Asset Security Flashcards
Why classify assets and data?
- determine how much time and effort should be spent protecting assets and data
FIPS
- FIPS PUB 199
- Federal Information Processing Standards Publication
- standards for security categorization of federal information and information systems
- Security categorization is based on CIA for each information type
- Confidentiality: how bad is it if data is accessed by unauthorized person
- Integrity: how bad is it if the data is altered
- Availability: how bad is it if the data is destroyed
- Ranking system: high impact, moderate, low for each are of CIA
What are the national security classifications of information?
- Top Secret: if disclosed would cause grave danger to national security
- Secret: cause serious damage to national security
- Confidential: cause damage to national security
SBU
- sensitive but unclassified
SSI
- sensitive security information
CUI
- controlled unclassified information
Proprietary
- data represented as intellectual property
Confidential
- only for internal use
Public
- free to distribute publicly
Owner of data
- responsible for creating policy and guidance for data
- assign values to the asset/data
- classify the asset/data
- authorize access to asset/data
Custodians of data
- implement controls and protections for data based on classification and policy
- manage, monitor, and report on data
SAM
- software asset management
- document what is in use and where in use
- audit to verify compliance/licensing
- report and correct any problems with licensing
Hardware Inventory Mangement
- document what is in use and where it is in use
- ## track (by MAC) from onboard of hardware all the way to disposal
What is the first step of Configuration Mangement?
- getting a baseline config (bc)
- BC is a security configuration profile
How do you monitor changes in Configuration Management?
- change control process
- change advisory board that approves the change
What are examples of PII?
- social security number
- driver’s license number
- passport number
- credit card number
PHI
- protected health information
-
What are examples of privacy regulations?
- GDPR
- HIPPA
COPPA
- Children’s Online Privacy Protection Rule
- rules about collecting online data regarding inviduals who are under 13 years of age
PIA
- Privacy Impact Assessment
- defines how an organization collects personal data, how it is stored, how it is shared
PTA
- Privacy Threshold Assessment
- same questions as PIA
GLBA
- Gramm-Leach-Billey Act
- Financial information