Domain 2 Flashcards
(254 cards)
What captures the relationships between physical and logical assets
Diagrams
are the minimum level of security required for the system or application
Baseline Configuration
reduce error and provides a clear communication standard
Standard Naming Conventions
Advanced planning is needed to apply deviations from an organization’s IP addressing schema
Internet protocol (IP) schema
refers to regulations pertaining to data being stored in other countries
Data sovereignty
What is the practice of enacting security controls that protect the CIA (Confidentiality, Integrity, Availability) of data
Data Protection
What is the systems way to prevent unwanted sensitive data from leaving the organization’s network
Data loss prevention (DLP
The act of hiding data by redacting all or parts of its content to preserve its confidentiality
Masking
Data, whether at rest, in motion, or in processing requires encryption
Data At rest/ In transit/motion/ In processing
is the process of replacing data fields with random values
Tokenization
What refers to the practice of protecting the rights of users over digital objects
Rights management
The lack of physical borders in the online world makes rights management difficult to govern
Geographical considerations
Policies such as a BCP (Business Continuity Plan) or DRP (Disaster Recovery Plan) that are created to promote business resiliency
Response and recovery controls
A security feature that prevents attackers from bypassing security through encrypted channels
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) inspection
A mathematical function that creates a fixed-length output from a variable-length input, used to verify the integrity of data
Hashing
Security controls should be in place to authenticate users and not allow for unwanted access
API Considerations
is an alternative site that has little to no backups of the original site’s data and is fully operational within weeks
Cold Site
is an alternative site that has full backups of the original site’s data and is fully operational within minutes to a few hours
Hot site
is an alternative site that partial backups of the original site’s data and is fully operational within a few days
Warm site
are computer systems with fake data that is designed to attract hackers
Honeypots
are computer files that are designed resemble legitimate files but contain fake data
Honeyfiles
A network designed as a decoy to attract hackers
Honeynets
refers to fake network traffic that is designed to mimic real network communication
Fake Telemtry
occurs when a user is redirected to a malicious or wrong URL
DNS Sinkhole