B Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Backup center

A

An alternate facility to continue IT/IS operations when the primary data processing (DP) center is unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Baseline security

A

The minimum security controls required for safeguarding an IT system based on its identified needs for confidentiality, integrity and/or availability protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Benchmarking

A

A systematic approach to comparing enterprise performance against peers and competitors in an effort to learn the best ways of conducting business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bit copy

A

Provides an exact image of the original and is a requirement for legally justifiable forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bit

A

A contraction of the term binary digit, and the most basic and smallest unit of computing information. A bit may be in one of two states, logic 1 or logic 0. It can be thought of as a switch that is either on or off. Bits are
usually combined into computer words of various sizes, named bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bit-stream image

A

Bit-stream backups, also referred to as mirror image backups, involve the backup of all areas of a computer hard disk drive or other type of storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blue team

A

A group that proactively conducts systematic examinations of information systems or products to determine the adequacy of security measures, identify security deficiencies, responds to technical security incidents and confirms the adequacy of such measures after implementation. Blue teams are typically internal security personnel that may or may not be part of an enterprise security operations center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Botnet

A

A term derived from robot network; a large automated and distributed network of previously compromised computers that can be simultaneously controlled to launch large-scale attacks, such as a denial-of-service attack, on targeted victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute-force attack

A

Methodically trying all possible combinations of passwords or encryption keys until the correct one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business case

A

Documentation of the rationale for making a business investment, used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment
through its full economic life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business continuity plan (BCP)

A

A plan used by an enterprise to respond to disruption of critical business processes; depends on the contingency plan for restoration of critical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business continuity

A

Preventing, mitigating and recovering from disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business dependency assessment

A

A process of identifying resources critical to the operation of a business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Business impact analysis (BIA)

A

Process of evaluating the criticality and sensitivity of information assets by determining the impact of losing the support of any resource to an enterprise. Establishes the escalation of that loss over time, identifies the minimum resources needed to recover and prioritizes the recovery of processes and the supporting system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Business impact

A

The net effect, positive or negative, on the achievement of business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Business Model for Information Security (BMIS)

A

A holistic and business-oriented model that supports enterprise governance and management information security, and provides a common language for information security professionals and business management.