Class one Flashcards

1
Q

DLP

A

Data Loss Prevention - ways to stop information from being taken out of an organization without appropriate authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PHI

A

Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PCI

A

Payment Card Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GRC

A

Governance, Risk, Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AAA

A

Authentication, Authorization, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Control

A

AKA countermeasures. Method of regulating something - often a process or behavior - to achieve a desired outcome which usually reduces risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network segmentation

A

divide network into security domains for each type of user to access. Eg: someone outside of the company should have a restricted access type security domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unethical use of data

A

use that was not stated as the reason it was gathered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Sprawl

A

enterprise data ends up in a ton of different repos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data lifecycle

A

How long to hold onto it? When to destroy it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CDV

A

Corporate Data and Value - intellectual property (IP), PII, PHI, PCI, algorithms, IoT sensor data, recordings and transcripts of virtual meetings, secrets like API keys in code repositories, AI models and their outputs, and business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP

A

Intellectual property - trade secrets, source code, designs, and other forms of sensitive corporate data like financial reports prior to public release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Actors

A

collection of people and organizations that work to create cyber attacks. Cybercriminals, hacktivists, nation states, for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incident response

A

prepared set of responses triggered when known or suspected event takes place that could cause material damage to an organization. 1) verify event is real and identify affected areas, 2) contain the problem, 3) understand and eradicate root cause, 4) restore affected components to fixed state, 5) review how it went to identify improvements. Possibly trigger breach notification procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Breach notification procedure

A

must report to authorities within a time period for specific types of info being stolen or lost. Notify those affected and provide root cause analysis as well.