Asset Security Domain Flashcards

1
Q

Categorization

A

The process of determining the impact of the loss of confidentiality; integrity; or availability of the information to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Clearing

A

The removal of sensitive data from storage devices in such a way that there is assurance that the data may not be reconstructed using normal system functions or software file/data recovery utilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Curie Temperature

A

The critical point where a material’s intrinsic magnetic alignment changes direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Classification

A

Entails analyzing the data that the organization retains; determining its importance and value; and then assigning it to a category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Custodians

A

Ensure important datasets are developed; maintained; and accessible within their defined specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Modeling

A

The methodology that identifies the path to meet user requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Remanence

A

The residual physical representation of data that has been in some way erased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Standards

A

Objects; features; or items that are collected; automated; or affected by activities or the functions of organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Federal Information Processing Standards (FIPS)

A

The official series of publications relating to standards and guidelines adopted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File Encryption Software

A

Allows greater flexibility in applying encryption to specific file(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Framework Core

A

A set of cybersecurity activities; desired outcomes; and applicable references that are common across critical infrastructure sectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Framework Implementation Tiers

A

Provide context on how an organization views cybersecurity risk and the processes in place to manage that risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Framework Profile

A

Represents the outcomes based on business needs that an organization has selected from the Framework Categories and Subcategories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IT Asset Management (ITAM)

A

ITAM is a much broader discipline; adding several dimensions of management and involving a much broader base of stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Media Encryption Software

A

Software that is used to encrypt otherwise unprotected storage media such as CDs; DVDs; USB drives; or laptop hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The National Checklist Program (NCP)

A

The U.S. Government repository of publicly available security checklists (or benchmarks) that provide detailed low-level guidance on setting the security configuration of operating systems and applications.

17
Q

NIST Computer Security Division (CSD)

A

Focuses on providing measurements and standards to protect information systems against threats to the confidentiality of information; integrity of information and processes; and availability of information and services in order to build trust and confidence.

18
Q

Purging

A

The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique.

19
Q

Quality Assurance (QA)

A

An assessment of quality based on standards external to the process and involves reviewing of the activities and quality control processes to ensure final products meet predetermined standards of quality.

20
Q

Quality Control (QC)

A

An assessment of quality based on internal standards; processes; and procedures established to control and monitor quality.

21
Q

Self-Encrypting USB Drives

A

Portable USB drives that embed encryption algorithms within the hard drive; thus eliminating the need to install any encryption software.