Definitions Flashcards
Data Steward
Responsible for managing data from a business & stakeholder perspective
- oversight or data governance role within an organization, and is responsible for ensuring the quality and fitness for purpose of the organization’s data assets, including the metadata for those data assets.
Data Custodian
Creates and enforces technical controls on day-to-day level
Data Owner
Ultimately responsible for sensitive data
nmap -sT
scan for open TCP ports
nmap -sU
scan for open UDP ports
netstat -a
identify listening and non-listening sockets
netstat-l
list of listening sockets
netstat -s
displays statistics for each protocol
netstat -i
displays a table of all network interfaces
Steps of Risk Assessment
- Identify assets at risk
- Conduct a threat assessment
- Analyze Business Impact
- Evaluate threat probability
- Prioritize risks
- Create a mitigation strategy
Where are network communication security settings configured?
Computer policies section of GPO
Where are internet options set?
User policies in GPO
Block cipher
Encrypt fixed-length groups (64 or 128 bit)
-Pad added to short blocks
- Each block encrypted/decrypted independently
- Symmetric encryption
Stream cipher
Encryption is done one bit at a time
- Used w/ symmetric encryption
- IV (initialization vector) added for randomness
Ephemeral Key
Not permanent
- Used for session keys
LDAPS
Secure Lightweight Directory Access Protocol
- TCP port 636
IMAPS
Secure Internet Message Access Protocol
- TCP port 993
POP3S
Secure Post Office Protocol
- TCP port 995