1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Human resource security
The relationship of the individual to the organization prior to, during, and after employment termination.
Security awareness/education
Training related to security, focusing on general security awareness and the use of IT assets.
Non-malicious security problems
Security issues caused by employees unintentionally through ignorance or oversight.
Malicious security problems
Security issues caused by employees knowingly violating controls and procedures.
Background checks
Investigations done by employers to ensure that prospective employees are capable and pose no security risk.
Negligent hiring
A legal concept where an employer may be held liable for hiring an employee who causes harm while acting in their professional capacity.
Confidentiality agreement
A contract that obligates employees and the organization to keep certain information confidential.
Least privilege
A security principle that grants users only the access necessary to perform their job functions.
Separation of duties
A principle that prevents any one individual from having control over all aspects of a transaction or process to mitigate risk.
Role-based Training
Training targeted at individuals who have specific functional responsibilities regarding IT systems.
Cybersecurity essentials program
A program defining an individual’s ability to apply core knowledge needed to protect electronic information and systems.
GDPR (General Data Protection Regulation)
A comprehensive data privacy law in the EU designed to protect citizens' personal data and privacy.
Privacy Controls
Measures organizations implement to ensure the security and privacy of Personally Identifiable Information (PII).
Document Management System
Software used for managing documents within an organization, including electronic publishing and records management.
Active records
Records that are currently used to support the organization’s functions and reporting requirements.
Semi-active records
Records no longer needed for current activities but retained for legal or historical purposes.
Inactive records
Records that are no longer required for operational functions and may be archived or destroyed.
ISO 27001
An international standard for managing and securing information assets.
Information Classification
The process of categorizing information assets according to their importance and the impact of security breaches.
Privacy
The right of individuals to control or influence the collection and storage of their personal information.
Security awareness program
A program designed to educate employees about security threats and their responsibilities related to information security.