Physical & Information Security Flashcards
13%
What are audit trails?
The complete history kept of transaction data and of all changes to data
What are the three key components of information security?
Confidentiality, data integrity, and availability
What is a cyber attack?
An attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or electronic communications network
What is a data loss prevention (DLP) program?
A comprehensive approach (covering people, processes, and systems) of implementing policies and controls designed specifically to discover, monitor, and protect confidential data wherever it is stored, used, or in transit over the network and at the perimeter
What is an IT strategic plan?
A comprehensive blueprint that guides the organization’s technology management and contains high-level goals and plans for all areas of information technology that affect the business, not just the infrastructure
What is an official record?
Any form of paper, electronic, audio or video recording, etc., that an organization must retain for legal, regulatory, or practical operational reasons
What is business email compromise (BEC)?
BEC occurs when a legitimate business’ email account is either compromised or impersonated
What is confidentiality?
When information is not made available or disclosed to unauthorized individuals, entities, or processes
What is data integrity?
The process of maintaining and assuring the accuracy and completeness of data over its life cycle
What is file accountability?
Ensuring that in each step of a process only current files are processed and to ensure a file is not inadvertently duplicated or omitted from processing
What is file balancing?
A process completed at each step to ensure that transactions were not dropped, changed, or duplicated
What is layered security?
The use of different controls at different points in a transaction process so that weakness in one control is generally compensated for by the strength of a different control
What is limited access?
Restricting data access to authorized personnel
What is nonpublic personal information?
Any personally identifiable information a financial institution collects about an individual in connection with providing a financial product or service, unless that information is otherwise publicly available
What is public information?
Information lawfully made available to the general public from government records, widely distributed media, or legally required disclosures to the general public