Policy and Privacy Concepts Flashcards
A set of procedures an investigator follows when examining a computer security incident
Incident Response
The record of evidence history from collection to court presentation and disposal
Chain of Custody
Bag that shields devices from outside signals to prevent data from being altered, deleted, or added to a new device
Faraday Bag
Process designed to preserves all relevant information when litigation (lawsuit) is expected to occur
Legal Hold
Collecting evidence that could be easily tampered or destroyed first
Order of Volatility
License that allows one individual user to use a piece of software on their given machine
Personal License
A license for each individual machine or person who is actively using that license
Corporate License
Dictates the terms and conditions of the license for a software a user must accept to use
(EULA) End User License Agreement
Ensures copy production for music and video that is being used in an online or digital manner
DRM (Digital Rights Management)
Maintains and controls certain data to comply with business policies and applicable laws and regulations
Data Retention
Keeping information for a specific purpose outside of an organization’s data retention policy
Data Preservation
The max amount of time that can be lost from a recovery after a disaster, failure, or other event.
Recovery Point Objective (RPO)
DLP
Data Loss Prevention (from Microsoft)
What are the 4 forms of regulated data covered by the exam?
1) PII (Personally Identifiable Info)
2) PHI (Personal Health Info)
3) PCI DSS (Credit card transactions)
4) GDPR (General Data Protection Regulation)
Defines the rules that restrict how a computer, network, or other systems may be used
AUP (Acceptable Use Policy)
Defines the structured way of changing the state of a computer system, network, or IT procedure
Change Management
Dictates what types of things need to be done when an employee is hired, fired, or quits
Onboarding and Offboarding Policy
One of the “Due’s” that ensures IT infrastructure risks are known and managed properly
Due Diligence
One of the “Due’s” that mitigates actions that an organization takes to defend against the risks that have been uncovered during due diligence
Due Care
One of the “Due’s” that is a legal term that refers to how an organization must respect and safeguard personnel’s rights
(Protects citizens from their government and companies from lawsuits)
Due Process
Which of the following is considered a form of regulated data?
a) PII
b) AUP
c) DMCA
d) DRM
a) PII
The four forms of regulated data covered by the exam are PII (Personally Identifiable Information), PCI (Payment Card Industry), GDPR (General Data Protection Regulation), and PHI (Protected Health Information). Personally identifiable information (PII) is data used to identify, contact, or locate an individual. Information such as social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data is considered PII.
Which of the following is required for evidence to be admissible in a court of law?
a) Order of volatility
b) Legal hold
c) Chain of custody
d) Right to audit
c) Chain of custody
Chain of custody forms list every person who has worked with or who has touched the evidence that is a part of an investigation. These forms record every action taken by each individual in possession of the evidence. Depending on the organization’s procedures, manipulation of evidence may require an additional person to act as a witness to verify whatever action is being taken.
You are working as a defense contractor for the U.S. Army. The Army is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this sized organization to purchase?
a) Personal
b) Business
c) Enterprise
d) Open-source
c) Enterprise
An enterprise license is like a business license, but for an unlimited number of users and is designed for large corporate and government networks. A business license is the standard licensing option for organizations and business entities. With Microsoft, a company can purchase anywhere from 1 to 300 user licenses under the business license program. A Personal license is an option for private individuals who purchase a license with their own funds and solely for their own use. Personal licenses are not to be purchased, refunded, or in any way financed by companies.