Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
parts of the interoperability agreement |
SLA (Service Level Agreement) BPO (Blanket Purchase Order) MOU (Memorandum of Understanding) ISA (Interconnection Security Agreement) |
|
SLA (Service Level agreement) |
defines the level of service to be provided e.g. response time and level of response |
|
BPO (Blanket Purchase Order) |
usually applicable to government agencies agreement between govt and private agency for ongoing purchases of goods and services |
|
MOU (memorandum of understanding) |
brief summary of which party is responsible for which portion of the work |
|
ISA (Interconnection Security Agreement) |
agreement between two organizations that have connected systems that documents the technical requirements. |
|
areas of a security awareness program |
importance of security responsibilities of people in the organization policies and procedures usage policies account and password selection criteria social engineering prevention |
|
Personally identifiable information (PII) |
a catchall for any data that can be used to uniquely identify an individual |
|
information categories |
public use- 20% internal use - 80% restricted use |
|
government information classifications |
unclassified- no risk of loss due to disclosure sensitive but classified-might cause harm confidential - lowest used by military secret- could cause serious irreparable damage top secret-grave threat to national security |
|
information access controls |
implicit denies least privilege job rotation |
|
regulatory agencies |
HIPAA (Health Insurance Portability and Accountability Act) The Gramm-Leach-Bliley Act CFAA (Computer Fraud and Abuse Act) FERPA (Family Educational Rights and Privacy Act) Computer Security act of 1987 (CESA) Cyberspace Electronic Security Act Cyber Security Enhancement act The Patriot Act |
|
security measures for mobile devices |
screen lock strong password device encryption remote wipe/sanitation voice encryption GPS tracking application control storage segmentation asset tracking device access control |
|
SCADA (supervisory control and data acquisition) |
refers to equipment used to mange automated factory equipment, dams, power, generators and similiar equipment -targeted by the Stuxnet virus |