Risk Management / Governance & Compliance

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

bring your own device (byod)

allows employees to work on their own devices

2
New cards

Corporate Owned Personally Enabled (COPE)

A company gives you a device you can use for both work and personal stuff.

3
New cards

Choose Your Own Device (CYOD)

You pick a work-approved device from a list, and the company manages it.

4
New cards

overwriting

Replacing old data with random data so it can’t be recovered.

5
New cards

Degaussing

strong magnetic field to erase all data on a magnetic storage device

6
New cards

Secure Erase

command that completely wipes all data from a storage device

7
New cards

Destruction

destroying a device or storage media so no data can be recovered.

8
New cards

Certification of Disposal

proof that shows data or hardware was safely thrown away.

9
New cards

preparation

Being ready before a cyberattack happens.

10
New cards

vision for change

clear explanation of why the change is happening & the end goal

11
New cards

Implementation

putting the plan into action

12
New cards

Verification

Measuring how effective the change was

13
New cards

Documentation

Creating records of the entire process

14
New cards

Backout plan

undo changes if something goes wrong, so systems can return to normal.

15
New cards

Standard Operating Procedure (SOP)

A step-by-step guide that tells people exactly how to do a task the right way every time.

16
New cards

Asset Management

Keeping track of all company devices, software, and tools to know what you have, where it is, and how it’s being used.

17
New cards

Assignment/Accounting

Recording who is using which assets and tracking their status (like location, condition, and value) to keep everything organized and up to date.

18
New cards

Classification

Sorting data or assets into categories based on how important they are

19
New cards

Monitor/Tracking

Keeping an eye on where assets are, how they're used, and making sure nothing is lost, stolen, or misused.

20
New cards

Enumeration

gathering detailed information about a target system or network (finding weak spots)

21
New cards

Mobile Device Management (MDM)

control and protect smartphones and tablets that connect to a company’s network

22
New cards

Sanitization

The safe way to erase data so no one can recover it later.

23
New cards

Change Management

plan to safely make updates to systems or processes without causing problems.

24
New cards

Change Advisory Board (CAB)

people who review and approve changes before they happen to make sure they’re safe

25
New cards

Change owner

person responsible for making sure a change is planned,

26
New cards

Impact analysis

review to see how a change might affect systems, people, or business operations.

27
New cards

legacy application

Old software programs that are still in use but may no longer be supported or updated.

28
New cards

version control

system that tracks changes to files or code over time.