Organizational Data Flashcards

1
Q

Traditional Data

A

Traditional data in organizations includes transactional data (buying, selling, production), intellectual property (patents, trademarks, new product plans), and financial data (income statements, balance sheets).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Transactional Data

A

Explanation: Details related to buying, selling, production activities, and basic organizational operations fall under transactional data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intellectual Property

A

Explanation: Patents, trademarks, and new product plans constitute intellectual property, providing an economic advantage and often considered trade secrets crucial for a company’s future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Financial Data

A

Explanation: Income statements, balance sheets, and cash flow statements are forms of financial data that offer insights into the overall health of a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet of Things (IoT)

A

Explanation: IoT involves a network of connected physical objects, collecting and sharing data. This has led to the emergence of ‘Big Data’ due to the exponential growth in data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Big Data and IoT Connection

A

Explanation: The expansion of storage options through the cloud and virtualization has resulted in an exponential growth in data, creating a new area of interest in technology and business known as ‘Big Data.’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality in The Cube

A

Explanation: Confidentiality comprises rules preventing the disclosure of sensitive information to unauthorized entities. Methods include data encryption, identity proofing, and two-factor authentication to ensure confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity in The Cube

A

Explanation: Integrity safeguards system information from intentional or accidental modifications. Using hash functions or checksums is one method to ensure and verify integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Availability in The Cube

A

Explanation: Availability ensures authorized users can access systems and data as needed. Achieved through equipment maintenance, hardware repairs, keeping software up to date, and creating backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Protection in The Cube - Processing

A

Explanation: Processing involves using data for operations, like updating a database record. It is a state in information protection within The Cube.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information Protection in The Cube - Storage

A

Explanation: Storage refers to data at rest, stored in memory or on permanent devices like hard drives, solid-state drives, or USB drives. This is a state in information protection within The Cube.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information Protection in The Cube - Transmission

A

Explanation: Transmission involves data in transit, traveling between information systems. It is a state in information protection within The Cube.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Protection in The Cube - Awareness, Training, and Education

A

Explanation: In The Cube, security measures include awareness, training, and education to ensure users are well-informed about security threats and actions to protect information systems. This proactive approach enhances the organization’s overall security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Technology in Information System Protection

A

Explanation: Technology encompasses software and hardware solutions, like firewalls, designed to safeguard information systems. Firewalls, for example, continuously monitor networks for potential malicious incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Policy and Procedure in Information Assurance

A

Explanation: Policy and procedure involve administrative controls shaping how an organization implements information assurance. This includes incident response plans and best practice guidelines as foundational elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Consequences of Security Breach - Reputational Damage

A

Explanation: A security breach can lead to significant reputational damage for an organization. This includes customer dissatisfaction, potential legal actions, and employee turnover due to a tarnished reputation. Repairing the damage can be a prolonged process, impacting the organization’s standing in the long term.

17
Q

Consequences of Security Breach - Vandalism

A

Explanation: Hacking incidents can lead to online vandalism where false information is posted on an organization’s website. Even minor edits can be challenging to detect. Such actions can project unprofessionalism, harming the organization’s reputation and credibility.

18
Q

Consequences of Security Breach - Theft

A

Explanation: Data breaches often involve the theft of sensitive personal data. Cybercriminals may make the information public or use it to steal money and/or identity, causing significant harm to individuals and potentially resulting in financial loss and identity theft.

19
Q

Consequences of Security Breach - Loss of Revenue

A

Explanation: A security breach can have a severe financial impact, such as website takedowns hindering online business and loss of customer information impeding growth. Organizations may need additional investments in security infrastructure, and failure to protect online data can result in substantial fines or penalties, contributing to significant financial losses.

20
Q

Consequences of Security Breach - Damaged Intellectual Property

A

Explanation: A security breach can severely impact an organization’s competitiveness if hackers gain access to confidential documents, trade secrets, and intellectual property. The potential loss or compromise of such valuable assets can have long-lasting consequences for the organization’s standing in the market.