OSi Model, Data owners, 80

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Hardening

Act of configuring an operating system securely by updating it, creatingrules and policies to govern it, and removing unnecessary applicationsand services

2
New cards

Hardware Security Module

Physical devices that act as a secure cryptoprocessor during theencryption process

hardware devices that can reside on a computer motherboard

3
New cards

HSM

Hardware Security Module

4
New cards

Trusted Platform Module

Chip residing on the motherboard that contains an encryption key

If your motherboard doesn’t have TPM, you can use an externalUSB drive as a key

usually embedded into computer motherboards and are available as external devices

5
New cards

802.1x

Standardized framework used for port-based authentication on wired and wireless networks

Radius and TACACS+

6
New cards

Data Subject

the person who the information is about

7
New cards

Data Owner

the individual or entity responsible for the management and protection of data assets, including determining access permissions and data classification.

8
New cards

Data Controller

the entity that determines the purposes and means of processing personal data. Especially when a true data owner does not exist

9
New cards

Data Processor

an entity that processes data on behalf of a data controller, typically involved in handling the data according to the instructions provided by the controller.

10
New cards

Data Custodian

the individual or entity responsible for the safekeeping and management of data, which includes tasks such as maintaining data integrity, ensuring accessibility, and implementing security controls as directed by the data owner.

11
New cards

Data Steward

an individual responsible for managing and overseeing an organization's data assets, ensuring accuracy, privacy, and compliance with policies and regulations.

12
New cards

Data Protection Officer (DPO)

a designated individual responsible for overseeing data protection strategies and ensuring compliance with data protection laws and regulations within an organization.

13
New cards

Risk Avoidance

A strategy that requires stopping the activity that has risk or choosing a less risky alternative

14
New cards

Risk Transfer

A strategy that passes the risk to a third party

15
New cards

Risk Mitigation

A strategy that seeks to minimize the risk to an acceptable level

16
New cards

Risk Acceptance

A strategy that seeks to accept the current level of risk and the costs associated with it if the risk were realized

17
New cards

Residual Risk

The risk remaining after trying to avoid, transfer, or mitigate the risk

18
New cards

Risk appetite

is the level of risk an organization is willing to take to achieve its objectives

19
New cards

Risk tolerance

is the level of risk an organization is willing to endure or withstand before it impacts those objectives

20
New cards
21
New cards
22
New cards
23
New cards
24
New cards