• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
What is a:


Service–Level Agreement (SLA)
Defines the level of service to be provided. For example what is the response time and level of response.
What is a:


Blanket Purchase Order (BPO)
Usually applicable to government agencies. It is an agreement between a government agency and a private company for the ongoing purchase of goods and/or services.
What is a:


Memorandum of Understanding (MOU)
A brief summary of which party is responsible for what portion of work.
What is an:


Interconnection Security Agreement (ISA)
An agreement between two organizations that have connected systems. The agreement documents the technical requirements of of the connected systems.
What is the:


Clean Desk Policy
A policy which states that all sensitive information should be put away when the employee is away from their desk.
What is:


Personally Identifiable Information (PII)
Any data that can be used to uniquely identify an individual.
What is:


Public Information
Information that is primarily available either to the larger public or to specific individuals who need it.
What is:


Limited Distribution Information
Information that isn't intended for release to the public. This information isn't secret, but it's private.
What is:


Full Distribution Information
Information that is released publicly. The key element of this classification involves the decision–making responsibility.
What is:


Private Information
Information that is intended only for internal use within the organization. It is information that could potentially embarrass the company, disclose trade secrets, or adversely affect personnel. It may also be referred to as working documents or work product.
What is:


Internal Information
Information that includes personnel records, financial working documents, ledgers, customer lists, and virtually any other information that is needed to run a business.
What is:


Restricted Information
Information that could seriously damage the organization if disclosed. It includes proprietary processes, trade secrets, strategic information, and marketing plans.
What is:


Unclassified Information
Information that poses no risk of potential loss due to disclosure.
What is:


Sensitive but Unclassified Information
Information that is low–level security, and that disclosure of may cause harm but wouldn't injure national defense efforts.
What is:

Confidential Information
Information that is low–level secrets it's generally the lowest level of classification used by the military. It's used extensively to prevent access to sensitive information.
What is:


Secret Information
Information that, if disclosed, could cause serious and irreparable damage to defense efforts. This information requires special handling, training, and storage.
What is:


Top Secret Information
The highest level of (known) military classification. Releasing this information poses a grave threat to national security.
What is the:


Health Insurance Portability and Accountability Act (HIPPA)
A regulation that mandates national standards and procedures for the storage, use, and transmission of personal medical information.
What is the:


Gramm–Leach–Biliey Act
Also known as the Financial Modernization Act of 1999, it requires financial institutions to develop privacy notices and to notify customers that they are entitled to privacy.
What is the:


Computer Fraud and Abuse Act (CFAA)
This act gives federal authorities, primarily the FBI, the ability to prosecute hackers, spammers, and others as terrorists. The law is intended to protect government and financial computer systems from intrusion.
What is the:


Family Education Rights and Privacy Act (FERPA)
Dictates that educational institutions may not release information to unauthorized parties without the express permission of the student, or in the case of a minor, the parents of the student. It also requires that educational institutions must disclose any records kept on a student when demanded by that student.
What is the:


Computer Security Act of 1987
Requires federal agencies to identify and protect computer systems that contain sensitive information.
What is the:


Cyberspace Electronic Security Act (CESA)
Gives law enforcement the right to gain access to encryption keys and cryptography methods.
What is the:


Cyber Security Enhancement Act
Allows federal agencies relatively easy access to ISPs and other data transmission facilities to monitor communication of individuals suspected of committing computer crimes using the internet.
What is the:

Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA PATRIOT)
This law gives the U.S. government extreme latitude in pursuing criminals who commit terrorist acts.