1/27
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
bring your own device (byod)
allows employees to work on their own devices
Corporate Owned Personally Enabled (COPE)
A company gives you a device you can use for both work and personal stuff.
Choose Your Own Device (CYOD)
You pick a work-approved device from a list, and the company manages it.
overwriting
Replacing old data with random data so it can’t be recovered.
Degaussing
strong magnetic field to erase all data on a magnetic storage device
Secure Erase
command that completely wipes all data from a storage device
Destruction
destroying a device or storage media so no data can be recovered.
Certification of Disposal
proof that shows data or hardware was safely thrown away.
preparation
Being ready before a cyberattack happens.
vision for change
clear explanation of why the change is happening & the end goal
Implementation
putting the plan into action
Verification
Measuring how effective the change was
Documentation
Creating records of the entire process
Backout plan
undo changes if something goes wrong, so systems can return to normal.
Standard Operating Procedure (SOP)
A step-by-step guide that tells people exactly how to do a task the right way every time.
Asset Management
Keeping track of all company devices, software, and tools to know what you have, where it is, and how it’s being used.
Assignment/Accounting
Recording who is using which assets and tracking their status (like location, condition, and value) to keep everything organized and up to date.
Classification
Sorting data or assets into categories based on how important they are
Monitor/Tracking
Keeping an eye on where assets are, how they're used, and making sure nothing is lost, stolen, or misused.
Enumeration
gathering detailed information about a target system or network (finding weak spots)
Mobile Device Management (MDM)
control and protect smartphones and tablets that connect to a company’s network
Sanitization
The safe way to erase data so no one can recover it later.
Change Management
plan to safely make updates to systems or processes without causing problems.
Change Advisory Board (CAB)
people who review and approve changes before they happen to make sure they’re safe
Change owner
person responsible for making sure a change is planned,
Impact analysis
review to see how a change might affect systems, people, or business operations.
legacy application
Old software programs that are still in use but may no longer be supported or updated.
version control
system that tracks changes to files or code over time.