Domain 2 Flashcards

1
Q

Accountability

A

Accountability ensures that account management has assurance that only authorized users are accessing the system and using it properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset

A

Anything of value that is owned by an organization. Assets include both tangible items such as information systems and physical property and intangible assets such as intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset Lifecycle

A

The phases that an asset goes through from creation (collection) to destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baseline

A

A documented, lowest level of security configuration allowed by a standard or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Categorization

A

The process of grouping sets of data, information or knowledge that have comparable sensitivities (impact or loss ratings), and have similar security needs mandated by law, contracts or other compliance regimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Classification

A

The process of recognizing the impacts to the organization if its information suffers any security compromise—to its confidentiality-, integrity-, availability-, non-repudiation-, authenticity-, privacy- or safety-related characteristics. Classifications are derived from the compliance mandates the organization must operate within, whether these be law, regulation, contract-specified standards or other business expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Clearing

A

The removal of sensitive data from storage devices in such a way that there is assurance the data may not be reconstructed using normal system functions or software recovery utilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Custodian, Custodian

A

The individual who manages permissions and access on a day-to-day basis based on instructions from the data owner. Responsible for protecting an asset that has value, while in the custodian’s possession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defensible Destruction

A

Eliminating data using a controlled, legally defensible and regulatory compliant way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Inventory

A

Complete list of items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Purging

A

The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Qualitative

A

Measuring something without using numbers, using adjectives, scales or grades.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quantitative

A

Using numbers to measure something, usually monetary values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Recovery

A

The process of jointly addressing business resiliency and restoration of critical infrastructure and functionality after a disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Responsibility

A

Obligation for doing something. Can be delegated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Scoping

A

Limiting the general baseline recommendations by removing those that do not apply.

17
Q

Tailoring

A

The process by which a security control baseline is modified based on (i) the application of scoping guidance, (ii) the specification of compensating security controls, if needed and (iii) the specification of organization-defined parameters in the security controls via explicit assignment and selection statements.