Asset Security Flashcards

1
Q

The residual physical representation of data that has been in some way erased.

A

Data Remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Official series of publications relating to standards & guidelines adopted

A

Federal Information Processing Standards (FIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Allows greater flexibility in applying encryption to specific file(s).

A

File Encryption Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Broader discipline, adding several dimensions of management & involving a much broader base of stakeholders

A

IT Asset Management (ITAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Methodology that identifies the path to meet user requirements.

A

Data Modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software that is used to encrypt otherwise unprotected storage media such as CD’s, DVDs, USB drives, or laptop hard drives.

A

Media Encryption Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Portable USB drives that embed encryption algorithms within the hard drive, thus eliminating the need to install any encryption software.

A

Self-Encrypting USB Drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An assessment of quality based on internal standards, processes, & procedures established to control & monitor quality.

A

Quality Control (QC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Assessment of quality based on standards external to the process involves reviewing of the activities & quality control processes to ensure final products meet predetermined standards of quality.

A

Quality Assurance (QA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique.

A

Purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The U.S. Gov repository of publicly known available security checklists (or benchmarks) that provide detailed low level guidance on setting the security configuration of operating systems & applications.

A

National Checklist Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Process of determining the impact of the loss of confidentiality, integrity, or availability of the information to an organization.

A

Categorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Entails analyzing the data that the organization retains, determining its importance & value, & then assigning it to a category.

A

Data Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ensures the important datasets are developed, maintained, & accessible within their defined specifications.

A

Data Custodians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Objects, features, or items that are collected, automated, or affected by activities or the functions of organizations.

A

Data Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Set of CyberSecurity activities, desired outcomes, & applicable references that are common across critical infrastructure sectors.

A

Framework Core

17
Q

Provide context on how an organization views cybersecurity risk & the processes in place to manage that risk.

A

Framework Implementation Tiers

18
Q

Represents the outcomes based on business needs that an organization has selected from the Framework Categories & Sub-Categories.

A

Framework Profile

19
Q

Focuses on providing measurements & standards to protect information systems against threats to the confidentiality of information, integrity of information and processes, & availability of information & services in order to build trust & confidence

A

NIST Computer Security Division

20
Q

The removal of sensitive data from storage devices in such a way that there is assurance that the data may not be reconstructed using normal system functions or software file/data recovery utilities.

A

Clearing

21
Q

Critical Point where a material’s intrinsic magnetic alignment changes direction.

A

Curie Temperature