for medical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 2 stops of HIPAA

A

HIPAA Privacy rule
HIPAA Security rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what does HIPAA Privacy rule do?

A
  1. Limits the use and disclosure of sensitive PHI
  2. Gives patients the right to access their medical records
  3. Requires doctors to track and disclose how patient data is shared
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does HIPAA Security rule do?

A

Sets national standard to protect ePHI that is created, received, used or maintained.

Requires appropriate administrative, physical, and technical safeguards to ensure confidentiality, integrity, and security of ePHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Law & Regulations - Credit Card

A

Payment Card Industry Data Security Standard (PCI DSS)
Created to prevent credit card fraud and protect cardholders from identity theft

  • Requires all organizations that store, process, or transmit cardholder data to comply with PCI DSS
  • Provides policies and procedures to secure credit, debit and cash card transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the Local Laws/ Regulations

A
  1. Computer misuse and cybersecurity act (Ch 50A)
  2. Banking Act (Ch 19)
  3. Cybersecurity Act 2018
  4. Personal Data Protection Act 2012
17
Q

What does Computer misuse and cybersecurity Act do?

A
  • Secures computer systems against unauthorized access or modification
  • Requires measures to ensure cybersecurity
18
Q

What does Banking Act (ch 19) do?

A
  • Goven’s licensing and regulation of banks and related financial institutions
  • Covers credit card and charge card business of banks and other institutions
19
Q

Examples for CII

A

banking, finance, energy, water

19
Q

What does Cybersecurity Act 2018 do?

A

Provides legal framework for protecting critical information infrastructure (CII).

Cybersecurity Code of Practice (CCOP) is issued under this Act and serves as a guideline for CII owners to follow.

CII owners has to ensure cybersecurity resilience and proactively protect CII from cyberthreats.

20
Q

What are the key requirements CCoP 2.0 addresses for CII?

A
  1. Governance
  2. Identification
  3. Protection
  4. Detection
  5. Response and Recovery
  6. Cyber Resiliency
  7. Cybersecurity Training and Awareness
  8. Operational Technology (OT) security
21
Q

What does Personal Data Protection Act 2012 do?

A
  • Is a legal framework for personal data protection
  • Compliance under IM8 is part of enforcement and audit requirements
22
Q

what is (IM) 8?

A

Instruction Manual (IM) 8
- It is a government policy that specifies IT security policies for IT security

  • Implemented by government agencies, private vendors serving these agencies must comply
23
Q

Summary

A

By using these frameworks and tools, it helps businesses manage risk, follow laws, and stay compliant using structured tools and controls