Chapter 11 Flashcards

1
Q

Transitioning

A

with a business partner occurs either during the on-boarding or off boarding of a business partner
397

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SLA

A

Service Level Agreement

Determines response time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BPO

A

Blanket Purchase Order

Agreement between a gov agency and private company for ongoing purchases of goods and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Awareness

A

Organizations both communicating with each other to share information regarding risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MOU

A

Memorandum of Understanding

Document is used in many settings in the information industry. It is a brief summary of which party is responsible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISA

A

Interconnection Security Agreement

Agreement between two organizations that have connected systems in regards to technical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Organization training

A
Importance of Security
Responsibilities of people in the organization
Policies and proceedures
Usage policies
Account and password selection criteria
Social engineering prevention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Management training

A

global issues in the organization including enforcing security policies and proceedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Technical staff training

A

needs special knowledge about the methods implimentations and capabilities of the systems used to manage security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Safety concerns

A
Fencing
Lighting
Locks
CCTV
Escape Plans
Drills
Escape rooms
Testing controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Clean desk policy

A

Information on the desk: printouts, pads of paper, sticky notes can be seen by prying eyes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compliance with laws, best practices and standards

A

Users need to realize that working with data is the same as driving a car: there are best practices and standards of which you must adhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Handling

A

Only users needing to work with it should have access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Policy on Personal Devices

A

Don’t let people bring their personal devices into secure places because they’re dumbasses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tailgating

A

Following someone into a secure environment after they open it up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Safe internet habits

A

Users need to be familiar enough with phishing to not give away information or download malware

17
Q

Types of Information that your organization keeps

A

Public use
internal use
restricted use

18
Q

Public information

A

information available to the larger public including financial statements

19
Q

Limited distribution

A

Information that isn’t intended for release to the public. This isn’t secret but it’s private. Line of credit. If disclosed to competitors it would suck

20
Q

Full Distribution

A

Marketing materials and the such that is available for general public

21
Q

Private Information

A

Intended only for internal use in the company. Could potential embarrass the company. Work documents and work products

22
Q

Internal Information

A

includes personnel records, financial working documents, ledgers, customer lists, and virtually any other information that is needed to run a business

23
Q

Restricted information

A

can seriously damage an organization: trade secrets, strategic information, marketing plans. Need to know basis

24
Q

Government classifications for information

A
Unclassified
Sensitive but unclassified
Confidential
Secret
Top Secret
25
Q

Integrity

A

ensuring that data has not been altered. Hashing message authentication codes are the most common methods to accomplish this

26
Q

Availability

A

Simply making sure that the data and systems are available for authorized users. Data backups, redundant systems, and disaster recovery plans.

27
Q

HIPAA

A

Health Insurance Portability and Accountability

Regulation that mandates national standards and proceedures for storage, use, and transmission of personal medical information

28
Q

Gramm-Leach-Bliley Act

A

Financial Modernization Act of 1999

Requires financial institutions to develop privacy notices and to notify customers that they are entitled to privacy

29
Q

CFAA

A

Computer Fraud and Abuse Act

Gives feds the ability to prosecute hackers spammers and others as terrorists

30
Q

FERPA

A

Family Education Rights and Privacy Act

Educational institutions may not release info to unauthorized parties without express permission of the student/parents

31
Q

Computer Security Act

A

Requires federal agencies to identify and protect computer systems that contain sensitive information

32
Q

CESA

A

Cyberspace Electronic Security Act

Gives law enforcement the right to gain access to encryption keys and cryptography methods

33
Q

Remote Wipe

A

Sending a signal to a mobile device to clear information

34
Q

Device Access Control

A

Controlling who in the organization has access to a mobile device

35
Q

NDA

A

Something beta testers are required to sign. Hint Willy Wonka