Anki - Organization Security 2 Flashcards
What is Data Handling or Document Management?
The process of managing information over it’s lifecycle - from creation to destruction
What is a Data Policy?
The security controls that will be applied to protect data.
What four roles exist in a Data Governance Policy?
- Data Owner
- Data Steward
- Data Custodian
- Privacy Officer
Describe the role of a Data Owner
Senior/Exec role, responsible for:
- Maintaining confidentiality, integrity and availability of data
- “Labeling the data” (determining who has access and the data’s sensitivity)
- Ensure and select it’s security controls (backups, access control etc)
- Selecting a Steward and Custodian
Describe the role of a Data Steward
Responsible for data quality, and must ensure data is:
- Identified/labelled appropriately (metadata)
- Collected and stored in a way that complies with laws/regulations
Describe the role of a Data Custodian
Responsible for managing the system where data is stored, including enforcing:
- Access control
- Encryption
- Backup/recovery measures
Describe the role of a Privacy Officer
Responsible for any PII (personally identifiable information) assets managed by the company.
What is Data Classification?
Classification restricts who may see the document contents based on the data’s sensitivity.
What are the five levels of data classification?
- Unclassified (public)
- Classified (private/restricted/internal use only/official use only)
- Confidential (or low)
- Secret (or medium)
- Top-Secret (or high)
How should classified, confidential, secret and top-secret data be protected?
They should all be encrypted for storage and transmission.
What is the MAC model when referring to data classification?
Mandatory Access Control
What is PII? Give some examples
Personally identifiable information
- SSN
- Name
- DOB
- Phone number
- Biometric Data
Give an example of data that is “sometimes” considered PII
A static IP address is PII, but an IP address dynamically assigned by the ISP may not be.
What is PHI? Give some examples
Protected health information
- Medical records
- Insurance records
- Hospital records
- Lab results
Why is PHI used as a target for criminals?
- PHI is valuable on the black market
- Criminals exploit data for insurance fraud or to blackmail victims
- PHI data cannot be changed unlike a credit card or bank account number