Term
| ___ is important because it is the principal element of any information system. |
|
Definition
|
|
Term
| When can attacks against data happen? |
|
Definition
| when it is stored transmitted or processed |
|
|
Term
| using a ___ can prevent attacks while data is being transmitted |
|
Definition
| secure cryptographic system |
|
|
Term
| properly ___ and ___ can help protect data while it is being processed |
|
Definition
hardened hosts securely coded applications |
|
|
Term
| backups help achieve the ___ security goal |
|
Definition
|
|
Term
|
Definition
| the amount of information on a hard drive that is backed up. |
|
|
Term
| what are the three degrees of completeness in backing up |
|
Definition
only data files and directories image backup of the entire hard drive shadowing each file being worked on. |
|
|
Term
| what is the most common type of backup. describe it. |
|
Definition
file/directory data backup. only backs up data - not programs, registry settings or other customization settings |
|
|
Term
| What is a good corporate policy on deciding what to back up? |
|
Definition
|
|
Term
|
Definition
| contains the entire contents of the hard drive which is copied to backup media. This is the slowest form of backup |
|
|
Term
|
Definition
| a backup copy of each file being worked on is written every few minutes to the hard drive at another location |
|
|
Term
| What happens when shadow storage space is used? |
|
Definition
| the oldest files are deleted to make room for the newest |
|
|
Term
| what is an incremental backup? |
|
Definition
| only saves the data that was changed since the most recent backup |
|
|
Term
| what is the process for restoring an incremental backup? |
|
Definition
| first restore the full backup, then all incrementals in order. |
|
|
Term
| when are incremental backups disposed of? |
|
Definition
| during the next full backup |
|
|
Term
| traditionally, companies did ___. what is this? |
|
Definition
local backup. each computer was backed up individually meaning there was no way to enforce policy |
|
|
Term
| ___ backup is done over the network from a central ___. |
|
Definition
|
|
Term
| why is it economical to buy good backup equipment with centralized backup? |
|
Definition
| only one or two computers need the backup hardware |
|
|
Term
| ___ is when each site backs up the other. This is done in ___ |
|
Definition
continuous data protection (CDP) realtime |
|
|
Term
|
Definition
| needs high speed data transmission |
|
|
Term
|
Definition
| the client PCs in an organization back each other up |
|
|
Term
| What is the biggest issue with mesh backup? |
|
Definition
| security. when a client PC receives a backup, the user mustn't be able to read it |
|
|
Term
| what are pro's and con's of magnetic tape? |
|
Definition
lowest cost per bit store vast amounts of data
recording and read back are very slow |
|
|
Term
| what is a two tier backup? |
|
Definition
| storing information on disk then archiving on tape |
|
|
Term
| how much data can a dual layer DVD hold? |
|
Definition
|
|
Term
| What is a disk array? what are some advantages? |
|
Definition
writing data to an array of hard drives.
limits catastrophic data loss if a hard drive dies.
increased read-write performance due to writing/reading simultaneously |
|
|
Term
|
Definition
| redundant array of independent disks |
|
|
Term
How many disks are needed for the following raid levels and what are the speeds? None Raid 0 Raid 1 Raid 5 |
|
Definition
None = 1 = normal Raid 0 = 2 = very fast Raid 1 = 2 = normal Raid 5 = 3 = fast read, slow write |
|
|
Term
| what are some other names for the following RAID levels? Raid 0 Raid 1 Raid 5 |
|
Definition
| Raid 0 = striping Raid 1 = mirroring Raid 5 = distributed parity |
|
|
Term
| what is the primary disadvantage of a single drive backup system? |
|
Definition
| it can't recover from a disk failure without additional backup |
|
|
Term
| Describe Raid 0 and a disadvantage |
|
Definition
Uses process called stripping. This is writing data across multiple disks and breaks up the backup to several hard drives. If one hard drive dies, data on ALL disks are lost |
|
|
Term
|
Definition
| the client OS writes data to both the primary hard drive and the backup hard drive at the same time. It is known as mirroring. |
|
|
Term
| What is the Recovery time objective (RTO) |
|
Definition
| the time required to recover from a disaster and restore normal operations |
|
|
Term
| What is the main downside of RAID 1? |
|
Definition
| it requires a backup warehouse which is costly |
|
|
Term
| what is the recovery point objective (RPO) |
|
Definition
| the point in time BEFORE the disaster to which all prior data must be recoverable |
|
|
Term
| what is the acceptable data loss? |
|
Definition
| The amount of data that can be lost in a disaster. for example, if the last backup was a week before the disaster, then the RPO is one week and the acceptable data loss is one week of data |
|
|
Term
|
Definition
| stripes data across multiple disks to increase data transfer speeds. Reliability is provided by parity bits. RAID 5 can recover from a single drive failure, but not multidrive failure |
|
|
Term
|
Definition
it stores parts of the back up on multiple disks. For example disk 1 has: Disk 2 Has: Disk 3: part 1 part 2 parity 1&2 part 3 parity 3&4 part 4 Parity 5&6 part 5 part 6 |
|
|
Term
| where does backup management begin? |
|
Definition
| with an understanding of the current system and future needs? |
|
|
Term
| what should backup policies address? |
|
Definition
| what data should be backed up, how frequently and how frequently restorations should be tested |
|
|
Term
| What should backup encryption policies require |
|
Definition
| all backup media should be encrypted which will make backup times longer. |
|
|
Term
| what should be taken into account for retention policies for backups? |
|
Definition
business requirements legal requirements |
|
|
Term
|
Definition
| coordinated use of online storage and backup storage for messages |
|
|
Term
| lawyers can use ___ in lawsuits to dredge up messages on illegal activity |
|
Definition
|
|
Term
| what are dangers of retention? |
|
Definition
discovery process defendant must supply relevant emails potentially damaging information expensive firms must pay to complete the task |
|
|
Term
| what are two controls that are needed to reduce spreadsheet threats? |
|
Definition
testing for errors and fraud indicators spreadsheet vault servers |
|
|
Term
|
Definition
| integrated collections of data and metadata stored con computers |
|
|
Term
| most databases are ___. what is this |
|
Definition
relational databases they store data in relations commonly referred to as tables |
|
|
Term
| what are entities (in a DB). |
|
Definition
types of objects that represent: persons places things events |
|
|
Term
in a DB a row is sometimes called a ___ attributes are called each DB will have a ___ that is comprised of one, or more, attributes that uniquely identifies each row |
|
Definition
tuple or record. columns key |
|
|
Term
| what are the types of SQL triggers and what can they do? |
|
Definition
DDL and DML initiate immediate responses to prohibited behaviors |
|
|
Term
| how can you limit the viewing of data in databases? |
|
Definition
Limit access to: tables columns rows limiting granularity limiting structural information (data model |
|
|
Term
|
Definition
| level of detail in queries |
|
|
Term
| what are some popular database management systems? |
|
Definition
microsoft SQL server MySQL IBM DB2 oracle |
|
|
Term
| data coming into the DB should be ___ to remove unacceptable characters taht could be used to manipulate the SQL statement? |
|
Definition
|
|
Term
| what should be audited in a DB? |
|
Definition
logins changes (stored procedures, functions, triggers, structure, accounts/priviliges, backups, crypto) warnings exceptions special access |
|
|
Term
| what is a trigger in a DB |
|
Definition
| pieces of SQL code that are automatically run when changes are made to a DB |
|
|
Term
| what are Data Definition Language (DDL) triggers used for? |
|
Definition
| to produce automatic responses if the STRUCTURE of the DB has been altered |
|
|
Term
| what are Data Manipulation Language (DML) triggers used for |
|
Definition
| used to produce automatic responses if DATA have been altered |
|
|
Term
| what is a mulit-tiered architecture? |
|
Definition
| a type of database that separates the presentation (webserver) application processing (Middleware server) and database management (database server) functions |
|
|
Term
| what is a simple way of discouraging attacks on a DB? |
|
Definition
|
|
Term
| what are the default ports for Microsoft SQL server and MySQL? |
|
Definition
|
|
Term
|
Definition
| a solution to key loss that automatically saves the key so it can be stored off the computer |
|
|
Term
| ___ stores cryptographic keys |
|
Definition
|
|
Term
| what are the two options for encrypting information on a disk? |
|
Definition
file/directory encryption whole disk encrytpion |
|
|
Term
| encryption is typically only as strong as your ___ |
|
Definition
| login password which tend to be poor |
|
|
Term
| ___ obscures data such that it can't identify a specific person, but remains practically useful |
|
Definition
|
|
Term
| what is information triangulation? |
|
Definition
| data from multiple sources can be combined to identify individuals |
|
|
Term
| ___ restricts what people can do with data |
|
Definition
| digital rights management (DRM) |
|
|
Term
| what are the types of document restrictions? |
|
Definition
digital rights management (DRM) data extrusion management extrusion prevention |
|
|
Term
| what is the most often overlooked mechanisms used to reduce data loss? |
|
Definition
|
|
Term
| what are the four types of data deletion? describe them |
|
Definition
nominal: press delete key. doesn't actually delete data basic file: empty recycle bin. pointer referring to the data are gone, but the data in those sectors remain wiping/clearing: logically and physically erasing data so it is unrecoverable Destruction: physical destruction of the media |
|
|