1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Onboarding
The process of introducing and integrating new employees, contractors, or partners into a company, ensuring they understand and follow security protocols and policies.
Offboarding
The process of securely removing employees or partners from company systems when they leave, including disabling their access, conducting exit interviews, and reviewing their prior responsibilities.
Social Media Networks
Online platforms like Twitter and Facebook where users share information and communicate, requiring companies to monitor and control what is shared to prevent leaks of sensitive data.
Applications (Apps)
Software tools used by businesses for various functions, necessitating evaluation of what data these apps can access and how much information is being disclosed.
Granting Access
Providing other companies or partners with permission to access your systems or data, which should be done cautiously due to security and reputational risks.
Backdoor Risk
A vulnerability that arises when a partner's compromised system is used by attackers to access your network.
Reputation Risk
The potential damage to a company's public image if it is associated with data breaches or cyber incidents, especially involving partners.
Least Privilege Principle
A security concept that ensures users are given the minimum levels of access needed to perform their job functions.
Interoperability Agreement
A written document between two or more entities that defines the terms, goals, and procedures for working together.
Service Level Agreement (SLA)
A contract that outlines the level of service expected between two parties, including performance metrics and minimum standards.
Business Partner Agreement (BPA)
A formal agreement that defines how two businesses will work together, detailing responsibilities, terms of engagement, and management roles.
Memorandum of Agreement (MOA)
A document outlining the cooperative intentions of two organizations working toward a common goal, specifying roles and responsibilities.
Interconnection Security Agreement (ISA)
A formal agreement that outlines the security measures and technical standards required for two entities to connect their IT systems.
Privacy Considerations
Evaluations a company must make before sharing data with others, focusing on the type of data being shared and ownership.
Data Ownership
Clarifies who legally owns the data, especially when stored on external servers, important for resolving disputes.
Data Backup Responsibility
Identifies who is responsible for ensuring that data is regularly and securely backed up.
Incident Management
The process of identifying, addressing, and documenting security incidents to prevent them from escalating.
User Rights Review
A regular check to ensure that users have only the access needed for their roles.
Security Audits
Periodic reviews of user accounts, infrastructure, and security controls to ensure compliance and effectiveness.
Data Protection
Measures taken to secure company data against theft, loss, or unauthorized access.
Change Management
A structured approach for evaluating and implementing changes in company systems or operations.