Create
Learn
Share

Domain 2 Asset Security

rename
klct555's version from 2017-06-22 19:40

Domain 2 Asset Security

Question Answer
CategorizationThe process of determining the impact of the loss of confidentiality, integrity, or availability of the information to an organization.
ClearingThe removal of sensitive data from storage devices in such a way the there is assurance that the data may not be reconstructed using normal system functions or software file/data recovery utilities.
Curie TemperatureThe critical point where a material’s intrinsic magnetic alignment change direction.
Data ClassificationEntails analyzing the data that the organization retains, determining its importance and value, and them assigning it to a category.
Data CustodiansEnsure important data sets are developed, maintained, and accessible within their defined specifications.
Data ModelingThe methodology that identifies the path to meet user requirements.
Data RemanenceThe residual physical representation of data that has been in some way erased.
Data StandardsObjects, features, or items that are collected, automated, or affected by activities or the functions of organization.
Federal Information Processing Standards (FIPS)The official series of publications relating to standards and guidelines adopted.
Files Encryption SoftwareAllows greater flexibility in applying encryption to specific file(s).
Framework CoreA set of cybersecurity activities, desired outcomes, and applicable references that are common across critical infrastructure sectors.
Framework Implementation TiersProvide context on how and organization views cybersecurity risk and the process in place to manage that risk.
Framework ProfileRepresents the outcomes based on business needs that an organization has selected for the Framework Categories and Subcategories.
IT Asset Management (ITAM)ITAM is a much broader discipline, adding several dimensions of management and involving a much broader base of stakeholders.
Media Encryption SoftwareSoftware that is used to encrypt otherwise unprotected storage media such as CDs, DVDs, USB drives, or laptop hard drive.
The National Checklist Program (NCP)The U.S. Government repository of publicly available security checklists (or benchmarks) that provide detailed low-level guidance on setting the security configuration of operating systems and application.
NIST Computer Security Division (CSD)Focuses on providing measurements and standards to protect information systems against threats to the confidentiality of information, integrity of information and processes, and availability of information and services in orders to build trust and confidence in Information Technology system.
PurgingThe removal of sensitive data from a system or storage device with the intect that the data cannot be reconstructed by and known technique.
Quality Assurance (QA)An sessment of quality based on standards external to the process and involves reviewing of the activities and quality control processes to ensure final products meet predetermined standards of quality.
Quality Control (QC)An assessment of quality based on internal standards, process, and procedures established to control and monitor quality.
Self-Encrypting USB DrivesPortable USB drives that embed encryption algorithms within the hard drive, thus eliminating the need to install any encryption software.
memorize

Recent badges