Chapter 11 Flashcards

(35 cards)

1
Q

Transitioning

A

with a business partner occurs either during the on-boarding or off boarding of a business partner
397

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SLA

A

Service Level Agreement

Determines response time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BPO

A

Blanket Purchase Order

Agreement between a gov agency and private company for ongoing purchases of goods and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Awareness

A

Organizations both communicating with each other to share information regarding risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MOU

A

Memorandum of Understanding

Document is used in many settings in the information industry. It is a brief summary of which party is responsible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISA

A

Interconnection Security Agreement

Agreement between two organizations that have connected systems in regards to technical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Organization training

A
Importance of Security
Responsibilities of people in the organization
Policies and proceedures
Usage policies
Account and password selection criteria
Social engineering prevention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Management training

A

global issues in the organization including enforcing security policies and proceedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Technical staff training

A

needs special knowledge about the methods implimentations and capabilities of the systems used to manage security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Safety concerns

A
Fencing
Lighting
Locks
CCTV
Escape Plans
Drills
Escape rooms
Testing controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Clean desk policy

A

Information on the desk: printouts, pads of paper, sticky notes can be seen by prying eyes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compliance with laws, best practices and standards

A

Users need to realize that working with data is the same as driving a car: there are best practices and standards of which you must adhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Handling

A

Only users needing to work with it should have access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Policy on Personal Devices

A

Don’t let people bring their personal devices into secure places because they’re dumbasses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tailgating

A

Following someone into a secure environment after they open it up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Safe internet habits

A

Users need to be familiar enough with phishing to not give away information or download malware

17
Q

Types of Information that your organization keeps

A

Public use
internal use
restricted use

18
Q

Public information

A

information available to the larger public including financial statements

19
Q

Limited distribution

A

Information that isn’t intended for release to the public. This isn’t secret but it’s private. Line of credit. If disclosed to competitors it would suck

20
Q

Full Distribution

A

Marketing materials and the such that is available for general public

21
Q

Private Information

A

Intended only for internal use in the company. Could potential embarrass the company. Work documents and work products

22
Q

Internal Information

A

includes personnel records, financial working documents, ledgers, customer lists, and virtually any other information that is needed to run a business

23
Q

Restricted information

A

can seriously damage an organization: trade secrets, strategic information, marketing plans. Need to know basis

24
Q

Government classifications for information

A
Unclassified
Sensitive but unclassified
Confidential
Secret
Top Secret
25
Integrity
ensuring that data has not been altered. Hashing message authentication codes are the most common methods to accomplish this
26
Availability
Simply making sure that the data and systems are available for authorized users. Data backups, redundant systems, and disaster recovery plans.
27
HIPAA
Health Insurance Portability and Accountability Regulation that mandates national standards and proceedures for storage, use, and transmission of personal medical information
28
Gramm-Leach-Bliley Act
Financial Modernization Act of 1999 Requires financial institutions to develop privacy notices and to notify customers that they are entitled to privacy
29
CFAA
Computer Fraud and Abuse Act Gives feds the ability to prosecute hackers spammers and others as terrorists
30
FERPA
Family Education Rights and Privacy Act Educational institutions may not release info to unauthorized parties without express permission of the student/parents
31
Computer Security Act
Requires federal agencies to identify and protect computer systems that contain sensitive information
32
CESA
Cyberspace Electronic Security Act Gives law enforcement the right to gain access to encryption keys and cryptography methods
33
Remote Wipe
Sending a signal to a mobile device to clear information
34
Device Access Control
Controlling who in the organization has access to a mobile device
35
NDA
Something beta testers are required to sign. Hint Willy Wonka