- Shuffle Toggle OnToggle Off
- Alphabetize Toggle OnToggle Off
- Front First Toggle OnToggle Off
- Both Sides Toggle OnToggle Off
How to study your flashcards.
Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key
Up/Down arrow keys: Flip the card between the front and back.down keyup key
H key: Show hint (3rd side).h key
4 Cards in this Set
Reliable systems satisfy five principles
-Information Security (discussed in Chapter 7)
Maintaining confidentiality requires that management identify which information is sensitive.
Each organization will develop its own definitions of what information needs to be protected.
Most definitions will include:
Client and customer lists
Controls to Protect Confidentiality
Storage: Encryption and access controls
Disposal: Shredding, thorough erasure, physical destruction
Overall: Categorization to reflect value and training in proper work practices
Fundamental control procedure.
Solves the interception issue.
If encrypted before sending it is a VPN, virtual private network