Tag Archives: Corporate Data Security

Section 4.6 – Corporate Data Security – TestOut

Objective: 

This section introduces you to personal data and device security concepts and gives you practice configuring firewalls and anti-malware software on Windows. After finishing this section, you should be able to:

  • Compare and contrast classification schemes for handling confidential information.
  • Define data, network, and power redundancy and explain how they contribute to fault tolerance.
  • Explain why it’s important to back up data files.
  • Describe backup procedures for different types of data.
  • Explain the purpose of business continuity plans.
  • Describe the common components of a disaster recovery plan.
  • Describe common careers in IT security.
  • Configure Windows backup settings

Links:

Key Terms:

  • Information Sensitivity An attribute used to classify information based on the risk of public disclosure.
  • Public/Private Classification A scheme for classifying information based on different levels of public/private distinctions.
  • Government/Military Classification A scheme for classifying information based on government and military requirements.
  • Data Destruction Policy Directions for disposing and even destroying data when it’s no longer needed or when a storage device needs to be replaced.
  • Data Redundancy A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
  • Network Redundancy A method of increasing fault tolerance by providing multiple network paths between hosts.
  • Power Redundancy A method of increasing fault tolerance by providing power backups and power failover.
  • Network Attached Storage A device that contains one or more hard drives that users can access over the network.
  • Ad Hoc Backup Unscheduled backups performed periodically.
  • Regular Backup Regularly scheduled backups.
  • System Backup A backup of the system software, including operating system files.
  • Database Backup A backup of data stored in a database.
  • Local Backup Backups that are stored in the same building or even the same room as the computer systems they are taken from.
  • Off-site Backup Backups that are stored at a location far enough from a possible natural disaster while being close enough to recover the data and systems within a reasonable amount of time.
  • Disaster Recovery An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
  • Business Continuity The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
  • Systems Administrator Concerning security, a person responsible for securing networks and responding to intrusions.
  • Computer Forensics Expert A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
  • Security Analyst A person who is in charge of designing and implementing security methods to protect an organization’s computer systems and networks.

Topics Discussed:

    null
  • How do businesses classify information to keep it secure and private?
  • What are the most important components in creating fault tolerant information systems?
  • How does a good business continuity plan inform disaster recovery efforts

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 4.6: Corporate Data Security, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.

Assigned: January 27th, 2020
Teacher Pacing Due Date: January 28th, 2020