Information Technology and Security Flashcards
Reasonableness
Data validation that considers reliability, validity, and duplicates and identifies them for additional scrutiny.
False Reject Rate
Want a higher False Reject Rate to protect data centers.
Best way to prevent internal attacks
Security awareness training for all who have access to internal resources.
Employee Owned Devices
Greatest risk to business functions and enterprise.
Security Awareness Training
Prevent Internal Threats
Reduce social engineering attacks
Sings of effective incident response and security awareness
Increased reporting of security events.
Increase number of violation reports.
Configuration Management
Establishing baselines for hardware, software, and internally developed systems.
Images are managed here.
Change Management
Comprises of the overall governance framework and serves the configuration, release and management issues.
Incident Response Process
Detection-identify cause.
Response-limit impact.
Mitigation-remediation
Recovery-full repair of event
Indicates the readiness and preparedness of the enterprise to handle unexpected events
Incident Response Plan
SDLC
Plan (Initiation)-Begin security, implement internal controls.
Development-security is identified.
Implementation-security is configured and tested.
Operation-maintaining acceptable level security.
Test ensuring adequate quality, ensures system can be recovered and meets load requirements.
User Acceptance Testing
Unauthorized Disclosure of Sensitive Data
Data Leakage