Chapter 2: Asset Security Flashcards

1
Q

What is an asset?

A

An asset is anything of worth to an organization.

This includes people, partners, equipment, facilities, reputation, and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What CRM stands for?

A

Customer Relationship Management (CRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can we divide the life of information?

A

Acquisition, use, archival, and disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the different between Backup and Archive?

A

A data backup is a copy of a data set currently in use that is made for the purpose of recovering from the loss of the original data.

A data archive is a copy of a data set that is no longer in use, but is kept in case it is needed at some future point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is sensitivity of the information?

A

The sensitivity of information is commensurate with the losses to an organization if that information was revealed to unauthorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Critical Information?

A

Critical information is that which is essential for the organization to continue operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the common levels of sensitivity from the highest to the lowest for commercial business?

A

Confidential
Private
Sensitive
Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the levels of sensitivity from the highest to the lowest for military purposes?

A
Top secret
Secret
Confidential
Sensitive but unclassified
Unclassified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Layers of Responsibility?

A

Senior management, Functional management and Operational management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between Privacy and Security?

A

Privacy indicates the amount of control an individual should be able to have and expect to have as it relates to the release of their own sensitive information.

Security refers to the mechanisms that can be put into place to provide this level of control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the responsibility of the data custodian?

A

The data custodian (information custodian) is responsible for maintaining and protecting the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Three core retention policy questions

A

What data do we keep?

How long do we keep this data?

Where do we keep this data?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is E-discovery?

A

Discovery of electronically stored information (ESI), or e-discovery,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the process of Electronic Discovery Reference Model (EDRM)?

A
Identification
Preservation
Collection
Processing
Review 
Analysis
Production
Presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly