2.1 Explain the importance of security concepts in an enterprise environment Flashcards
Configuration management
-Baseline configuration
Configuration management
-Diagrams
Configuration management
-Standard naming conventions
Configuration management
-Internet protocol (IP) schema
Data sovereignty
Data protection
-Data loss prevention (DLP)
Data protection
-Masking
Data protection
-Encryption
Data protection
-At rest
Data protection
-In transit/motion
Data protection
-In processing
Data protection
-Tokenization
Data protection
-Rights management
Geographical considerations
Response and recovery controls
Secure sockets layer (SSL)/Transport layer security (TLS) inspection
Hashing
API considerations
Site resiliency
-Hot site resiliency
Site resiliency
-Cold site resiliency
Site resiliency
-Warm site resiliency
Deception and disruption
-Honeypots
Deception and disruption
-Honeyfiles
Deception and disruption
-Honeynets
Deception and disruption
-Fake telemetry