Chapter 10 - Data Security Flashcards
three basic types of backup
- full backup - It is a full copy of your entire data set.
- incremental backup - a backup of the data that has changed since the most recent backup (regardless of if its incremental or full). This is the fastest backup.
- differential backup - a backup of everything that changes since the last full backup; it accumulates as more and more differential backups are done. This is slower than incremental backups.
five threats to health information
- internal employees who make unintentional errors
- internal employees who abuse their access to information
- internal employees who access the system for spite or profit
- hostile outsiders who attempt to access information or steal resources
- angry internal employees or hostile outsiders who attack the information system
spite
(1) petty ill will or hatred with the disposition to irritate, annoy, or thwart
(2) the phrase “in spite of” = in defiance or contempt of, without being prevented by
tailgating
A social engineering technique that allows a hacker, imposter, or other unauthorized individual to use an authorized individual’s access privileges to gain access to a restricted physical area.
For example, an imposter, hacker, or other unauthorized individual wants to gain access to a building that requires badge access. This unauthorized individual follows closely behind an individual who just swiped his or her badge and gains access by simply following the other individual inside the building. It is human nature for a person to hold a door open for someone behind him or her and not let the door close on that person. The unauthorized person knows this and exploits the good nature of another individual.
administrative safeguards
documented, formal practices to manage data security measures throughout the CE
spear phishing
Similar to phishing but requires a little more work on the part of the hacker. When the hacker engages in spear phishing, the hacker researches the individual whose identity the hacker will assume by looking up social media accounts and researching the individual’s activity on the web. The hacker will typically assume the identity of an individual in a high-level leadership position of an organization. While assuming this online identity, the hacker will then target other individuals within the organization to try to obtain personal information from them.
tornado vs hurricane
Hurricanes and tornadoes are alike in basic ways. Both produce powerful, swirling winds — and both can leave a path of death and destruction.
While tornadoes originate on land, hurricanes are formed on large water bodies. The wind speed in tornadoes is significantly faster than the wind speed of the hurricane. However, while tornadoes usually last for minutes, a hurricane, once formed, can last for days, even weeks at times.
rootkit
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected
CIA Triad
These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA triad. They are a standard used by information security professionals.
- Confidentiality: Only authorized and appropriate individuals access the data within an information system.
- Integrity: The data within the system can be trusted. This was discussed at the beginning of the chapter.
- Availability: The data within the system is available to the end user wherever and whenever it is needed.
likelihood determination
an estimate of the probability of threats occurring
impact analysis
an estimate of the impact of threats on information assets
single sign-on
an authorization strategy that allows a user to log in to many separate, although related, information systems. Single sign-on allows a user to log in one time and be able to access many information systems. This prevents the user from having to log in to each information system individually
smart card
a physical card that has an embedded integrated chip that acts as a security token
automatic logouts
timed logouts that reduce the chances that one’s account will be used by someone else
information technology asset disposition (ITAD)
the process of disposing of unwanted electronic equipment in a responsible manner