Podcast
Questions and Answers
What does the 2011 Data Privacy Act in the Philippines primarily aim to achieve?
What does the 2011 Data Privacy Act in the Philippines primarily aim to achieve?
- Enhance data security and privacy rights (correct)
- Facilitate easier access to public records
- Encourage businesses to collect more data
- Increase tax revenues from organizations
What could happen to organizations that fail to comply with data privacy requirements in the Philippines?
What could happen to organizations that fail to comply with data privacy requirements in the Philippines?
- They are exempt from regulations
- They may receive government grants
- They could face serious fines and legal action (correct)
- They will gain more customers
Which of the following is NOT a typical identification information according to the content?
Which of the following is NOT a typical identification information according to the content?
- Occupation
- Spouse’s name
- Bank account number (correct)
- Citizenship
What primary purpose does the Optical Media Act serve in the Philippines?
What primary purpose does the Optical Media Act serve in the Philippines?
Which form of intellectual property is NOT mentioned in the content?
Which form of intellectual property is NOT mentioned in the content?
Under Philippine copyright law, what types of works are specifically protected?
Under Philippine copyright law, what types of works are specifically protected?
What does identity theft typically involve, based on the provided information?
What does identity theft typically involve, based on the provided information?
Which element is a fundamental aspect of data privacy laws mentioned?
Which element is a fundamental aspect of data privacy laws mentioned?
What is the primary purpose of a security audit?
What is the primary purpose of a security audit?
What is the difference between a security audit and a vulnerability evaluation?
What is the difference between a security audit and a vulnerability evaluation?
What does penetration testing involve?
What does penetration testing involve?
Which of the following best describes cryptology?
Which of the following best describes cryptology?
In the context of security monitoring, which aspect is NOT typically assessed?
In the context of security monitoring, which aspect is NOT typically assessed?
What is illustrated by the Security Controls Address Risk model?
What is illustrated by the Security Controls Address Risk model?
When conducting a security assessment, which element is essential?
When conducting a security assessment, which element is essential?
Which approach may enhance the effectiveness of security assessments?
Which approach may enhance the effectiveness of security assessments?
What does MTD stand for in the context of business continuity?
What does MTD stand for in the context of business continuity?
Which files are generally considered unnecessary for data backup?
Which files are generally considered unnecessary for data backup?
What type of backup process is best suited for files updated several times a day?
What type of backup process is best suited for files updated several times a day?
Which factor does NOT play a role in determining where to back up data?
Which factor does NOT play a role in determining where to back up data?
What is the primary purpose of backing up data?
What is the primary purpose of backing up data?
Which of the following describes a step in the disaster recovery process?
Which of the following describes a step in the disaster recovery process?
What is essential during the activation of a disaster response program?
What is essential during the activation of a disaster response program?
When evaluating backup strategies, which of these is NOT a relevant factor?
When evaluating backup strategies, which of these is NOT a relevant factor?
What is the main purpose of cryptography?
What is the main purpose of cryptography?
Which term refers to the original message before it is encrypted?
Which term refers to the original message before it is encrypted?
What does the process of enciphering involve?
What does the process of enciphering involve?
What is referred to as the secret version of plaintext?
What is referred to as the secret version of plaintext?
Which of the following correctly describes a key in the context of cryptography?
Which of the following correctly describes a key in the context of cryptography?
What common practice is NOT associated with mitigating risks in information security?
What common practice is NOT associated with mitigating risks in information security?
How is plaintext typically represented in coded form?
How is plaintext typically represented in coded form?
What is a potential drawback of retrofitting security onto an existing network?
What is a potential drawback of retrofitting security onto an existing network?
What is the significance of having a response plan for each identified risk?
What is the significance of having a response plan for each identified risk?
What does the Recovery Point Objective (RPO) indicate?
What does the Recovery Point Objective (RPO) indicate?
Which of the following stages comes first in the Business Continuity Plan (BCP)?
Which of the following stages comes first in the Business Continuity Plan (BCP)?
What outcome is expected if the Maximum Tolerable Downtime (MTD) is exceeded?
What outcome is expected if the Maximum Tolerable Downtime (MTD) is exceeded?
What is the purpose of a Work Recovery Period (WRT)?
What is the purpose of a Work Recovery Period (WRT)?
Who primarily handles the function of restoring systems after a disaster?
Who primarily handles the function of restoring systems after a disaster?
Which stage follows 'Disaster' in the Business Continuity Plan (BCP)?
Which stage follows 'Disaster' in the Business Continuity Plan (BCP)?
What does the Recovery Time Objective (RTO) measure?
What does the Recovery Time Objective (RTO) measure?
What is the primary function of a firewall?
What is the primary function of a firewall?
What distinguishes a host-based firewall from a network-based firewall?
What distinguishes a host-based firewall from a network-based firewall?
What is one of the advantages of using a firewall?
What is one of the advantages of using a firewall?
Which of the following is a disadvantage of firewalls?
Which of the following is a disadvantage of firewalls?
What is meant by application gateways in the context of firewalls?
What is meant by application gateways in the context of firewalls?
Which network access types may be impacted by a firewall?
Which network access types may be impacted by a firewall?
Why might a firewall be considered a risk in a network environment?
Why might a firewall be considered a risk in a network environment?
What does protocol filtering by a firewall accomplish?
What does protocol filtering by a firewall accomplish?
Flashcards
Project Risk Management
Project Risk Management
Tracking how risk responses are handled against the schedule and managing new project risks.
Risk Response Plan
Risk Response Plan
A plan for dealing with identified risks, including alternative execution paths and emergency plans.
Business Continuity Plan (BCP)
Business Continuity Plan (BCP)
A plan to keep business operations running during a disaster or disruption.
Maximum Tolerable Downtime (MTD)
Maximum Tolerable Downtime (MTD)
Signup and view all the flashcards
Recovery Point Objective (RPO)
Recovery Point Objective (RPO)
Signup and view all the flashcards
Recovery Time Objective (RTO)
Recovery Time Objective (RTO)
Signup and view all the flashcards
Work Recovery Period (WRT)
Work Recovery Period (WRT)
Signup and view all the flashcards
Business Continuity Management (BCM)
Business Continuity Management (BCM)
Signup and view all the flashcards
MTD
MTD
Signup and view all the flashcards
Data Backup
Data Backup
Signup and view all the flashcards
Data Backup Frequency
Data Backup Frequency
Signup and view all the flashcards
Disaster Recovery Plan (DRP)
Disaster Recovery Plan (DRP)
Signup and view all the flashcards
Backup Media
Backup Media
Signup and view all the flashcards
Backup Types
Backup Types
Signup and view all the flashcards
Disaster Response Program Activation
Disaster Response Program Activation
Signup and view all the flashcards
Disaster Recovery Steps
Disaster Recovery Steps
Signup and view all the flashcards
Data Privacy Act (Philippines)
Data Privacy Act (Philippines)
Signup and view all the flashcards
Data Security Requirements
Data Security Requirements
Signup and view all the flashcards
Identity Theft
Identity Theft
Signup and view all the flashcards
Intellectual Property (IP)
Intellectual Property (IP)
Signup and view all the flashcards
Copyright
Copyright
Signup and view all the flashcards
Trademark
Trademark
Signup and view all the flashcards
Patent
Patent
Signup and view all the flashcards
Republic Act No. 8293 (Philippine Copyright Law)
Republic Act No. 8293 (Philippine Copyright Law)
Signup and view all the flashcards
Cryptography
Cryptography
Signup and view all the flashcards
Cryptanalysis
Cryptanalysis
Signup and view all the flashcards
Plaintext
Plaintext
Signup and view all the flashcards
Cipher
Cipher
Signup and view all the flashcards
Ciphertext
Ciphertext
Signup and view all the flashcards
Encipher/Decipher
Encipher/Decipher
Signup and view all the flashcards
Security Audit
Security Audit
Signup and view all the flashcards
Vulnerability Evaluation
Vulnerability Evaluation
Signup and view all the flashcards
Penetration Testing
Penetration Testing
Signup and view all the flashcards
Cryptology
Cryptology
Signup and view all the flashcards
What are the two parts Cryptology is divided into?
What are the two parts Cryptology is divided into?
Signup and view all the flashcards
What are the security controls known as?
What are the security controls known as?
Signup and view all the flashcards
What is the purpose of security monitoring for computer systems?
What is the purpose of security monitoring for computer systems?
Signup and view all the flashcards
Why are security audits, vulnerability evaluations, and penetration testing important?
Why are security audits, vulnerability evaluations, and penetration testing important?
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Network-Based Firewall
Network-Based Firewall
Signup and view all the flashcards
Host-Based Firewall
Host-Based Firewall
Signup and view all the flashcards
Concentration of security
Concentration of security
Signup and view all the flashcards
Protocol filtering
Protocol filtering
Signup and view all the flashcards
Information hiding
Information hiding
Signup and view all the flashcards
Application gateway
Application gateway
Signup and view all the flashcards
Firewall disadvantages
Firewall disadvantages
Signup and view all the flashcards
Study Notes
Risk Management and Risk Control
- Project risk management and risk analysis tracks how risks are handled against the schedule and new risks.
- Risk management identifies events affecting project outputs, assigns qualitative and quantitative weights to their possibility and consequences, generates alternative execution paths, and implements a plan for each risk identified.
- Monitoring and control of risks require a risk management plan, risk register/tracker, and risk response plan.
Business Continuity Management (BCM)
- Business Continuity Plan (BCP) is a plan for business processes to continue during accidents or emergencies.
- Organizations analyze potential risks and prepare with a BCP to ensure effective handling of issues.
- BCP development includes identifying threats stopping regular business, evaluating critical activities for continuity, and listing executives and their contact details.
- Disaster Recovery Plan (DRP) outlines how a company restarts its operation immediately after an unplanned event.
Disaster Recovery Plan (DRP)
- DRP is a recorded method for restarting operations after an unplanned event.
- The objective is to help the organization handle data loss and restore functionality.
- DRP provides step-by-step procedures to minimize disruption and quickly resume critical functions.
- Disruptions include extreme weather events, illegal activities, civil unrest, terrorism, and organizational/program failures.
Assessing Maximum Tolerable Downtime (MTD)
- MTD is the time during which a process is inaccessible causing irreparable effects.
- MTD can be measured in hours, days, or longer, depending on the process.
- Stages include: Business as usual, Disaster, Recovery, and Resume Production.
- Recovery Point Objective (RPO) specifies average data loss over time.
- Recovery Time Objective (RTO) specifies the overall manageable time to get critical services back online.
Review and Test the Plan
- Regularly review and update BCP (Business Continuity Plan).
- BCP testing uses various methods (audit strategy, walk-through test, simulation test, full recovery test).
- Vendor involvement helps in precise, reliable, and valuable feedback for improvement.
- Document test outcomes and actionable conclusions.
Testing for Disaster Recovery Plan (DRP)
- DRP testing uses various techniques; there's no "one-size-fits-all" approach.
- Testing should occur at least once a year to assess recovery from disasters.
- Active participation by various stakeholders is important and functional.
- Logging and filing are important parts of recording test and drill results.
Backing up Data
- Data backup is as important as disaster preparedness.
- Backing up data enables recovery of lost data and is analogous to rewinding a computer.
- Identify and categorize needed files (system files, directories, operating system, installed programs, temporary files) for backup and manage backup frequency based on usage patterns (daily, real-time).
Where to Back Up Your Data
- Multiple backup media options depend on backup size, setup, complexity, portability, security, and budget.
- Various examples of media options like external hard drives, USB flash drives, Network Attached Storage (NAS), and Cloud backups are mentioned.
Different Backup and Recovery Types
- Backup types include full backups (copying all data), incremental backups (copying only altered data since the last backup), and differential backups (copying everything changed since last full backup).
Phases of Incident Response
- Incident responses typically have six phases: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.
Guidelines for Activation Based on Case Analysis
- DRP (Disaster Recovery Plan) activation depends on specific event types,
- Assessment criteria and decision-making processes must be clear.
- Effective communication of activation is crucial.
Recovery Alternatives
- Organizations need options if their location becomes inoperable.
- Recovery methods cover dedicated business locations (e.g. a backup data center, an alternative facility), commercially rented facilities (e.g. data centers for disaster recovery), and arrangements with internal or external facilities.
- Categorizing facilities by cost (hot site, warm site, cold site, multiple sites) is helpful;
Cybersecurity in Our Country
- Cybercrime Prevention Act 2012 (CPA) and the Access Devices Regulation Act of 1998 (ADRA) define cybercrime acts.
- The Electronic Commerce Act 2000 (ECA) allows recognition of electronic records and signatures in legal proceedings.
- The 2012 Data Privacy Act (DPA) manages and safeguards personal data.
Privacy
- Privacy is a key concern in 21st-century information security.
- The 2011 Data Privacy Act outlines data security and privacy rights for organizations operating in the country.
Identity Theft
- Identity theft is a serious crime involving the unauthorized acquisition and use of someone else's identity.
- It involves acquiring and using identifying information such as name, date of birth, citizenship, address of residence, contact number, and spouse's name etc
Intellectual Property
- Intellectual property (IP) encompasses intangible creations of the human mind, such as copyrights, trademarks, patents, and trade secrets.
- IP rights protect creators' ownership and control over their works and expressions.
Philippine Copyright Law
- Philippine copyright law (Republic Act No. 8293) is based on the United States copyright law system and protects trademarks, patents, and other intellectual property types.
Ethics and Information Security
- Ethical guidelines are important when using and managing technology.
- The text provides guidelines for ethical conduct and avoidance of harming others through use of technology.
- It emphasizes ethical considerations when pursuing projects and avoiding harm.
Pre-Test/Post-Test
- The pre- and post-tests cover topics like different types of access controls, biometric recognition, logical access control solutions, and authentication types.
- Different types of authentication like knowledge, ownership, characteristics, location, and action are also covered.
Cryptography
- Cryptology deals with secure communications by making messages inaccessible to unauthorized individuals.
- Cryptography creates confidentiality; cryptanalysis breaks those systems.
- Cryptography has military ties, and a key function of cryptology is converting letters to numbers, for example, in military codes.
- Plaintext is the original message and ciphertext is encrypted message.
- Cryptography uses various methods, such as monoalphabetic and polyalphabetic systems.
Network Security
- Network security is concerned with protecting all aspects, systems, and operations for a network.
- Network design strategies involve considering budgets, availability requirements, risk tolerance, scope and future growth for the system.
- Firewalls are important for protecting network systems, controlling who can access services, and maintaining secure communications;
- Firewalls can be host-based or network-based for separate applications.
- Authentication is important for a secure network.
Auditing, Testing and Monitoring
- Security audits assess a business's info system security; comparing it to a set of standards.
- Security audits also evaluate the protection of physical configurations, processing, and user practices.
- Security audit evaluations help determine the effectiveness of security controls.
- Auditing may also involve vulnerability evaluation via secret tests/attacks, to determine whether a system can handle malicious attacks.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.