2.1 Flashcards
Explain the importance of security concepts in an enterprise environment.
Refers to the process of systematically managing and controlling the settings, configurations, and changes to hardware, software, and network components within an IT environment.
Configuration management
Are commonly used in architectural specifications to communicate how the enterprise is configured.
Diagrams
A predetermined set of secure and standardized settings for hardware, software, and network components within an IT system.
Baseline configuration
Are established, consistent rules for naming files, devices, accounts, or other elements within an IT system.
Standard naming conventions
32-bit numbers divided into 4 sets of 8 bits. xxx.xxx.xxx.xxx, where x is between 0 and 255.
Internet protocol (IP) schema
Is the concept that data is subject to the laws and regulations of the country in which it is located.
Data sovereignty
The set of policies, procedures, tools, and architectures used to ensure proper control over the date in an enterprise.
Data protection
Serve to prevent sensitive data from leaving the network without notice.
Data loss prevention (DLP)
Involves the hiding of data by substituting altered values.
Masking
Is the use of sophisticated mathematical techniques to prevent persons with unauthorized access to data from actually reading the data.
Encryption
Data that is stored.
Data At rest
Data being moved from one system to another.
Data In transit/motion
Data that is actively being used, either in a processor or other computational element.
Data In processing
Is the use of a random value to take the place of a data element that has traceable meaning. A good example of this is the credit card approval process.
Tokenization
The systematic establishment of rules and order to the various rights that users can invoke over digital object. For example, at the file level, here is read, write, etc.
Rights management