100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
D320 (C838) Laws, Regulations, and OrganizATIONS WITH 100- CORRECT ANSWERS $9.99   Add to cart

Exam (elaborations)

D320 (C838) Laws, Regulations, and OrganizATIONS WITH 100- CORRECT ANSWERS

 0 view  0 purchase
  • Course
  • EGINERING
  • Institution
  • EGINERING

D320 (C838) Laws, Regulations, and OrganizATIONS WITH 100- CORRECT ANSWERS

Preview 2 out of 7  pages

  • October 2, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • EGINERING
  • EGINERING
avatar-seller
mbitheeunice2015
10/2/24, 12:39 PM


EUNICE




D320 (C838) Laws, Regulations, and Organizations WITH
100% SURE ANSWERS
A security certification granting organization that has a long history of certifications that
(ISC)2 - International Information System
were difficult to get. This difficulty has made their certificates seen as having higher
Security Certification Consortium
value in the industry.

(ISC)2 Cloud Secure Data Life Cycle Based on CSA Guidance. 1. Create; 2. Store; 3. Use; 4. Share; 5. Archive; 6. Destroy.

_____ was a recognized standard of the American Institute of Certified Public
Accountants (AICPA) in response to the issues that also lead to Sarbanes-Oxley (SOX).
(SAS) 70
Deprecated in 2011 by the Statement on Standards for Attestation Engagements (SSAE)
No. 16.

AICPA established SAS 70 and later SAAE 16.

AICPA American Institute of Certified Public Accountants

Concepts of ISO 27034. There is only one ____ for an organization but potentially as
Organizational Normative Framework (ONF)
many ANF's as applications.

ASHRAE - American Society of Heating, a professional association seeking to advance heating, ventilation, air conditioning and
Refrigerating and Air-Conditioning Engineers refrigeration systems design and construction.

an access control model designed to preserve data integrity. It has 3 goals. Maintain
Biba internal and external consistency; prevent unauthorized data modification even by
authorized parties; prevent data modification by unauthorized individuals.

a development model where the maturity relates to the formality and optimization of
Capability Maturity Model (CMM) processes. When applied to cloud security it would focus on those aspects as they
relate to cloud security.

An attempt to restrict access by minors to material defined as harmful to minors. A
Child Online Protection Act (COPA)
permanent injunction against the law in 2009.

monitors network activity between users and cloud applications and enforces security
Cloud Access Security Brokers (CASBs)
policy and blocking malware.




1/7

, 10/2/24, 12:39 PM
publishes the Notorious Nine: 1) Data breaches; 2) Data Loss; 3) Account service traffic
hijacking; 4) Insecure Interfaces and APIs; 5) Denial of Service; 6) Malicious Insiders; 7)
Cloud Security Alliance (CSA)
Abuse of Cloud Services; 8) Insufficient Due Diligence; 9) Shared technology
Vulnerabilities. There are also implications and controls associated with each.

_______ uses the Consensus Assessments Initiative Questionnaire (CAIQ), Cloud Controls
Matrix (CCM), and GDPR Self-Assessment as inputs to certify an organization to Level 1.


Level 2 integrates the CSA Cloud Controls Matrix and the AICPA Trust Service
Principles - AT 101 for STAR attestation.
CSA STAR - Cloud Security Alliance (CSA)
Security, Trust, and Assurance Registry
STAR Certification for level to uses the CSA Cloud Controls Matrix and the
(STAR)
requirements of the ISO/IEC 27001:2013 management system standard together with
the CSA Cloud Controls Matrix.


Certification certificates follow normal ISO/IEC 27001 protocol for a 3rd party
assessment.

Cloud Security Alliance Cloud Controls Composed of 17 domains covering key elements of cloud. It contains 170 objectives
Matrix (CSA CCM) within the domains. They integrate with the STAR program.

a framework for IT governance and management. Initially used to achieve compliance
with Sarbanes-Oxley and focused on IT controls. Since 2019 the emphasis has shifted to
COBIT or Control Objectives for Information information governance. It is focused on these 5 principles: 1: Meeting Stakeholder
and Related Technologies Needs; 2: Covering the Enterprise End-to-End; 3: Applying a Single Integrated
Framework; 4: Enabling a Holistic Approach; and 5: Separating Governance from
Management.

is assigned to an IT product after it has been evaluated by an independent lab. The
level indicates the degree and type of testing with 1 the least and 7 the most. _____
Common Criteria and the EAL
contains 60 functional requirements in 11 classes and is an accepted standard among
the military organizations of the US and many allies.

an initiative of the Cloud Security Alliance to provide an industry-accepted
Consensus Assessments Initiative documentation of security controls and as of 2020 is combined with the Cloud Controls
Questionnaire (CAIQ) Matrix.
They can be used as evidence for entry to the CSA STAR registry.

controversial act intended to align the US copyright act with the requirements of
Digital Millennium Copyright Act (DMCA)
treaties and the World Intellectual Property Organization.

is ensured by a set of tools, procedures, and policy to ensure sensitive, proprietary, and
PII is not lost or misused. It helps to provide compliance with numerous laws and
DLP (Data Loss Prevention)
compliance requirements by enforcing preventative and detective measures in the
organization.

a Cyber Security awareness association that provides support, information, and
ENISA - European Union Agency for
collaboration on security issues. They also publish a top x threats each year. The last
Cybersecurity
few years they have included 15 threats each year.

regulates the processing of PII in the EU. Since it is a directive, each country must pass
EU Data Directive the laws that establish how each country will enforce the directive. It includes the 7
principles governing the OECD's recommendations for protection of personal data.

a nonprofit organization that maintains information security standards or best practices
Eurocloud Star Audit Certification (ESAC)
and provides assessments and certification of compliance.

ENISA European Union Agency for Network and Information Security

a Federal law that protects the privacy of student education records. It applies to all
Family Education Rights and Privacy Act
schools that receive funds under an applicable program of the U.S. Department of
(FERPA)
Education.


2/7

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller mbitheeunice2015. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78140 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart