Chapter 11 Flashcards

1
Q

SOPs

A

Standard Operating Procedures is a document that provides step-by-step instructions on how to perform common tasks or routine operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AUP

A

Acceptable Use Policy is a policy defining proper system usage and the rules of behavior for employees

It often describes the purpose of computer systems and networks, how users can access them, and the responsibilities of users when accessing the systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mandatory Vacation

A

A policy that forces employees to take a vacation

The goal is to deter malicious activity, such as fraud and embezzlement, and detect malicious activity when it occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Separation of Duties

A

A security principle that prevents any single person or entity from controlling all the functions of a critical or sensitive process

It’s designed to prevent fraud, theft, and errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Job Rotation

A

A processes that ensures employees rotate through different jobs to learn the processes and procedures in each job

It can sometimes detect fraudulent activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clean Desk Policy

A

A security policy requiring employees to keep their areas organized and free of papers

The goal is to reduce threats of security incidents by protecting sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Background Check

A

A check into a person’s history, typically to determine eligibility for a job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NDA

A

Non-Disclosure agreement is an agreement that is designed to prohibit personnel from sharing proprietary data

It can be used with employees within the organization and with other organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exit Interview

A

An interview conducted with departing employees just before they leave an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Onboarding

A

The process of granting individuals access to an organization’s computing resources after being hired

It typically includes giving the employee a user account with appropriate permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISA

A

Interconnection security agreement is an agreement that specifies technical an security requirements for connections between two or more entities

Compare with MOU/MOA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SLA

A

A service Level Agreement is an agreement between a company and a vendor that stipulates performance expectation, such as minimum uptime and maximum downtime levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MOU/MOA

A

Memorandum of understanding or memorandum of agreement is a type of agreement that defines responsibilities of each party

Compare with ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BPA

A

Business partners agreement is a written agreement that details the relationship between business partners, including their obligations toward the partnership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public Data

A

Data that is available to anyone

It might be in brochures , in press releases, or on the web sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidential Data

A

Data meant to be kept secret among a certain group of people

As an example, salary data is meant to be kept secret and not shared with everyone within a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Proprietary Data

A

Data that is related to ownership

Common examples are information related to patents or trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Private Data

A

Information about an individual that should remain private

Personally Identifiable Information (PII) and Personal Health Information (PHI) are two examples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Labeling

A

The process of ensuring data is tagged clearly so that users know its classification

Labels can be physical labels, such as on backup tapes, or digital labels embedded in files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Purging

A

A general sanitization term indication that all sensitive data has been removed from a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

File Shredding

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Wiping

A

The process of completely removing all remnants of data on a disk

A bit-level overwrite writes patterns of 1s and 0s multiple times to ensure data on a disk is unreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Erasing and Overwriting

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Burning

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Paper Shredding
Filler
26
pulping
A process that is performed after shredding papers It reduces the shredded paper to a mash or puree
27
Degaussing
The process of removing data from magnetic media using a ery powerful electronic magnet Degaussing is sometimes used to remove data from a backup tapes or to destroy hard disks
28
Pulverizing
A process used to physically destroy items such as optical discs that aren't erased by a degausser
29
Data Retention Policy
A security policy specifying how long data should be kept (retained)
30
PII
Personally Identifiable Information is information about individuals that can be used to trace a person;s identity, such as a full name, birth date, bio metric data, and more
31
PHI
Personal Health Information PII that includes health information
32
HIPAA
Filler
33
GLBA
Filler
34
SOX
Filler
35
GDPR
Filler
36
Owner
Filler
37
Steward/Custodian
Filler
38
Privacy Officer
Filler
39
Incident Response
The process of responding to a security incident Organizations often create an incident response plan that outlines the procedures to be used when responding to an incident
40
Security Incident
An adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization's information technology (IT) systems and data
41
IRP
Incident Response Plan are the procedures documented in an incident response policy
42
Definitions of Incident Types
Filler
43
Cyber-Incident Response Teams
A group of experts who respond to security incidents Also known as CIRT
44
Roles and Responsibilities
Filler
45
Escalation
Filler
46
Reporting Requirements
Filler
47
Exercises
Filler
48
Preparation
Filler
49
Identification
Filler
50
Containment
Filler
51
Eradication
Filler
52
Recovery
Filler
53
Lessons Learned
Filler
54
Order of Volatility
A term that refers to the order in which you should collect evidence For example, data in memory is more volatile than data on a disk drive, so it should be collected first
55
Record Time Offset
An offset used by recorders to identify times on recordings If you know when the recording started, you can use the offest to identify the actual time at any point in the recording
56
Chain of Custody
A process that provides assurances that evidence has been controlled and handled properly after collection Forensic experts establish a chain of custody when they first collect evidence
57
Legal Hold
A court order to maintain data for evidence
58
Data Owner
Filler
59
System Administrator
Filler
60
System Owner
Filler
61
User
Filler
62
Privileged User
Filler
63
Executive User
Filler
64
Incident Response Team
Filler