D320 Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/261

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

262 Terms

1
New cards

Existing State

Evaluate and understand the business processes, assets, and requirements; after collecting sufficient data, a detailed analysis is necessary; a BIA (business impact analysis) takes place.

2
New cards

BIA (Business Impact Analysis)

An assessment of the priorities given to each asset and process within the organization; analysis considers the effect (impact) any hard or loss might mean to the organization overall; identify critical paths and single points of failure; determine costs of compliance (legislative and contractual requirements mandated).

3
New cards

Metered service

The organization only pays for what it uses.

4
New cards

Rapid Elasticity

Excess capacity available to be apportioned to cloud customers.

5
New cards

Cloud bursting

Organizations use hosted cloud service to augment internal, private data center capabilities with managed services during times of increased demand; an org can rent the additional capacity as needed from an external cloud provider.

6
New cards

ROI (Return on Investment)

Term related to cost-benefit measures; used to describe a profitability ratio; calculated by dividing net profits by net assets.

7
New cards

Elasticity

Customers can contract cloud providers to use virtualization to flexibly allocate only the needed usage of each resource to the organization, while holding costs while maintaining profitability.

8
New cards

Simplicity

Allow a user to seamlessly use the service without frequently interacting with the cloud service provider.

9
New cards

Scalability

Increasing/reducing services can be easily, quickly, and cost-effectively accomplished.

10
New cards

IaaS (Infrastructure as a Service)

Most basic service; allows customer to install all software and OSs on hardware housed and connected by the cloud vendor; can be considered a warm site for BC/DR purposes.

11
New cards

PaaS (Platform as a Service)

Includes services from IaaS and OSs; vendor is responsible for patching, administering, and updating the OS; customer can install any software.

12
New cards

Data Storage Types

Used: structured/unstructured.

13
New cards

Unstructured Data Types

Qualitative data; natural-language text; incorporate media (audio, video, images); contains JSON, XML, binary objects (images encoded as text strings).

14
New cards

Structured Data Types

Quantitative data; organized and decipherable by machine learning algorithms; SQL (relational) can be used to quickly input, search, and manipulate data.

15
New cards

SaaS (Software as a Service)

Includes everything from IaaS and PaaS with the addition of software programs; vendor is responsible for administering, patching, and updating everything.

16
New cards

Public Cloud

Resources are owned and operated by a vendor and sold, leased, or rented to anyone; multitenant environments.

17
New cards

Private Cloud

Resources dedicated to a single customer; might be owned and maintained by the entity that is the sole customer.

18
New cards

Community Cloud

Features infrastructure and processing owned and operated by/for an affinity group; orgs come together to perform joint tasks and functions.

19
New cards

Hybrid Cloud

Contains elements of other models; org might want to retain some private cloud resources but lease some public cloud space.

20
New cards

Cloud Broker

Company that purchases hosting services from a provider and resells them to its own customers.

21
New cards

CASB (Cloud Access Security Broker)

Third-party entity offering independent IAM (identity and access management) services to CSPs and cloud customers.

22
New cards

Regulators

Ensure orgs are incompliance with regulatory framework for which they are responsible for; HIPAA, GLBA, PCI DSS, ISO, SOX, etc.

23
New cards

Cost-Benefit Analysis

Comparing potential positive impact (profit, efficiency, market share) of a business decision to potential negative impact (expense, detriment to production, risk).

24
New cards

FIPS 140-2

NIST document that describes the process for accrediting and cryptosystems for use by the federal government.

25
New cards

NIST 800-53

Guidance document with primary goal of ensuring appropriate security requirements and controls are applied to all US federal government information in management systems.

26
New cards

TCI (Trusted Cloud Initiative) Reference Model

Guide for cloud providers, allowing them to create a holistic architecture that customers can purchase.

27
New cards

Vendor Lock-In

Situation where a customer is unable to leave, migrate, retrieve, or transfer data to an alternate provider due to technical/nontechnical constraints.

28
New cards

Vendor Lock-Out

When a customer is unable to recover/access their own data due to provider going into bankruptcy or leaving the market.

29
New cards

Blockchain

Open means of conveying value using encryption technologies/algorithms; transactional ledger where all participants can view every transaction.

30
New cards

Containers

Logical segmentation of memory space in a device, creating two or more abstract areas that cannot interface directly.

31
New cards

Quantum Computing

Emerging technology that allows IT systems to operate beyond binary math.

32
New cards

Homomorphic Encryption

Theoretical phenomenon that allows processing of encrypted material without needing to first decrypt it.

33
New cards

STRIDE Threat Model

Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of Privilege.

34
New cards

Apache cloud stack

Open source cloud computing software for creating, managing, and deploying infrastructure cloud services.

35
New cards

Business Requirement

Operational driver for decision-making and input for risk management.

36
New cards

SPOFs (Single Points of Failure) methods to reduce

Adding redundancies; creating alternative processes; cross-training personnel; back up data; load sharing/balancing for IT assets.

37
New cards

Quantitative Risk Assessment

Use specific numerical values such as 1,2, and 3; employ a set of methods, principles, or rules for assessing risk.

38
New cards

Qualitative Risk Assessment

Use nonnumerical categories that are relative in nature; high, medium, and low; employ a set of methods, principles, or rules for assessing risk.

39
New cards

Risk

Likelihood an impact will be realized; can be reduced, never eliminated.

40
New cards

Residual Risk

When risks are mitigated by applying countermeasures and controls the remaining leftover risk is residual risk.

41
New cards

Security Considerations for Cloud

The cloud customer is always legally liable for any loss of data, even if cloud provider demonstrates negligence or malice.

42
New cards

IaaS Considerations

Customer has the most responsibility and authority; provider is responsible for building, land, connectivity, power, and hardware assets.

43
New cards

PaaS Consideration

Same as IaaS but provider controls the OSs; customer can still monitor and review software events.

44
New cards

SaaS Consideration

Customer only supplies and processes data; security controls are limited because provider supplies all needs of customer.

45
New cards

Data Ownership

Assign responsibilities according to who has possession and legal ownership of that data; roles are assigned to allocate this.

46
New cards

Data Owner

Org that collected/created the data; usually department head/business unit manager; cloud customer is usually the data owner (international treaties/frameworks refer to as the data controller).

47
New cards

Data Custodian

Person or entity tasked with the daily maintenance/administration of the data; role of proper security controls and processes as directed by the data owner; sometimes a database admin.

48
New cards

Data Processor

Any org or person who manipulates, stores, or moves the data on behalf of the data owner; cloud provider is a data processor (international law).

49
New cards

Data Lifecycle

Understand it in order (Create > Store > Use > Share > Archive > Destroy).

50
New cards

Create

Data owner will be identified in this first phase; data security and management responsibilities require action; data owner will categorize the data.

51
New cards

Data Categorization

The process of categorizing data based on various criteria such as regulatory compliance, business function, functional unit, and project.

52
New cards

Regulatory Compliance

Can categorize by specific datasets (GLBA, PCI, SOX, HIPAA, GDPR, other international, national, and local compliance).

53
New cards

Business Function

Different use of data (billing, marketing, operations).

54
New cards

Functional Unit

Department or office with its own category and data controls.

55
New cards

By Project

Define datasets by projects associated with as means of creating discrete, compartmentalized projects.

56
New cards

Data Classification

Responsibility of the data owner; assigned by the org's policy based on characteristics of dataset.

57
New cards

Sensitivity

Used by the US military; assigned to the sensitivity of the data, based on negative impact an unauthorized disclosure would cause.

58
New cards

Jurisdiction

Geophysical location of the source/storage point of the data might determine how the data is handled; PII gathered from citizens from EU is subject to the EU privacy laws.

59
New cards

Criticality

Data deems critical to org survival classified in a manner distinct from trivial, basic operational data; BIA helps determine this.

60
New cards

Data Mapping

Data between organizations (or departments) normalized and translated so it is meaningful to both parties.

61
New cards

Data Labeling

When data owner creates, categorizes, and classifies the data, it also must be labeled; should indicate who the data owner is (office or role, not name or identity).

62
New cards

Data Discovery

Used to refer several kinds of tasks to determine and accurately inventory the data under its control.

63
New cards

E-Discovery

Legal term for how electronic evidence is collected as part of an investigation/lawsuit.

64
New cards

Label-Based Discovery

Labels created will aid in any data discovery efforts; org can determine what data it controls and amounts of each kind.

65
New cards

Metadata-Based Discovery

Data about data, a listing of traits and characteristics about specific data elements/sets; can be useful for discovery purposes.

66
New cards

Content-Based Discovery

Discovery tools can be used to locate and identify specific kinds of data by delving into the content of datasets.

67
New cards

Data Analytics

Technological options to provide additional findings and assigning types to data.

68
New cards

Datamining

An outgrowth of the possibilities offered by regular use of the cloud (big data); when org collects data streams and runs queries across the feeds.

69
New cards

Real-Time Analytics

Tools can provide datamining functionality concurrently with data creation and use.

70
New cards

Agile Business Intelligence

State-of-the-art datamining involves recursive, iterative tools and processes that can detect trends and identify more oblique patterns in historical and recent data.

71
New cards

Jurisdictional Requirements

Different regions have varying levels of privacy protection and intellectual property laws.

72
New cards

IRM (Information Rights Management)

Managing information in accordance with who has rights to it; can be DRM (digital/data rights management), ERM (enterprise).

73
New cards

Intellectual Property Protections

Intangible assets of the mind.

74
New cards

Copyright

Legal protection for expressions of ideas; lasts for 70 years after the author's death/120 years after the first publication of a work for hire.

75
New cards

Trademarks

Intended to be applied to specific words and graphics; representations of an org - its brand.

76
New cards

Patents

Legal mechanism for protecting intellectual property in the form of inventions, processes, materials, decorations, and plant life; lasts about 20 years from time of patent application.

77
New cards

Trade Secrets

Has same aspects as patented material; includes aggregations of information (list of clients/supplies).

78
New cards

IRM Tool Traits

Material protected by IRM solutions need some form of labeling/metadata associated with the material for the IRM tool to function properly.

79
New cards

Rudimentary Reference Checks

Content itself can check for proper usage/ownership.

80
New cards

Online Reference Checks

Microsoft software packages requiring product key at installation; program will check against online database when connected to the Internet.

81
New cards

Local Agent Checks

User installs reference tool that checks the protected content against the user's license.

82
New cards

Presence of Licensed Media

Disks for example, is required to be present when the content is being used.

83
New cards

Support-Based Licensing

Predicated on the need of continual support for content.

84
New cards

IRM in the Cloud Complications

Challenges that arise when managing information rights in cloud environments.

85
New cards

Replication Restrictions

IRM often prevent unauthorized duplication; the cloud may create, close, and replicate virtualized host instances.

86
New cards

Jurisdictional Conflicts

Cloud extends across boundaries and borders, often posing problems when intellectual property rights are restricted by locale.

87
New cards

Agent/Enterprise Conflicts

IRM solutions that require local installation of software agents for enforcement purposes might not always function properly in the cloud environment, virtualization engines, or various platforms used in BYOD enterprise.

88
New cards

Mapping IAM and IRM

The extra layer of access control (ACLs) will cause a conflict between IRM IAM and enterprise/cloud IAM; more possible if these functions are outsourced to a third party (CASB).

89
New cards

API Conflicts

IRM tool is often incorporated into the content; usage of material might not offer the same level of performance across different applications (content readers/media players).

90
New cards

Persistent Protection

Follow the content it protects regardless of location, if it's duplicated or original file, or how it's being utilized.

91
New cards

Dynamic Policy Control

Should allow content creators and data owners to modify ACLs and permissions for the protected data under their control.

92
New cards

Automatic Expiration

Because of the nature of legal protections of intellectual property, a significant amount of digital content will not be protected in perpetuity; protection should cease when legal protections cease; licenses also expire, access and permissions for protected content should expire.

93
New cards

Continuous Auditing

Allow for comprehensive monitoring of the content's use and access history.

94
New cards

Replication Restrictions

Purpose of IRM is to restrict illegal or unauthorized duplication of protected content; IRM solutions should enforce restrictions across the many forms of copying that exist (screen-scraping, printing, electronic duplication, email attachments).

95
New cards

Remote Rights Revocation

Owner of rights to intellectual property should have ability to revoke rights at any time; used because of litigation/infringement.

96
New cards

Data Control

Protect data other than in the CREATE lifecycle phase; each aspect of data management (retention, audit, disposal) will need a specific policy addressing it.

97
New cards

Data Retention Policy

Policy that outlines how long data should be kept and under what conditions.

98
New cards

Retention Periods

Length of time organization should keep data; expressed in number of years, set by regulation/legislation; can be mandated/modified by contractual agreements.

99
New cards

Applicable Regulation

Can be mandated by statute/contract; policy should refer to all applicable regulatory guidance.

100
New cards

Retention Formats

Contain description of how data is actually archived (type of media storage, handling specifications); Ex: some types of data are required to be encrypted while in storage, policy should include description of encryption engine, key storage and retrieval procedures, and reference to regulation(s).