SY0-701: 4.0 (Security Operations) Flashcards
(278 cards)
DLP (4.4)
Data Loss Prevention- Set up to monitor the data of a system while it’s in use, in transit, or at rest in order to detect any attempts to steal the data (hardware or software)
Endpoint DLP Systems (4.4)
a piece of software that’s installed on a workstation or a laptop that monitors the data that’s in use on that computer
Network DLP System (4.4)
A piece of software or hardware placed at the perimeter of the network to detect data in transit
Storage DLP System (4.4)
Software installed on a server which inspects the data while it’s at rest
Cloud-Based DLP System (4.4)
Usually offered as Software as a Service (SaaS) and it’s part of the cloud service and storage system
Acquisition / Procurement (4.2)
Acquisition- Process of obtaining goods or services
Procurement- Encompasses the full process of acquiring goods and services, including all preceding steps
BYOD (4.1)
Bring Your Own Device- Permits employees to use personal devices for work
-Employees have control over device security
COPE (4.1)
Corporate-Owned, Personally Enabled- Involves the company providing a mobile device to employees for both work and personal use
CYOD (4.1)
Choose Your Own Device- Offers a middle ground between BYOD and COPE by allowing employees to choose devices from a company-approved list
Asset Management (4.2)
Refers to the systematic approach to governing and maximizing the value of items an entity is responsible for throughout their lifecycle
Assignment / Allocation of Assets (4.2)
Every organization should designate individuals or groups as owners of the assets
Asset Classification (4.2)
Involves categorizing assets based on criteria like function, value, or other relevant parameters as determined by the organization
Asset Monitoring (4.2)
Maintaining an inventory/record of every asset including specifications, location, assigned users, and other relevant details
Asset Tracking (4.2)
Takes asset monitoring a bit further; Involves maintaining a comprehensive inventory with asset specifications, locations, and assigned users, along with its condition and status using specialized software
Asset Enumeration (4.2)
Involves identifying and counting assets, especially in large organizations or during times of asset procurement or retirement
MDM (4.2)
Mobile Device Management- Lets organizations securely oversee employee devices, ensuring policy enforcement, software consistency, and data protection
Special Publication 800-88 (4.2)
Guidelines for media sanitization- Guidance on media sanitization, destruction, and certification
Media Sanitization (4.2)
Thorough process of making data inaccessible and irretrievable from a storage medium using traditional forensic methods
-Overwriting data
-Degaussing
-Encryption Techniques
CE (Media Sanitization) (4.2)
Cryptographic Erase- Faster than deleting data because the cryptographic keys are what gets erased
Media Destruction (4.2)
Ensures the physical device itself is beyond recovery or reuse
-Shredding
-Pulverizing
-Melting
-Incinerating
Certification (Media Sanitization) (4.2)
An act of proof that the data or hardware has been securely disposed of
Port (4.5)
Logical communication endpoint that exists on a computer or server
Inbound Port (4.5)
Logical communication opening on a server that is listening for a connection from a client
Outbound Port (4.5)
Logical communication opening created on a client in order to call out to a server that is listening for a connection