Chapter 7 (Security) Flashcards
Several areas of Security include ________, ________, ________, and __________.
Physical
Digital
Operational
Data
Corporate IT Policies
A document that outlines the minimum standards required to secure the organization’s technology-relatied systems, assets, and data. It also outlines the rules and procedures for accessing the organization’s systems and data.
Security Policy
A Purpose, Scope, Definitions Section, and an Appendix is included in most _________.
Policies
What section of a policy states what the policy is protecting and why?
Purpose
What section of a policy defines the people impacted by the policy, such as employees and contractors, and a description of the systems the policy is covering?
Scope
What section of a policy outlines the rules and procedures regarding accessing the organization’s systems and data?
Scope
What document outlines the HOW we are going to accomlish a task?
Procedure Document
What section of a policy includes descriptions of equipment, data, services, etc..?
Defenitions Section
What section of a policy will outline who performs the inventory and disposal and the employees role on allowing access for these activities?
Roles and Responsibilities
A type of security for those who create products, intellectual property, or unique services
Branding Restrictions
What involves a trademark, copyright, registered trademark, or patent?
Branding
What is generally used to identify a company, brand names, logos, and such?
Trademark
What identifies the intellectual property of a company and is registered with teh U.S. Patent and Trademark Office?
Registered Trademark
What is used for intellectual property such as books, music, recordings, and so on?
Copyright
Intellectual property that is awaiting acceptance by the Patent and Trademark Office is designated as ________.
Patent Pending
What type of security involves securing assets such as mobile devices, removable media devices, access to facilities, and more?
Physical Security
What type of security includes policies for performing background checks and security clearance?
Operational Security
What three levels of Security Clearance are there for the U.S. Department of State?
Confidental
Secret
Top Secret
What type of security policies are related to access and permissions to digital assets? This may include systems, data, communication equipment, etc..
Digital Security
MFA
Multifactor Authentication
A process whereby the user must use two or more methods to verify their identity during the sign-in process.
Multifactor Authentication (MFA)
A way for users who are not physically located at the organization’s site to access information.
Remote Access
What type of security policies define access by roles and responsibilities and/or by data classification?
Data Security
A way to describe data ccording to it’s sensitivity, type, and value to the organization.
Data classification
PII
PHI
Personal Identifiable Information
Personal Health Information
When information should only be shared with those who have a need-to-know to perform a task or fulfuill their job function.
Need-To-Know Basis
Who has the rprimary role of estimating the costs to complete the work of the project, determining the project budget, and estimating the total cost of the project?
Project Manager
Two areas where you want to be as accurate as possible when presenting estimates.
Cost Baseline
Schedule Baseline
Four techniques to determine cost estimates
Analogous
Parametric
Bottom-up
Three-Point
Analogous Estimating is also know as _________.
Top-Down Estimating
Determines the cost of the project at a high level by using a similar past project as a basis for the estimate. Usually uued when there is not alot of detail on the project.
Analogous (Top-Down) Estimate
Determines the cost of a project by using a mathematical model to compute costs and often uses the quality of work multiplied by the rate.
Parametric Estimating
Which is the most precise cost-estimating technique?
Bottom-Up Estimating
The total time it will take for a person to complete the task if they do nothing else from the time they start until the task is complete.
Work Effort
Determines the cost of the project by assigning a cost estimate to each work package on the project.
Bottom-Up Estimate
Determines the cost of the project by being an average of the Most Likely Estimate, the Optimistic Estimate, and the Pessimistic estimate.
Three-Point Estimate
Which estimate assumes the costs will come in as expected?
Most Likely Estimate
Which estimate is an estimate that is better than expected?
Optimistic Estimate
Which estimate assumes the goods or services will cost more than expected?
Pessimistic Estimate
Let’s say your most likely estimate for contracting work is $302 per hour. The optimistic estimate is $250 per hour, and the pessimistic estimate is $400 per hour. Using the three-point estimate, create an equation and write the answer.
($302+$250+400) / 3 = $317.33
What is a Loaded Rate?
A percentage of the emplyee’s salary to cover benifits such as medical, disibility, or pension plans.
What do you do next once the cost estimate is completed?
Prepare the Budget
The process of aggregating all the cost estimates and establishing a cost baseline for the project.
Budgeting
The total expected cost for the project
Cost Baseline
PMO
Program Management Office