2.1 Explain the importance of security concepts in an enterprise environment Flashcards
What is Configuration management in enterprise security?
Configuration management in enterprise security refers to the process of establishing and maintaining consistency of performance, functional, and physical attributes of systems, networks, or devices through controls, policies, and procedures to mitigate risks and ensure compliance.
What term describes the process of maintaining consistency of system attributes for security and compliance?
Configuration management
What are Diagrams in enterprise security?
Diagrams in enterprise security refer to visual representations or blueprints that illustrate the architecture, design, components, and relationships of systems, networks, or infrastructure, aiding in understanding, communication, planning, and documentation of security controls and configurations.
What term describes visual representations illustrating the architecture and components of systems or networks?
Diagrams
What is Baseline configuration in enterprise security?
Baseline configuration in enterprise security refers to the standard or predefined settings, configurations, or states established for systems, networks, or applications as a reference point for security, performance, or compliance, serving as a foundation for monitoring, comparison, and deviation detection.
What term describes the standard settings established as a reference point for system configurations?
Baseline configuration
What are Standard naming conventions in enterprise security?
Standard naming conventions in enterprise security refer to established guidelines or rules for naming systems, files, users, or resources consistently and informatively, facilitating organization, management, and identification of assets, data, or entities within an environment.
What term describes established guidelines for naming resources consistently within an organization?
Standard naming conventions
What is Internet protocol (IP) schema in enterprise security?
Internet protocol (IP) schema in enterprise security refers to the logical addressing structure and allocation of IP addresses within a network, defining the range, subnetting, hierarchy, or assignment methods to ensure efficient routing, communication, and management of network traffic and devices.
What term describes the logical addressing structure and allocation of IP addresses within a network?
Internet protocol (IP) schema
What is Data sovereignty in enterprise security?
Data sovereignty in enterprise security refers to the concept and legal framework that determines the jurisdiction, ownership, control, and regulatory compliance requirements governing the storage, processing, or movement of data across geographical boundaries or regions.
What term describes the concept determining the jurisdiction and regulatory requirements for data storage and processing?
Data sovereignty
What is Data protection in enterprise security?
Data protection in enterprise security refers to the implementation of controls, technologies, and policies to safeguard sensitive or confidential information from unauthorized access, disclosure, alteration, or destruction, ensuring confidentiality, integrity, and availability of data assets.
What term describes the implementation of controls to safeguard sensitive information from unauthorized access?
Data protection
What is Data loss prevention (DLP) in enterprise security?
Data loss prevention (DLP) in enterprise security refers to the strategy, technologies, and processes designed to prevent, detect, and mitigate the unauthorized or inadvertent leakage, exfiltration, or exposure of sensitive data from within an organization, whether at rest, in transit, or in use.
What term describes the strategy and technologies used to prevent unauthorized leakage of sensitive data?
Data loss prevention (DLP)
What is Masking in enterprise security?
Masking in enterprise security refers to the technique of concealing or obfuscating sensitive or confidential data by replacing or obscuring certain characters or portions of the information, preserving its format and usability while preventing unauthorized access or disclosure.
What term describes the technique of concealing sensitive information by replacing or obscuring certain characters?
Masking
What is Encryption at rest in an enterprise environment?
Encryption at rest in an enterprise environment refers to the encryption of data while it is stored or persisted in databases, filesystems, or storage devices, ensuring that even if the storage media is compromised, the data remains unreadable and protected from unauthorized access.
What term describes the encryption of data while it is stored in databases or storage devices?
Encryption at rest
What is Encryption in transit/motion in an enterprise environment?
Encryption in transit/motion in an enterprise environment refers to the encryption of data while it is being transmitted or communicated over networks or channels, protecting it from interception, eavesdropping, or tampering during transportation between endpoints.
What term describes the encryption of data during transmission over networks or channels?
Encryption in transit/motion