IS4680 Chapter 8 Flashcards
(AUPs) Acceptable use policies
.Policies that define what actions are acceptable and which are not.
Background check
An investigation to divulge evidence of past behavior that may indicate a prospect is a security risk.
Business drivers
The components, including people, information, and conditions, that support business objectives.
Confidentiality agreement
A legally binding document in which the parties agree that certain types of information will pass among the parties and must remain confidential and not divulged. (Non-disclosure agreement NDA)
Corrective controls
Mechanisms that repair damage caused by an undesired action and limit further damage, such as the procedure to remove detected viruses.
Detective controls
Mechanisms that recognize when an undesired action has occurred, such as motion detectors or usage log analysis tools.
(DAC) Discretionary access control
Access permissions based on roles, or groups, that allows object owners and administrators to grant access rights at their discretion.
(FCRA) Fair Credit Reporting Act
US legislation that defines national standards for all consumer reports.
(MAC) Mandatory access control
Access control method based on data classification and user clearance.
Need to know
A subject has a need to access an object to complete a task.
Preventive controls
Mechanisms that keep an undesired action from happening, such as locked doors or computer access controls.
Principle of least privilege
A principle that states that users should not have access above what is required to perform their duties
Separation of duties
The process of dividing roles and responsibilities so a single individual cannot undermine a critical process