Chapter 11 Flashcards

1
Q

SOPs

A

Standard Operating Procedures is a document that provides step-by-step instructions on how to perform common tasks or routine operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AUP

A

Acceptable Use Policy is a policy defining proper system usage and the rules of behavior for employees

It often describes the purpose of computer systems and networks, how users can access them, and the responsibilities of users when accessing the systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mandatory Vacation

A

A policy that forces employees to take a vacation

The goal is to deter malicious activity, such as fraud and embezzlement, and detect malicious activity when it occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Separation of Duties

A

A security principle that prevents any single person or entity from controlling all the functions of a critical or sensitive process

It’s designed to prevent fraud, theft, and errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Job Rotation

A

A processes that ensures employees rotate through different jobs to learn the processes and procedures in each job

It can sometimes detect fraudulent activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clean Desk Policy

A

A security policy requiring employees to keep their areas organized and free of papers

The goal is to reduce threats of security incidents by protecting sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Background Check

A

A check into a person’s history, typically to determine eligibility for a job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NDA

A

Non-Disclosure agreement is an agreement that is designed to prohibit personnel from sharing proprietary data

It can be used with employees within the organization and with other organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exit Interview

A

An interview conducted with departing employees just before they leave an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Onboarding

A

The process of granting individuals access to an organization’s computing resources after being hired

It typically includes giving the employee a user account with appropriate permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISA

A

Interconnection security agreement is an agreement that specifies technical an security requirements for connections between two or more entities

Compare with MOU/MOA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SLA

A

A service Level Agreement is an agreement between a company and a vendor that stipulates performance expectation, such as minimum uptime and maximum downtime levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MOU/MOA

A

Memorandum of understanding or memorandum of agreement is a type of agreement that defines responsibilities of each party

Compare with ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BPA

A

Business partners agreement is a written agreement that details the relationship between business partners, including their obligations toward the partnership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public Data

A

Data that is available to anyone

It might be in brochures , in press releases, or on the web sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidential Data

A

Data meant to be kept secret among a certain group of people

As an example, salary data is meant to be kept secret and not shared with everyone within a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Proprietary Data

A

Data that is related to ownership

Common examples are information related to patents or trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Private Data

A

Information about an individual that should remain private

Personally Identifiable Information (PII) and Personal Health Information (PHI) are two examples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Labeling

A

The process of ensuring data is tagged clearly so that users know its classification

Labels can be physical labels, such as on backup tapes, or digital labels embedded in files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Purging

A

A general sanitization term indication that all sensitive data has been removed from a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

File Shredding

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Wiping

A

The process of completely removing all remnants of data on a disk

A bit-level overwrite writes patterns of 1s and 0s multiple times to ensure data on a disk is unreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Erasing and Overwriting

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Burning

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Paper Shredding

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

pulping

A

A process that is performed after shredding papers

It reduces the shredded paper to a mash or puree

27
Q

Degaussing

A

The process of removing data from magnetic media using a ery powerful electronic magnet

Degaussing is sometimes used to remove data from a backup tapes or to destroy hard disks

28
Q

Pulverizing

A

A process used to physically destroy items such as optical discs that aren’t erased by a degausser

29
Q

Data Retention Policy

A

A security policy specifying how long data should be kept (retained)

30
Q

PII

A

Personally Identifiable Information is information about individuals that can be used to trace a person;s identity, such as a full name, birth date, bio metric data, and more

31
Q

PHI

A

Personal Health Information

PII that includes health information

32
Q

HIPAA

A

Filler

33
Q

GLBA

A

Filler

34
Q

SOX

A

Filler

35
Q

GDPR

A

Filler

36
Q

Owner

A

Filler

37
Q

Steward/Custodian

A

Filler

38
Q

Privacy Officer

A

Filler

39
Q

Incident Response

A

The process of responding to a security incident

Organizations often create an incident response plan that outlines the procedures to be used when responding to an incident

40
Q

Security Incident

A

An adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization’s information technology (IT) systems and data

41
Q

IRP

A

Incident Response Plan are the procedures documented in an incident response policy

42
Q

Definitions of Incident Types

A

Filler

43
Q

Cyber-Incident Response Teams

A

A group of experts who respond to security incidents

Also known as CIRT

44
Q

Roles and Responsibilities

A

Filler

45
Q

Escalation

A

Filler

46
Q

Reporting Requirements

A

Filler

47
Q

Exercises

A

Filler

48
Q

Preparation

A

Filler

49
Q

Identification

A

Filler

50
Q

Containment

A

Filler

51
Q

Eradication

A

Filler

52
Q

Recovery

A

Filler

53
Q

Lessons Learned

A

Filler

54
Q

Order of Volatility

A

A term that refers to the order in which you should collect evidence

For example, data in memory is more volatile than data on a disk drive, so it should be collected first

55
Q

Record Time Offset

A

An offset used by recorders to identify times on recordings

If you know when the recording started, you can use the offest to identify the actual time at any point in the recording

56
Q

Chain of Custody

A

A process that provides assurances that evidence has been controlled and handled properly after collection

Forensic experts establish a chain of custody when they first collect evidence

57
Q

Legal Hold

A

A court order to maintain data for evidence

58
Q

Data Owner

A

Filler

59
Q

System Administrator

A

Filler

60
Q

System Owner

A

Filler

61
Q

User

A

Filler

62
Q

Privileged User

A

Filler

63
Q

Executive User

A

Filler

64
Q

Incident Response Team

A

Filler