IS4680 Chapter 8 Flashcards

1
Q

(AUPs) Acceptable use policies

A

.Policies that define what actions are acceptable and which are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Background check

A

An investigation to divulge evidence of past behavior that may indicate a prospect is a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business drivers

A

The components, including people, information, and conditions, that support business objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality agreement

A

A legally binding document in which the parties agree that certain types of information will pass among the parties and must remain confidential and not divulged. (Non-disclosure agreement NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Corrective controls

A

Mechanisms that repair damage caused by an undesired action and limit further damage, such as the procedure to remove detected viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Detective controls

A

Mechanisms that recognize when an undesired action has occurred, such as motion detectors or usage log analysis tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(DAC) Discretionary access control

A

Access permissions based on roles, or groups, that allows object owners and administrators to grant access rights at their discretion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(FCRA) Fair Credit Reporting Act

A

US legislation that defines national standards for all consumer reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(MAC) Mandatory access control

A

Access control method based on data classification and user clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Need to know

A

A subject has a need to access an object to complete a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Preventive controls

A

Mechanisms that keep an undesired action from happening, such as locked doors or computer access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Principle of least privilege

A

A principle that states that users should not have access above what is required to perform their duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Separation of duties

A

The process of dividing roles and responsibilities so a single individual cannot undermine a critical process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly