Chapter 6 Flashcards
Residential hardware locks for doors generally fall in ____ categories.
Four
____ locks lock the door from the inside but cannot be unlocked from the outside.
Patio
____ is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
Anti-Climb Paint
____ are spiked collars that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing; serves as both a practical and visual deterrent.
Anti-Climb Collars
____ are independently rotating large cups (in diameter of 5 inches or 115 millimeters) affixed to the top of a fence to prevent the hands of intruders from gripping the top of a fence to climb over it
Roller Barriers
A(n) ____ contains an integrated circuit chip, which can hold information, which can then be used as part of the authentication process.
Smart Card
A(n) ____ is a written document that states how an organization plans to protect the company’s information technology assets.
Security Policy
A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.
Standard
A ____ is a collection of suggestions that should be implemented.
Guideline
A ____ is a document that outlines specific requirements or rules that must be met.
Policy
____ policy defines requirements for using cryptography.
Acceptable Encryption
____ policy creates standards for using corporate e-mail.
____ policy helps employees determine what information sent or received by e-mail should be retained and for how long.
Email Retention
____ policy establishes criteria for classifying and securing the organization’s information in a manner appropriate to its level of security.
Information Sensitivity
____ policy is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users using the Microsoft directory service Active Directory (AD
Group
____ is the process of setting a user’s account to expire.
Account expiration
The practice called “____” requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals
Separation Of Duties
____ is the application of science to questions that are of interest to the legal profession.
Forensics
The ____ team is contacted whenever digital evidence needs to be preserved and serve as first responders.
Computer Forensics Response
____ is defined as the ability of an organization to maintain its operations and services in the face of a disruptive event.
Business Continuity
A ____ is essentially a duplicate of the organization’s main production site and has all the equipment needed for it to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
Hot Site
involves building excess capacity in order to protect against failures
Redundancy Planning
designed to separate a nonsecure area from a secure area
Mantrap
maintains power to equipment in the event of an interruption in the primary electrical power source.
Uninterruptible Power Supply