Random, seemingly unrelated facts, numbers, words or statistics.
What is Data?
Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....
What is Defense in Depth?
Set of procedures resulting from a mathematical formula to disguise or encode information.
What is a cipher? (or web browser)
A document that defines policies and processes that outline the way in which information is managed in an organization
What is Framework?
The list of computers, laptops, software, equipment owned by an organization.
What is Inventory?
An encryption method that uses two mathematically related keys, a public key, and a private key, to encrypt and decrypt data.
What is asymmetric encryption?
A random string of alphanumeric characters is used to encrypt or decrypt a message.
What is an encryption key?
Patients Health Information Privacy Law
What is HIPAA?
Consists of the three underlying core security principles of data protection.
What is CIA triad?
A mathematical function that creates a fixed length value based on the data.
What is Hashing?
Adhering to laws, regulations, and standards as set forth by a governing body
What is Compliance?
What is Malware?
An encryption method that uses a single key to encrypt and decrypt data.
What is symmetric encryption?