Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

D320 (C838) Laws, Regulations, and Organizations Rated A+

Beoordeling
-
Verkocht
-
Pagina's
11
Cijfer
A+
Geüpload op
16-09-2023
Geschreven in
2023/2024

D320 (C838) Laws, Regulations, and Organizations Rated A+

Instelling
Vak

Voorbeeld van de inhoud

D320 (C838) Laws, Regulations, and Organizations Rated A+

1. (ISC)2 - International Information System Security Certification Consor-
tium: A security certification granting organization that has a long history of cer-
tifications that were difficult to get. This difficulty has made their certificates seen
as having higher value in the industry.
2. (ISC)2 Cloud Secure Data Life Cycle: Based on CSA Guidance. 1. Create; 2.
Store; 3. Use; 4. Share; 5. Archive; 6. Destroy.
3. (SAS) 70: was a recognized standard of the American Institute of Cer-
tified Public Accountants (AICPA) in response to the issues that also lead to
Sarbanes-Oxley (SOX). Deprecated in 2011 by the Statement on Standards for
Attestation Engagements (SSAE) No. 16.
4. AICPA: established SAS 70 and later SAAE 16.
5. AICPA: American Institute of Certified Public Accountants
6. Organizational Normative Framework (ONF): Concepts of ISO 27034. There
is only one for an organization but potentially as many ANF's as applications.
7. ASHRAE - American Society of Heating, Refrigerating and Air-Condition-
ing Engineers: a professional association seeking to advance heating, ventilation,
air conditioning and refrigeration systems design and construction.
8. Biba: an access control model designed to preserve data integrity. It has 3 goals.
Maintain internal and external consistency; prevent unauthorized data modification
even by authorized parties; prevent data modification by unauthorized individuals.
9. Capability Maturity Model (CMM): a development model where the maturity
relates to the formality and optimization of processes. When applied to cloud
security it would focus on those aspects as they relate to cloud security.
10. Child Online Protection Act (COPA): An attempt to restrict access by minors
to material defined as harmful to minors. A permanent injunction against the law
in 2009.
11. Cloud Access Security Brokers (CASBs): monitors network activity between
users and cloud applications and enforces security policy and blocking malware.
12. Cloud Security Alliance (CSA): publishes the Notorious Nine: 1) Data breach-
es; 2) Data Loss; 3) Account service traffic hijacking; 4) Insecure Interfaces and
APIs; 5) Denial of Service; 6) Malicious Insiders; 7) Abuse of Cloud Services; 8)
Insufficient Due Diligence; 9) Shared technology Vulnerabilities. There are also
implications and controls associated with each.
13. CSA STAR - Cloud Security Alliance (CSA) Security, Trust, and Assurance
Registry (STAR): uses the Consensus Assessments Initiative Question-


, D320 (C838) Laws, Regulations, and Organizations Rated A+

naire (CAIQ), Cloud Controls Matrix (CCM), and GDPR Self-Assessment as inputs
to certify an organization to Level 1.

Level 2 integrates the CSA Cloud Controls Matrix and the AICPA Trust Service
Principles - AT 101 for STAR attestation.

STAR Certification for level to uses the CSA Cloud Controls Matrix and the
requirements of the ISO/IEC 27001:2013 management system standard together
with the CSA Cloud Controls Matrix.

Certification certificates follow normal ISO/IEC 27001 protocol for a 3rd party
assessment.
14. Cloud Security Alliance Cloud Controls Matrix (CSA CCM): Composed of
17 domains covering key elements of cloud. It contains 170 objectives within the
domains. They integrate with the STAR program.
15. COBIT or Control Objectives for Information and Related Technologies: a
framework for IT governance and management. Initially used to achieve compli-
ance with Sarbanes-Oxley and focused on IT controls. Since 2019 the emphasis
has shifted to information governance. It is focused on these 5 principles: 1:
Meeting Stakeholder Needs; 2: Covering the Enterprise End-to-End; 3: Applying
a Single Integrated Framework; 4: Enabling a Holistic Approach; and 5: Separating
Governance from Management.
16. Common Criteria and the EAL: is assigned to an IT product after it has been
evaluated by an independent lab. The level indicates the degree and type of testing
with 1 the least and 7 the most. contains 60 functional requirements in 11
classes and is an accepted standard among the military organizations of the US
and many allies.
17. Consensus Assessments Initiative Questionnaire (CAIQ): an initiative of
the Cloud Security Alliance to provide an industry-accepted documentation of
security controls and as of 2020 is combined with the Cloud Controls Matrix.
They can be used as evidence for entry to the CSA STAR registry.
18. Digital Millennium Copyright Act (DMCA): controversial act intended to align
the US copyright act with the requirements of treaties and the World Intellectual
Property Organization.
19. DLP (Data Loss Prevention): is ensured by a set of tools, procedures, and
policy to ensure sensitive, proprietary, and PII is not lost or misused. It helps to

Geschreven voor

Vak

Documentinformatie

Geüpload op
16 september 2023
Aantal pagina's
11
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$7.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Scores Massachusetts Institute Of Technology
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
97
Lid sinds
2 jaar
Aantal volgers
33
Documenten
1477
Laatst verkocht
3 weken geleden
Proscores

Here you\'ll find quality best latest up to date revised study materials i.e NOTES,STUDY GUIDE,CASE STUDY,PRESENTATIONS,ESSAYS DOCUMENTS,BUNDLES & FLASHCARD

4.2

26 beoordelingen

5
16
4
3
3
5
2
0
1
2

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen