Data compiled into documents, maps, charts, and other forms of information gives assets dollar _____________
What is Value?
100
The list of computers, laptops, software, equipment owned by an organization.
What is Inventory?
100
An identifier that uniquely tracks actions to individuals.
What is an Account? (or Login ID)
100
its small, acute and not very attractive to women
Ron's Peen
200
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
200
The use of personality, inowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
200
Functional managers classify data and grant approval to those whose jobs require access to the information.
Who are Data Managers?
200
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Who are organized crime groups?
300
The evidence of daily decisions and operations within DOI and its bureaus/offices.
What are Federal Records?
300
30-50% of all data loss due to the people already within the organization.
What is Insider Threat?
300
As a result of the VA breach in 2006 where PII of over a million veterans was lost, it is now a requirement to delete all sensitive data extracts on individual computers after this number of days.
What is 90 days?
300
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
What is state sponsored hacking?
400
A legal notification directing you or the bureau/office to preserve any documentary material that may berelevant to a pending or foreseable lawsuit or administrative adjudication.
What is Litigation Hold?
400
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
What is Standardization?
400
It is a word or phrase that verifies that you and only you had access to the account.
What is a Password?
400
The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.