Security Operations Flashcards
Bypass Label Processing
Can give someone the ability to bypass the security controls.
Data mirroring
Is the replication of data on separate disks in real time to ensure continuous availability, currency, and accuracy (i.e. RAID Level 1).
Data remanence
In the residual physical representation of data remaining on media after the data has been in some way erased.
Database shadowing
Reduces recovery time from a database failure by using a database restore and roll-forward process, using a backup and the journals to enable recovery without data loss.
Degaussing
Leaves the domains in random patters with no preference to orientation, thereby rendering previous data unrecoverable.
Electronic vaulting
Is the bulk transfer of backup data over communications facilities.
File image
Backup software that creates disk image files with extract, byte-by-byte copies of a hard drive, partition, or logical disk.
Initial Program Load (IPL)
Starting a system program with required system software, and operating the computer system as directed.
Malicious code
Software that performs unauthorized functions causing the normal operation of an information system to be abnormal.
Need-to-know
Describes the restriction of data, which is considered very sensitive.
Redundant servers
Provides fault tolerance by having one or more entire systems available in case the primary one crashes.
Remote journaling
Delivers real-time database data integrity by capturing and transmitting the journal and transaction log data offsite as they are created.
Special Priviledge Accounts
These accounts are privileged (Root or built-in Administrator Accounts, Service Accounts, Administrator Accounts, and Power User Accounts).