100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D320 (C838) Exam 2024_2025 fully solved & updated $11.49   Add to cart

Exam (elaborations)

WGU D320 (C838) Exam 2024_2025 fully solved & updated

 12 views  0 purchase
  • Institution
  • WGU

WGU D320 (C838) Exam 2024_2025 fully solved & updated

Preview 2 out of 11  pages

  • October 2, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (6253)
avatar-seller
tuition
WGU D320 (C838) Exam 2024/2025 fully
solved & updated




(ISC)2 - International Information System Security Certification Consortium
A security certification granting organization that has a long history of
certifications that were difficult to get. This difficulty has made their certificates
seen as having higher value in the industry.
(ISC)2 Cloud Secure Data Life Cycle
Based on CSA Guidance. 1. Create; 2. Store; 3. Use; 4. Share; 5. Archive; 6.
Destroy.

_____ was a recognized standard of the American Institute of Certified Public
Accountants (AICPA) in response to the issues that also lead to Sarbanes-Oxley
(SOX). Deprecated in 2011 by the Statement on Standards for Attestation
Engagements (SSAE) No. 16.
AICPA
established SAS 70 and later SAAE 16.
AICPA
American Institute of Certified Public Accountants
Organizational Normative Framework (ONF)
Concepts of ISO 27034. There is only one _____ for an organization but
potentially as many ANF's as applications.
ASHRAE - American Society of Heating, Refrigerating and Air-Conditioning
Engineers
a professional association seeking to advance heating, ventilation, air
conditioning and refrigeration systems design and construction.
Biba
an access control model designed to preserve data integrity. It has 3 goals.
Maintain internal and external consistency; prevent unauthorized data
modification even by authorized parties; prevent data modification by
unauthorized individuals.

, Capability Maturity Model (CMM)
a development model where the maturity relates to the formality and optimization
of processes. When applied to cloud security it would focus on those aspects as
they relate to cloud security.
Child Online Protection Act (COPA)
An attempt to restrict access by minors to material defined as harmful to minors.
A permanent injunction against the law in 2009.
Cloud Access Security Brokers (CASBs)
monitors network activity between users and cloud applications and enforces
security policy and blocking malware.
Cloud Security Alliance (CSA)
publishes the Notorious Nine: 1) Data breaches; 2) Data Loss; 3) Account service
traffic hijacking; 4) Insecure Interfaces and APIs; 5) Denial of Service; 6)
Malicious Insiders; 7) Abuse of Cloud Services; 8) Insufficient Due Diligence; 9)
Shared technology Vulnerabilities. There are also implications and controls
associated with each.
CSA STAR - Cloud Security Alliance (CSA) Security, Trust, and Assurance
Registry (STAR)
_______ uses the Consensus Assessments Initiative Questionnaire (CAIQ), Cloud
Controls Matrix (CCM), and GDPR Self-Assessment as inputs to certify an
organization to Level 1.

Level 2 integrates the CSA Cloud Controls Matrix and the AICPA Trust Service
Principles - AT 101 for STAR attestation.

STAR Certification for level to uses the CSA Cloud Controls Matrix and the
requirements of the ISO/IEC 27001:2013 management system standard together
with the CSA Cloud Controls Matrix.

Certification certificates follow normal ISO/IEC 27001 protocol for a 3rd party
assessment.
Cloud Security Alliance Cloud Controls Matrix (CSA CCM)
Composed of 17 domains covering key elements of cloud. It contains 170
objectives within the domains. They integrate with the STAR program.
COBIT or Control Objectives for Information and Related Technologies
a framework for IT governance and management. Initially used to achieve
compliance with Sarbanes-Oxley and focused on IT controls. Since 2019 the
emphasis has shifted to information governance. It is focused on these 5
principles: 1: Meeting Stakeholder Needs; 2: Covering the Enterprise End-to-End;
3: Applying a Single Integrated Framework; 4: Enabling a Holistic Approach; and
5: Separating Governance from Management.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller tuition. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart