2.4 Manage Data Life Cycle Flashcards

1
Q

At what stage of the Data Lifecycle should Data be protected?

A

EVERY STAGE | Create, Store, Use, Share, Archive, Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When should data be assigned a Classification?

A

At the moment of procurement, whether that be creation, collection, or update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Following Data Creation and Classification, what five activities are impacted by the classification level?

A

Storage, Usage, Sharing, Archiving, and Destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the Data Lifecycle, when can Data’s Classification Level Change?

A

At any level of the process. It should be protected according to the classification assigned to the lifecycle process level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the purpose of all 6 Activities contained in the Data Lifecycle? [Create, Store, Use, Share, Archive, Destroy]

A

Generation of new content, or alteration/modification of old content. | Commiting digital data to some sort of storage repository (often simultaneous with creation) | Data viewed, processed, or used in any way other than modificatoin | Information made accessible by other, such as employees, customers, and partners | Data leaves active-use and moves to long-term storage | Data is permanently detroyed using physyical or digital means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is it called when you can prove that there’s no possible way to revocer data that has been securely destroyed?

A

Defensible Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three primary data sanitization categories?

A

Destruction, Purging, and Clearing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Data Destruction? Give Examples

A

The physical destruction of media; most effective means of sanitization. | Incineration of hard drive or drilling holes in the media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Data Purging? Give Examples

A

Logical/Physical techniques used to sanitize so data cannot be reconstructed. | Degaussing by applying a magnetic field to corrupt the contained data, but can make the data unusable. Also, crypto-shredding to encrypt the data using strong algorithyms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Data Clearing?

A

Logical Techniques to sanitize data, which may be recoverable; least effecetive destruction technique. | Overwriting existing data with all 1’s or 0’s, though this can sometimes be reversed. As well, Formatting is insecure since some methods simply move pointers so the data is not accesible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of Crypto-Shredding?

A

Crypto-Shredding is used to purge data. It encrypts data meant for destruction using AES-258 or similar encryption methods. The encryption key is then immediately destroyed rending the data inaccessible unless a flaw in the encryption method is discovered or the key is brute-forced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ‘Object Reuse’ in the Data Lifecyle?

A

The act of writing over existing data media multiple times as a means of destruction. This alows the organization to reuse the data with some level of assurance that the former data can no longer be recovered while maintaining usability of the target media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should be the first choice option when looking to destroy data on an SSD?

A

Using vendor/manufacturer provided sanitization capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If you cannot get sanitization capabilities for your SSD card, what should you do to ensure the data cannot be recovered?

A

Physical Destruction (Insert Burning Elmo Meme)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the best method for ensuring destruction of data that is handled by a third-party?

A

Crypto-Shredding (Physical is also good, but likely unfeasible with cloud providers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly