5.1 - CompTIA Security+

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Guidelines

Documentation that provides best practices and suggestions on completing tasks effectively and helping individuals comply with relevant policies.

2
New cards

Policies

Strictly enforceable rules that determines how tasks should be completed.

3
New cards

Acceptable Use Policy (AUP)

A policy that outlines the proper use of an organization's information technology resources.

4
New cards

Information security policies

Documents detailing requirements for protecting technology and information assets from threats and misuse.

5
New cards

Business continuity policies

Documents ensuring an organization maintains normal operations during or after an adverse event.

6
New cards

Disaster recovery policies

Documentation detailing steps to restore operations to normal after an adverse event.

7
New cards

Incident response policies

A structured approach followed after a security breach, detailing steps for identifying, controlling, and mitigating incidents.

8
New cards

Software Development Lifecycle (SDLC) policies

Policies governing the planning, analysis, design, implementation, and maintenance of software development.

9
New cards

Change management policies

Policies outlining how changes to IT systems and software are requested, reviewed, approved, and implemented.

10
New cards

Standards

Expected outcome or state of a task that has been performed in accordance with policies and procedures - can be determined internally, or measured against external frameworks.

11
New cards

Password standards

Standards for creating and managing secure passwords, including complexity and transmission requirements.

12
New cards

Access control standards

Standards outlining authorized uses for systems/data and access control models.

13
New cards

Physical security standards

Standards for the physical protection of IT assets, including surveillance and visitor management.

14
New cards

Encryption standards

Standards defining methods and protocols for securing data through encryption techniques.

15
New cards

Procedures

Documents that provide step-by-step instructions and checklists for ensuring tasks are completed in ways that comply with organizational policies.

16
New cards

Onboarding/offboarding procedures

Procedures determining how individuals are introduced to or leave an organization.

17
New cards

Playbooks

Documents outlining how security protocols and procedures should be implemented.

18
New cards

Regulations

Legal rules and guidelines formulated to safeguard digital information and systems.

19
New cards

Legal requirements

Formal processes for the IT team to report illegal activities and maintain data storage compliance.

20
New cards

Industry requirements

Formal processes for managing security specific to different industries.

21
New cards

Local/regional security requirements

Regulations for implementing security measures to safeguard sensitive data in local areas (e.g., CCPA)

22
New cards

National security requirements

Regulations for security implementation at a national level.

23
New cards

Global security requirements

Regulations for security implementation on a multinational level (e.g., GDPR).

24
New cards

Monitoring and revision

The process of regularly evaluating and updating security procedures.

25
New cards

Governance boards

Groups of senior executives responsible for setting strategy and ensuring compliance.

26
New cards

Governance committees

Leaders responsible for defining policies and standards within a domain.

27
New cards

Government entities

Organizations that create and enforce regulations impacting cybersecurity practices.

28
New cards

Centralized security governance

A model where security is managed by a single authority for consistency.

29
New cards

Decentralized security governance

A model allowing individual units to develop their own protocols.

30
New cards

Owner (data governance)

A senior role responsible for maintaining data confidentiality, integrity, and availability.

31
New cards

Controller (data governance)

An entity that determines the reasons and methods for data handling.

32
New cards

Processor (data governance)

An entity that stores or analyzes personal data on behalf of the data collector.

33
New cards

Custodian/steward (data governance)

Individuals responsible for managing systems storing data assets and enforcing security measures.