• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/7

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

7 Cards in this Set

  • Front
  • Back

What is hardware destruction?

This is where you destroy the ___ to protect sensitive information. It is the best option for companies with very sensitive data.

What are two formats used to destroy or recycle data and hard drives?

Standard format: a boot sector is created and a file system is set up on the disk. (low level format must be performed first).



Low-level formmat: the surface of the disk is marked with sector marks to indicate where data will be stored physically on th edisk, and tracks are created.

What is data wiping?

____ is a procedure performed to permanently delete data from a hard drive. ___ is often performed on hard drives containing sensitive data.

How often should security plans be reviewed?

Security policies should be reviewed regularly and updated as necessary. Keep a revision history to track all the policy changes.

What questions should be covered in a basic security policy?

What assets require protection? What are the possible threats? What to do in the event of a security breach? What training will be in place to educate the end users?

Who is responsible for security?

Security is the responsibility of every person within the company. All employees, including non-computer users, must be trained to understand security policy and be notified of any security policy updates.

What are the recommended password guidelines?

When creating a password make sure to include length (at least 8 characters), complexity (letters, numbers, symbols, and punctuation), variation (change passwords often), and variety (use a different password for each site or computer that you use).