4.2 Explain the security implications of proper hardware, software, and data asset management Flashcards
1
Q
Data Ownership
A
Data Ownership - Identifies who maintains the confidentiality, integrity, availability, and privacy of information assets.
- Example Across Roles: Handling employee salary data in a company.
-
Data Owner:
- Role: Senior executive (e.g., CFO) defines how employee salary data is classified and who can access it. High-level responsibility for the data.
- Duties: Determines if salary data is confidential and who can view or modify it.
-
Data Steward:
- Role: Responsible for carrying out the intent of the data owner’s requirements. E.g. HR data specialist ensures salary data is accurate and correctly labeled (e.g., as confidential). Typically a business manager.
- Duties: Validates employee data before payroll processing.
-
Data Custodian:
- Role: Responsible for backing up, storage. E.g. IT team secures storage of salary data in databases and applies encryption.
- Duties: Manages backups and access control to prevent unauthorized access.
-
Data Controller:
- Role: an organization that is responsible for a dataset. E.g. HR department establishes policies on how salary data is collected and processed.
- Duties: Ensures payroll data collection complies with laws (e.g., GDPR).
-
Data Processor:
- Role: Payroll service provider processes monthly salaries under the HR department’s instruction.
- Duties: Calculates salaries, generates pay slips, and transfers payments.
-
Privacy Officer:
- Role: Monitors compliance with privacy regulations (e.g., GDPR for personal data).
- Duties: Ensures employee salary data handling aligns with privacy laws.
Memory Tip:
- Owner: Big-picture authority.
- Controller: Policy maker.
- Processor: Day-to-day executor.
- Steward: Data caretaker for quality.
- Custodian: IT-focused data guardian.
- Privacy Officer: Regulatory watchdog.
2
Q
Mobile Device Management (MDM)
A
- Manages mobile devices (smartphones, tablets, laptops, wearables).
- Enforces policies, updates software remotely, and locks or wipes lost devices.
- Reduces risks from unsecured or outdated devices.
MDM tools can block access to devices using: Tethering, Mobile hotspot, Wi-Fi Direct
3
Q
Asset Disposal and Decommissioning
A
Manages outdated assets based on NIST 800-88 guidelines.
Methods
-
Sanitization: Makes data inaccessible on storage devices.
- Overwriting: Replaces data with random bits; 1, 7, 35 passes
- Degaussing: Uses magnetic fields to erase data, rendering the device unusable.
- Secure Erase: Deletes data at the firmware level, now replaced by Cryptographic Erase (CE).
- Cryptographic Erase (CE): Deletes encryption keys to render data unreadable, allowing device reuse.
- Destruction: Physically destroys devices beyond recovery. Methods: Shredding, Pulverizing, Melting, Incinerating.
Other Terms
- Certification: Provides proof of secure disposal with audit logs
- Data Retention: Defines what data to keep and for how long.
- Data Protection: Protects all stored data from breaches. More data means higher security costs and harder analysis.