Chapter 11: Implementing Policies to Mitigate Risks Flashcards
(109 cards)
What is Change Management?
A structured process for making and documenting changes to systems or data to reduce disruption and maintain security and compliance.
When it comes to Change Management, the following should be considered:
Having a formal approval process, defining Ownership/Responsibility, Stakeholder Analysis, Impact Analysis, Testing, A Backup Plan, and a Maintenance Window(s).
What is Documentation?
Records that detail system configurations, processes, policies, and changes to ensure transparency and aid in troubleshooting or audits.
What is Version Control?
A system that tracks changes to files and code, allowing you to revert to previous versions and collaborate safely.
What is Regulated Data?
Data protected by laws or standards due to its sensitive nature, requiring specific security and privacy controls.
What is Financial Information?
Sensitive data related to banking, transactions, taxes, or payroll that must be protected from fraud and unauthorized access.
What is Intellectual Property (IP)?
Creations of the mind that need protection from theft or unauthorized use.
What are Trade Secrets?
Proprietary business knowledge or processes that provide a competitive edge and must be kept confidential.
What is Legal Information?
Data related to legal matters that must be securely stored and accessed by authorized users only.
What are a Data Classification Systems?
A method to categorize data by sensitivity (e.g. public, internal, confidential, secret) to apply appropriate protections.
What is Sensitive Data?
Any data that must be protected due to potential harm if exposed, such as personal info, health records, or login credentials.
What are Permission Restrictions?
Limits placed on data access based on user roles or need-to-know principles to prevent unauthorized usage.
What are Geographic Restrictions?
Rules that limit access or storage of data to specific regions or countries, often for legal or compliance reasons.
What are Data Retention Policies?
Guidelines for how long data must be stored before being archived or securely deleted, often based on legal or business needs.
What is Data Sanitization?
The secure removal of data from devices or systems to prevent recovery, using methods like wiping, degaussing, or physical destruction.
What is Erasing and Overwriting?
Removing data by writing new data over it multiple time to prevent recovery, commonly used for hard drives.
What is File Shredding?
A software method that deleted files and then overwrites their storage locations to make unrecoverable.
What is Wiping?
The process of securely erasing an entire storage device by overwriting all sectors with random data.
What is Paper Shredding?
Physically cutting paper documents into fine strips or confetti to prevent data theft from discarded documents.
What is Burning?
Destroying paper documents by incineration to ensure the information cannot be reconstructed.
What is Pulping?
Mixing shredded paper with water and chemical to turn it into a slurry, making it impossible to reconstruct.
What is Pulverizing?
Physically smashing a storage device into pieces so it can no longer function or have data recovered.
What is Degaussing?
Using a strong magnetic field to erase data from magnetic storage devices by disrupting their magnetic domains.
What are Third-Party Solutions (to data sanitization)?
Professional services that specialize in secure data destruction through physical or digital means.