Week 1 Flashcards

(14 cards)

1
Q

Mechanisms put in place to restrict access to confidential info (e.g. username/password)

A

Access Control or Authentication/Authorization

Access control refers to the policies and mechanisms that restrict access to information based on user identity and roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Separating data into categories based on sensitivity

A

Data classification

Data classification helps organizations manage and protect data according to its sensitivity level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Guidelines on data storage, sharing, transmission, disposal

A

Data Handling Policy

A data handling policy outlines how data should be managed throughout its lifecycle to ensure security and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transforming data into a secure and unreadable format using algorithms and keys

A

Encryption

Encryption is a critical process for protecting sensitive data from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who can access and what can be accessed

A

Access Control or A&A

A&A stands for Authentication and Authorization, which are essential for maintaining data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Techniques to ensure that data inputs are accurate, consistent, and conform to predefined rules

A

Data validation

Data validation prevents malicious data from entering the system by enforcing rules on data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data integrity can be verified using checksums or hashing algorithms. Any alteration of the data will result in a different checksum or hash, indicating a potential integrity breach

A

Cryptography

Cryptography provides mechanisms to verify data integrity and protect data from unauthorized alterations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data transmitted over networks should be encrypted and secured to prevent unauthorized modifications during transit. Data in Transit vs Data in Rest

A

Secure Communication

Secure communication practices help protect data while it is being transmitted across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To ensure data is preserved for the appropriate duration and securely destroyed when no longer needed

A

Data Retention Policies

Data retention policies define how long data should be kept and the methods for secure disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Version control systems track changes made to files and documents, allowing organizations to revert to previous versions if data integrity is compromised

A

Version Control

Version control is essential for maintaining the integrity of data and managing changes over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Distributes network traffic across multiple servers to prevent overloading any single server, ensuring that services remain available and responsive, even during high traffic periods

A

Load Balancing

Load balancing enhances availability and performance by distributing workloads evenly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To minimize single points of failure in their IT infrastructure. This involves duplicating critical components, such as servers, network connections, or power supplies, so that if one fails, another can take over seamlessly

A

Redundancy

Redundancy is a key strategy for ensuring system resilience and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ensure business continuity in case of catastrophic events or system failures. This includes offsite backups, data replication, and strategies for quickly restoring services

A

Failover/Disaster Recovery

Disaster recovery plans are crucial for maintaining operations after unexpected disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Establish ______ with service providers or cloud providers to ensure that critical services meet predefined availability standards.

A

Service Level Agreements (SLAs)

SLAs define the expected service levels and responsibilities of service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly