5 - 2: Hardware and Data Security Flashcards
1
Q
Data lifecycle
A
1) Create 2) Store 3) Use 4) Share 5) Archive 6) Destroy
2
Q
Data destruction
A
NIST guidelines (800-88): Clearing, Purging, Destroying
3
Q
Data Clearing
A
Overwrites new data on top of sensitive data
4
Q
Data Purging
A
More advanced clearing which may involve encrypting and degaussing to damage magnets
5
Q
Data Destruction
A
Obliterates media
6
Q
Destroying paper
A
Shredding, Pulping (reused with chemicals for recycling), Burned
7
Q
Physical devices
A
Keep them encrypted to protect the data
8
Q
USB data blockers
A
Prevent computers from recognizing removable USB devices
9
Q
Theft protection
A
Locking cables, safes, vaults, laptop cabinets, identifying tags for return and indicating theft