BCCA 10E Corporate Data Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

proactive measures to protect information systems from threats

1. deterrents (passwords, authentication) 2. preventive countermeasures (firewalls, encryption) 3. corrective procedures (data backups, redundant hardware) 4. detection activities (track users, file updates, changes)

items included in a disaster recovery plan

1. ensure the safety of people on the premises at the time of the disaster 2. continue critical business operations 3. minimize the duration of a serious disruption to operations 4. minimize immediate damage and prevent additional losses 5. establish management succession and emergency powers 6. facilitate effective coordination of recovery tasks

guidelines to help corporations deal with identify theft

1. help customers report scams 2. educate customers 3. manage URLs 4. monitor domain name registration 5. be prepared

threats to corporate information systems

1. natural disasters 2. power outages 3. equipment failures 4. human errors 5. software failures 6. security breaches 7. acts of war 8. malware

from the end of section E: MTBF

A (n) __________ rating of 125,000 hours means that, on average, a device could function for 125,000 hours before failing. (Hint: Use the acronym.)

from the end of section E: recovery

A disaster _________ plan describes methods for securing data against disasters and sets guidelines for reconstructing lost data.

from the end of section E: phishing

Corporate identity theft has become a major security concern because of increasing numbers of __________ scams and fake Web sites.

from the end of section E: data

Some of the most secure __________ centers are located underground in old military bunkers and abandoned mines.

from the end of section E: corrective

__________ procedures, such as data backups, can reduce the effect of a virus that spreads throughout corporate computers.

MTBF (mean time between failures)

an estimate of the length of time a device will perform before it fails

data center

specialized facility designed to house and protect computer systems and data include special security features (fireproof, power generators)

disaster recovery plan

step-by-step plan that describes the methods used to secure data against disaster and sets guidelines for how an organization will recover lost data if and when a disaster occurs

corporate identify theft

using a company's brand without authorization examples: fake sites phishing scams


Set pelajaran terkait

Smartbook 12- Population Genetics

View Set

Week 4 Pathophysiology Test 2: Units 3 and 4

View Set

AP Art History - Impressionism, Post Impressionism, Symbolism

View Set