Security Operations Flashcards
Data handling process
Classification
Labeling - Data sensitivity labels, e.g. Highly restricted, low sensitivity
Retention
Destruction
Primary uses of symmetric encryption
Encrypting bulk data (backups, hard drives, portable media)
Encrypting messages traversing communications channels (IPsec, TLS)
Streaming large-scale, time-sensitive data (audio/video materials, gaming, etc.)
Configuration Management process
Identify
Baselines
Updates
Patches
Data Handling policy
defines whether data is for use within the company, is restricted for use by only certain roles or can be made public to anyone outside the organization.
Acceptable Use policy
defines acceptable use of the organization’s network and computer systems and can help protect the organization from legal action.
Change Management Policy
It consists of three major activities: deciding to change, making the change, and confirming that the change has been correctly accomplished. Change management focuses on making the decision to change and results in the approvals to systems support teams, developers and end users to start making the directed alterations.
What are the change management components?
Request for change
Approval
Rollback
What are the three types of learning activities organizations use?
Education
Training
Awareness