Chapter 4 Key Concepts and Terms Flashcards Preview

Fundamentals of Information Systems Security > Chapter 4 Key Concepts and Terms > Flashcards

Flashcards in Chapter 4 Key Concepts and Terms Deck (21)
Loading flashcards...
1

PMBOK

Project Management Body of Knowledge

2

PMI

Project Management Institute

3

risk methodology

a description of how you will manage risk

4

Recovery point objective (RPO)

the maximum amount of
data loss that is acceptable

5

Recovery time objective (RTO)

the maximum allowable time
to recover the function

6

Business recovery requirement

identify any other business
functions that must already be in place for the specified recovery function to occur

7

Technical recovery requirements

the technical
prerequisites that are needed to support each critical business function.

8

business continuity plan (BCP)

a written plan for a structured response to any events
that result in an interruption to critical business activities or functions.

9

disaster recovery plan (DRP)

the actions necessary to recover resources after a di
saster

10

threat analysis

identifying and documenting threats to critical resources.

11

security gap

The difference between the security controls
you have in place and the controls you need in order to address all vulnerabilities

12

security policy

a risk-mitigating
definition or solution for your organization

13

gap analysis

a comparison of the security controls you have in place and the controls you need in order to address all identified
threat

14

Gramm-Leach-Bliley Act (GLBA)

GLBA addresses information security concerns in the
financial industry

15

The Family Education Rights and Privacy Act (FERPA)

This federal law protects
the privacy of student education records

16

The USA Patriot Act of 2001

expanded the authority of U.S. law enforcement agencies to enable them to fight terrorism in the United States and abroad

17

Children's Online Privacy Protection Act of 1998 (COPPA)

restricts how online information is collected from children under 13 years of age.

18

privacy policy

what an organization does with the data it collects about you and why it collects those data

19

accounting

recording events in log files.

20

Mobility

allows remote workers and employees
to be connected to the IT infrastructure in almost real-time.

21

mobile device management (MDM)

a software application that allows organizations to monitor, control,
data wipe, or data delete business data from a personally owned device)