D Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Data classification

A

The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification. Levels of sensitivity of data are assigned according to predefined categories as data are created, amended, enhanced, stored or transmitted. The classification level is an indication of the value or importance of the data to the enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data custodian

A

The individual(s) and department(s) responsible for the storage and safeguarding of computerized data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data integrity

A

The degree to which a collection of data is complete, consistent and accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data leakage

A

Unauthorized transmission of data from an organization either electronically or physically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data loss prevention

A

Detecting and addressing data breaches, exfiltration or unwanted destruction of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data mining

A

Generally, the use of computers to analyze large data sets to look for patterns that assist people in making business decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data normalization

A

A structured process for organizing data into tables in such a way that it preserves the relationships among the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data owner

A

The individual(s) who has responsibility for the integrity, accurate reporting and use of computerized data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data warehouse

A

A generic term for a system that stores, retrieves and manages large volumes of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Decentralization

A

The process of distributing computer processing to different locations within an enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decryption key

A

A digital piece of information used to recover plaintext from the corresponding ciphertext by decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defense in depth

A

The practice of layering defenses to provide added protection. Defense in depth increases security by raising the effort needed in an attack. This strategy places multiple barriers between an attacker and enterprise
computing and information resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Degauss

A

The application of variable levels of alternating current for the purpose of demagnetizing magnetic recording media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Demilitarized zone (DMZ)

A

A small, isolated network that serves as a buffer zone between trusted and untrusted networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Denial-of-service attack (DoS)

A

An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and is either stopped completely or operates at a significantly reduced rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital certificate

A

Electronic credentials that permit an entity to exchange information securely via the Internet using the public key infrastructure (PKI)

17
Q

Digital code signing

A

The process of digitally signing computer code to ensure its integrity.

18
Q

Disaster declaration

A

The communication to appropriate internal and external parties that the disaster recovery plan (DRP) is being put into operation.

19
Q

Disaster notification fee

A

The fee that the recovery site vendor charges when the customer notifies them that a disaster has occurred and the recovery site is required.

20
Q

Disaster recovery plan (DRP) desk checking

A

Typically a read-through of a disaster recovery plan (DRP) without any real actions taking place.

21
Q

Disaster recovery plan (DRP) walk-through

A

Generally a robust test of the recovery plan requiring that some recovery activities take place and are tested. A disaster scenario is often given and the recovery teams talk through the steps that they would need to take to recover. As many aspects of the plan as possible should be tested.

22
Q

Disaster recovery plan (DRP)

A

A set of human, physical, technical and procedural resources to recover, within a defined time and cost, an activity interrupted by an emergency or disaster

23
Q

Disaster recovery

A

Activities and programs designed to return the enterprise to an acceptable condition. The ability to respond to an interruption in services by implementing a disaster recovery plan (DRP) to restore an enterprise’s critical business functions.

24
Q

Discretionary access control (DAC)

A

Logical access control filters that may be configured or modified by the users or data owners

25
Q

Disk mirroring

A

The practice of duplicating data in separate volumes on two hard disks to make storage more fault tolerant. Mirroring provides data protection in the case of disk failure because data are constantly updated to both disks.

26
Q

Distributed denial-of-service attack (DDoS)

A

A denial-of-service (DoS) assault from multiple sources.

27
Q

Dual control

A

A procedure that uses two or more entities (usually persons) operating in concert to protect a system resource so that no single entity acting alone can access that resource.

28
Q

Due care

A

The level of care expected from a reasonable person of similar competency under similar conditions

29
Q

Due diligence

A

The performance of those actions that are generally regarded as prudent, responsible and necessary to conduct
a thorough and objective investigation, review and/or analysis

30
Q

Dynamic Host Configuration Protocol (DHCP)

A

A protocol used by networked computers (clients) to obtain IP addresses and other parameters such as the default gateway, subnet mask and IP addresses of domain name system (DNS) servers from a DHCP server.