Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
7 Cards in this Set
- Front
- Back
What is hardware destruction? |
This is where you destroy the ___ to protect sensitive information. It is the best option for companies with very sensitive data. |
|
What are two formats used to destroy or recycle data and hard drives? |
Standard format: a boot sector is created and a file system is set up on the disk. (low level format must be performed first).
Low-level formmat: the surface of the disk is marked with sector marks to indicate where data will be stored physically on th edisk, and tracks are created. |
|
What is data wiping? |
____ is a procedure performed to permanently delete data from a hard drive. ___ is often performed on hard drives containing sensitive data. |
|
How often should security plans be reviewed? |
Security policies should be reviewed regularly and updated as necessary. Keep a revision history to track all the policy changes. |
|
What questions should be covered in a basic security policy? |
What assets require protection? What are the possible threats? What to do in the event of a security breach? What training will be in place to educate the end users? |
|
Who is responsible for security? |
Security is the responsibility of every person within the company. All employees, including non-computer users, must be trained to understand security policy and be notified of any security policy updates. |
|
What are the recommended password guidelines? |
When creating a password make sure to include length (at least 8 characters), complexity (letters, numbers, symbols, and punctuation), variation (change passwords often), and variety (use a different password for each site or computer that you use). |