• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

parts of the interoperability agreement

SLA (Service Level Agreement)


BPO (Blanket Purchase Order)


MOU (Memorandum of Understanding)


ISA (Interconnection Security Agreement)

SLA (Service Level agreement)

defines the level of service to be provided


e.g. response time and level of response

BPO (Blanket Purchase Order)

usually applicable to government agencies


agreement between govt and private agency for ongoing purchases of goods and services

MOU (memorandum of understanding)

brief summary of which party is responsible for which portion of the work

ISA (Interconnection Security Agreement)

agreement between two organizations that have connected systems that documents the technical requirements.

areas of a security awareness program

importance of security


responsibilities of people in the organization


policies and procedures


usage policies


account and password selection criteria


social engineering prevention

Personally identifiable information (PII)

a catchall for any data that can be used to uniquely identify an individual

information categories

public use- 20%


internal use - 80%


restricted use

government information classifications

unclassified- no risk of loss due to disclosure


sensitive but classified-might cause harm


confidential - lowest used by military


secret- could cause serious irreparable damage


top secret-grave threat to national security

information access controls

implicit denies


least privilege


job rotation

regulatory agencies

HIPAA (Health Insurance Portability and Accountability Act)


The Gramm-Leach-Bliley Act


CFAA (Computer Fraud and Abuse Act)


FERPA (Family Educational Rights and Privacy Act)


Computer Security act of 1987


(CESA) Cyberspace Electronic Security Act


Cyber Security Enhancement act


The Patriot Act

security measures for mobile devices

screen lock


strong password


device encryption


remote wipe/sanitation


voice encryption


GPS tracking


application control


storage segmentation


asset tracking


device access control

SCADA (supervisory control and data acquisition)

refers to equipment used to mange automated factory equipment, dams, power, generators and similiar equipment


-targeted by the Stuxnet virus