Domain 2 Flash Cards

1
Q

Accountability

A

It ensures that account management has assurance that only authorized users are accessing the system and using it properly. It also includes authentication, accounting, authorization per ISC2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset

A

An item perceived as having value.
Anything of value owned by the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset lifecycle

A

The phases that an asset goes through from creation (collection) to destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anonymization

A

replaces privacy data with useful but inaccurate data; the dataset can be shared, but it removes individual identities; it is permanent. Process of removing all relevant data so that it is impossible to identify original subject or person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baselines

A

A minimum level of security. Also, in terms of an information system, the set of configurations, settings for what is considered a normal state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clearing

A

The removal of sensitive data from storage devices in such a way that there is assurance that the data may not be reconstructed using normal system functions or software file/data recovery utilities. Overwriting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Classification

A

Arrangement of assets into categories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Curie temperature based
intrusion detection system
(HIDS)

A

The critical point where a material’s intrinsic magnetic alignment changes direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Custodian

A

Responsible for protecting an asset that has value, while in the custodian’s possession. Usually someone in the IT department. Does not decide what control are needed but does implement controls for data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data classification

A

Entails analyzing the data that the organization retains, determining its importance and value, and then assigning it to a category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Defensible destruction

A

An artifact that indicates the possibility of an attack or Eliminating data using a controlled, legally defensible, and regulatory compliant way..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EPROM / UVEPROM

A

erasable programmable read-only memory, is a type of programmable read-only memory (PROM) chip that retains its data when its power supply is switched off; chips my be erased with ultraviolet light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EEPROM

A

Electrically Erasable Programmable Read-Only Memory; chips may be erased with electrical current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Inventory

A

Complete list of items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lifecycle

A

Phases that an asset goes through from creation to destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purging

A

The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique. A more intense form of clearing that prepares media for reuse in less secure environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PROM

A

programmable read-only memory, a form of digital memory where the contents can be changed once after manufacture of the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Qualitative Risk
Analysis

A

It is a technique used to quantify risk associated with a particular hazard. Risk assessment is used for uncertain events that could have many outcomes and for which there could be significant consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Quantitative

A

Using numbers to measure something, usually monetary values.

20
Q

Remanence

A

Residual magnetism left behind

21
Q

Resources

A

Assets of an organization that can be used effectively.

22
Q

Responsibility

A

Obligation for doing something. Can be delegated

23
Q

RAM

A

Random Access Memory - volatile memory that loses contents when the computer is powered off

24
Q

Randomized masking

A

an anonymization method that cannot be reversed when done correctly

25
ROM
nonvolatile memory that can't be written to by end users
26
TEMPEST
a classification of technology designed to minimize the electromagnetic emanations generated by computing devices; It technology makes it difficult, if not impossible, to compromise confidentiality by capturing emanated information; It countermeasures to Van Eck phreaking (i.e. eavesdropping), include Faraday cages, white noise, control zones, and shielding
27
Data Lifecycle
Create Store Use Share Archive Destroy
28
Erasing
Performing a delete operation against a file, files, media
29
Data Classification Government
Top secret Secret Confidential Unclassified
30
Data classification non-government
Confidentiality/Proprietary Private Sensitive Public
31
Top secret/confidential
Exceptionally grave damage
32
Secret/Private
Serious damage
33
Confidential/sensitive
Damage
34
Unclassified/public
No damage
35
Data security controls
Marking, labeling, handling, classification Data handling Data destruction Record retention Tape backup security
36
Degaussing
Creates a strong magnetic field that erases data on some media
37
Destruction
The final stage in the lifecycle of media and is the most secure method of sanitizing media
38
Data Owner
Usually a member of senior management. Can delegate some day to day duties. Cannot delegate total responsibility
39
Data administrations
Responsible for granting appropriate access to personal (often via role based access control)
40
User
Any person who accesses data via computing system to accomplish work tasks
41
Business/Mission Owners
Can overlap with the responsibility of the system owner or be same role
42
Asset Owners
Owns assets or system that processes sensitive data and associated security plans
43
Data Processor (GDPR)
A natural or legal person public authority agency or other body which processes personal data solely on behalf of the data controller
44
Data Controller(GDPR)
The person or entity that controls processing of the data
45
Data Transfer (GDPR)
GDPR restricts data transfer to countries outside of EU
46
Pseudonymization
The process of using pseudonyms(aliases) to represent other data