Asset Security Flashcards Preview

Game Changer > Asset Security > Flashcards

Flashcards in Asset Security Deck (21):
1

The residual physical representation of data that has been in some way erased.

Data Remanence

2

Official series of publications relating to standards & guidelines adopted

Federal Information Processing Standards (FIPS)

3

Allows greater flexibility in applying encryption to specific file(s).

File Encryption Software

4

Broader discipline, adding several dimensions of management & involving a much broader base of stakeholders

IT Asset Management (ITAM)

5

Methodology that identifies the path to meet user requirements.

Data Modeling

6

Software that is used to encrypt otherwise unprotected storage media such as CD's, DVDs, USB drives, or laptop hard drives.

Media Encryption Software

7

Portable USB drives that embed encryption algorithms within the hard drive, thus eliminating the need to install any encryption software.

Self-Encrypting USB Drives

8

An assessment of quality based on internal standards, processes, & procedures established to control & monitor quality.

Quality Control (QC)

9

Assessment of quality based on standards external to the process involves reviewing of the activities & quality control processes to ensure final products meet predetermined standards of quality.

Quality Assurance (QA)

10

Removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique.

Purging

11

The U.S. Gov repository of publicly known available security checklists (or benchmarks) that provide detailed low level guidance on setting the security configuration of operating systems & applications.

National Checklist Program

12

Process of determining the impact of the loss of confidentiality, integrity, or availability of the information to an organization.

Categorization

13

Entails analyzing the data that the organization retains, determining its importance & value, & then assigning it to a category.

Data Classification

14

Ensures the important datasets are developed, maintained, & accessible within their defined specifications.

Data Custodians

15

Objects, features, or items that are collected, automated, or affected by activities or the functions of organizations.

Data Standards

16

Set of CyberSecurity activities, desired outcomes, & applicable references that are common across critical infrastructure sectors.

Framework Core

17

Provide context on how an organization views cybersecurity risk & the processes in place to manage that risk.

Framework Implementation Tiers

18

Represents the outcomes based on business needs that an organization has selected from the Framework Categories & Sub-Categories.

Framework Profile

19

Focuses on providing measurements & standards to protect information systems against threats to the confidentiality of information, integrity of information and processes, & availability of information & services in order to build trust & confidence

NIST Computer Security Division

20

The removal of sensitive data from storage devices in such a way that there is assurance that the data may not be reconstructed using normal system functions or software file/data recovery utilities.

Clearing

21

Critical Point where a material's intrinsic magnetic alignment changes direction.

Curie Temperature