19B: Administrative and Operational Controls Flashcards
4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report.
The security approach to restricting availability of a resource to authorized users only.
Role Based Access Control
The processes of planning, analysis, design, implementation, and maintenance that often govern software and systems development.
software development lifecycle (SDLC)
A dynamic code analysis technique that involves sending a running application random and unusual input so as to evaluate how the app responds.
fuzzing
The process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.
mobile device management (MDM)
The policy of preventing any one individual performing the same role or tasks for too long. This deters fraud and provides better oversight of the person’s duties.
job rotation
Policies or configuration settings that limit a user’s access to resources.
time of day restrictions