Anki - Organization Security 2 Flashcards

1
Q

What is Data Handling or Document Management?

A

The process of managing information over it’s lifecycle - from creation to destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Data Policy?

A

The security controls that will be applied to protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What four roles exist in a Data Governance Policy?

A
  • Data Owner
  • Data Steward
  • Data Custodian
  • Privacy Officer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the role of a Data Owner

A

Senior/Exec role, responsible for:

  • Maintaining confidentiality, integrity and availability of data
  • “Labeling the data” (determining who has access and the data’s sensitivity)
  • Ensure and select it’s security controls (backups, access control etc)
  • Selecting a Steward and Custodian
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the role of a Data Steward

A

Responsible for data quality, and must ensure data is:

  • Identified/labelled appropriately (metadata)
  • Collected and stored in a way that complies with laws/regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the role of a Data Custodian

A

Responsible for managing the system where data is stored, including enforcing:

  • Access control
  • Encryption
  • Backup/recovery measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the role of a Privacy Officer

A

Responsible for any PII (personally identifiable information) assets managed by the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Data Classification?

A

Classification restricts who may see the document contents based on the data’s sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five levels of data classification?

A
  • Unclassified (public)
  • Classified (private/restricted/internal use only/official use only)
  • Confidential (or low)
  • Secret (or medium)
  • Top-Secret (or high)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How should classified, confidential, secret and top-secret data be protected?

A

They should all be encrypted for storage and transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the MAC model when referring to data classification?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is PII? Give some examples

A

Personally identifiable information

  • SSN
  • Name
  • DOB
  • Phone number
  • Biometric Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give an example of data that is “sometimes” considered PII

A

A static IP address is PII, but an IP address dynamically assigned by the ISP may not be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is PHI? Give some examples

A

Protected health information

  • Medical records
  • Insurance records
  • Hospital records
  • Lab results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is PHI used as a target for criminals?

A
  • PHI is valuable on the black market
  • Criminals exploit data for insurance fraud or to blackmail victims
  • PHI data cannot be changed unlike a credit card or bank account number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is IP?

A

Intellectual property created and owned by a company. Target for competitors, foreign governments and counterfeiters.

17
Q

What is Data Retention?

A

The process to maintain the existence of and control over data in order to comply with policies/laws/regulations. E.g. Keeping audit logs for HIPAA

18
Q

What is Data Sanitation and Disposal Policy?

A

Procedures for disposing of

  • obsolete information and equipment
  • storage devices
  • paper records
19
Q

Why should you shred all paper documents before disposal, even innocuous ones?

A

Attackers “Dumpster Dive” for information for impersonation attacks (e.g. employee phone numbers or calendar appts)

20
Q

How should paper confidential or secret documents be disposed of?

A

Finer cross-shredding, incineration or pulping.

Shedders have levels that correspond to the size a sheet is reduced to. L1 is 12mm strips, L6 is 0.8x4mm.

21
Q

What is Media Sanitization or Remnant Removal?

A

The decommission of media (hard drives, flash drives/SSDs, tape media, CD and DVD ROMs, printers, old PCs)

22
Q

What are the 3 main reasons Remnant Removal is important?

A
  • Own company’s confidential data could be compromised.
  • Third-party data could be compromised
  • Software licensing could be compromised.
23
Q

Why is just formatting a hard drive or device not considered proper remnant sanitization?

A

Deleted data is marked as available for writing, and the data they contain will only be removed as new files are added.

24
Q

What is zero-filling?

A

A process of overwriting or disk wiping, where each bit is set to zero.

25
Q

What is a flaw of zero-filling?

A

Can leave patterns that can be read with specialist tools.

Better to overwrite with pseudorandom ones and zeros, but is time consuming and needs special software.

26
Q

What is low-level formatting?

A

Similar to disk-wiping, it cleans data from sectors; and does’t re-create the sector layout. Whereas at the factory, a “low-level format” creates cylinders and sectors on the disk.

27
Q

What is degaussing?

A

Exposing a disk to a powerful electromagnet to disrupt the magnetic pattern.

Requires costly machinery and usually renders the disk unusable.

28
Q

What is pulverizing?

A

Mechanically destroying the disk e.g. drill or hammer.

Not suitable for highly confidential data as fragments can be analyzed.

29
Q

How should you dispose of Optical Media?

A

Shredders - because CDs and DVDs cannot be reformatted.

30
Q

Give five methods of Media Sanitization/Remnant Removal.

A
  1. Overwriting/Disk Wiping
  2. Low-level formatting
  3. Pulverizing
  4. Degaussing
  5. Disk encryption