Class two Flashcards
Governance
The methods used by an executive to keep their organization on track with management’s goals and within acceptable performance standards. Usually achieved through establishing policies, procedures, and controls that match the enterprise’s vision, strategy, and risk appetite.
Policy
1) high level statement of intent providing guidance on principles an organization follows. 2) Settings, including security settings, inside a software program or OS.
Procedure
guidance or specific instruction on the process/method that should be used to achieve an objective.
PAMS
Privileged account management system - used to control and monitor activities of privileged accounts.
Red team
team of penetration testers that look for potential exploits in the system, infrastructure, or website.
Penetration test
method to identify potential vulnerabilities that could be exploited. Includes exploring how they could be exploited.
Vulnerability assessment
Finding and classifying security gaps. Not about exploring ways to exploit them. Often used by pen testers.
Zero day
First time malware or exploit is discovered, no procedures or tools available yet to deal with it.
Business continuity plans
BCP - describes how to restore critical products or services to customers should a substantial event cause disruption to them.
Technical disaster recovery plan
Actual processes, people, information, and assets required to put a digital system back in place within a timeline defined by the BCP.
RITE
Responsibility, integrity, trust, ethicality