Chapter 7 (Security) Flashcards
Several areas of Security include ________, ________, ________, and __________.
Physical
Digital
Operational
Data
Corporate IT Policies
A document that outlines the minimum standards required to secure the organization’s technology-relatied systems, assets, and data. It also outlines the rules and procedures for accessing the organization’s systems and data.
Security Policy
A Purpose, Scope, Definitions Section, and an Appendix is included in most _________.
Policies
What section of a policy states what the policy is protecting and why?
Purpose
What section of a policy defines the people impacted by the policy, such as employees and contractors, and a description of the systems the policy is covering?
Scope
What section of a policy outlines the rules and procedures regarding accessing the organization’s systems and data?
Scope
What document outlines the HOW we are going to accomlish a task?
Procedure Document
What section of a policy includes descriptions of equipment, data, services, etc..?
Defenitions Section
What section of a policy will outline who performs the inventory and disposal and the employees role on allowing access for these activities?
Roles and Responsibilities
A type of security for those who create products, intellectual property, or unique services
Branding Restrictions
What involves a trademark, copyright, registered trademark, or patent?
Branding
What is generally used to identify a company, brand names, logos, and such?
Trademark
What identifies the intellectual property of a company and is registered with teh U.S. Patent and Trademark Office?
Registered Trademark
What is used for intellectual property such as books, music, recordings, and so on?
Copyright
Intellectual property that is awaiting acceptance by the Patent and Trademark Office is designated as ________.
Patent Pending
What type of security involves securing assets such as mobile devices, removable media devices, access to facilities, and more?
Physical Security
What type of security includes policies for performing background checks and security clearance?
Operational Security
What three levels of Security Clearance are there for the U.S. Department of State?
Confidental
Secret
Top Secret
What type of security policies are related to access and permissions to digital assets? This may include systems, data, communication equipment, etc..
Digital Security
MFA
Multifactor Authentication
A process whereby the user must use two or more methods to verify their identity during the sign-in process.
Multifactor Authentication (MFA)
A way for users who are not physically located at the organization’s site to access information.
Remote Access
What type of security policies define access by roles and responsibilities and/or by data classification?
Data Security
A way to describe data ccording to it’s sensitivity, type, and value to the organization.
Data classification