Security Operations Flashcards

CC Domain 5 Security Operations topics

1
Q

Data Security

A

set of practices aimed at protecting information important to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Lifecycle

A

refers to the series of changes data goes through in an organization and how the organization handles the data during each phase of its life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Create

A

when the data comes to exist within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Store, Use, and Share

A

Data that is created and classified is placed into production, where it is
stored, used, and shared based on the organization’s security policies and
procedures and the appropriate security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Archive

A

When data is no longer needed in the production environment but needs to
be kept for future use (or due to legal requirements), it may need to be
archived.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Destroy

A

data is no longer needed, the primary requirement is ensuring that
sensitive data cannot be recovered from the media it was stored on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password Salting

A

passwords are often hashed when they are stored so that if a hacker were able to breach the system and access the password database, they only have access to the hashed password value (versus the plaintext password).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric encryption

A

uses the same key for encryption and decryption. The sender and receiver of a message need to both have a copy of the same key in order to encrypt/decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric Encryption

A

uses two keys that are mathematically related: a public key and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logging and Monitoring

A

Logging is the capturing and storing of events that occur for later analysis.

Monitoring is the examination of events and other activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logs

A

files that store information about various events that occur on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System Hardening

A

practice of making these devices harder to attack by reducing the entry points an attacker can potentially use to compromise a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Change Management Policy

A

ensures IT resources are inventoried, configured, and documented in a consistent and repeatable manner. policy defines the requirements necessary to ensure that device configurations and documentation are maintained and modified using a consistent repeatable process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Handling Policy

A

set of rules for employees to follow when working with data.
classification and labels…sometimes called a data protection policy or
data classification and handling policy. It tends to be a broad policy that defines the requirements for how the organization manages and protects data throughout the data lifecycle from inception to destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password Policy

A

defines the requirements for password size and format, usage, and protection. The policy usually covers requirements for password
creation, changes to passwords, practices for protecting passwords such as secure storage and transmission, and use of passwords in applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Acceptable Use Policy (AUP)

A

define how IT resources can and should be used by any and all types of users. The policy defines both acceptable and unacceptable
usage of IT resources. Typically, the AUP requires that IT resources are only used for official business purposes and not for personal use or for purposes not directly related to the official business of the organization.

17
Q

Bring Your Own Device (BYOD) Policy

A

policy is used by organizations that want to allow their employees to use their personally owned devices such as laptops or smartphones for official business purposes.

18
Q

Privacy Policy

A

It addresses the organization’s requirements for protecting privacy and privacy data. However, another kind of privacy policy is one that organizations publish on their website that tells visitors how the organization protects their privacy