Network Security,chapter 14

Security

25 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
(AUP) acceptable use policy
Policy that defines the actions users may perform while accessing systems and networking equipment
Andragogical
Instructional approach for teaching adults
Change management policy
Policy that defines how changes will be managed and documented
Classification of information policy
Policy to produce a standardized framework for classifiying information assets
Computer hoax
E-mail message containing a false warning to the recipient of a malicious entity circulating through the internet
Disposal and destruction policy
Policy that addresses the disposal of resources that are entity circulating through the internet
Due care
Obligations that are imposed on owners and operators of assets to exercise reasonable care of the assets and take necessary precautions to protect them
Due process
Principle of treating all accused persons in an equal fashion using established rules and principles
Dumpster diving
Digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away.
Ethics policy
Policy intended to be a central guide and reference for employee in support of day to day decision making
Google phishing
Phishing that involves phisher setting up their own search engines to direct traffic to illegitimate sites
Guideline
A collection of suggestions that should be implemented
Password management and complexity policy
Policy that addresses how passwords are created and managed
Pedagogical
Instructional approach for teaching children
PII (personally identifiable information policy
Policy that outlines how the organization uses personal information it collects