Asset Security Flashcards

1
Q

Information Asset

A

Any data, device or other component of the environment that supports information or the activities of the information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Value of the asset is given by

A

owners, authorized and unauthorized users (may include cost of the responsibility or compromise of the same)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cost of the asset

A

Amount it costs to acquire, develop, maintain or replace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data States

A

At rest (Databases, data warehouses, archives, etc)

In motion (stream of moving data through any kind of network)

In use (data stored in a non-persistent digital state: RAM, CPU caches or registers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information Lifecycle

A

Collect
Store
Use
Share
Retain
Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Owner

A

Person with the responsibility for the organization’s data (CEO, President, Head of Department)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asset/System Owner

A

Person holding the asset or system that processes sensitive data. Responsible for implementing security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Processors

A

Any system that processes data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Administrators

A

Responsible for assigning appropriate access to third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Custodians

A

Data owners delegate daily tasks to custodians. Help protect data integrity and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User

A

Has the need to access the information asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Primary types of Data Classification

A

Context-based: ownership, location or other values can indicate sensitivity

Content-based: Inspecting file contents and directly identifying sensitive data

User-based: Manual assignment of data classification based on users understanding of data and classification scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Classification Process

A

Develop inventory of data assets

Assign correct value to each asset

Define classifications and criteria

Define appropriate safeguards for each classification

Apply classification labels

Implement protection and monitoring technologies

Training

Monitor, detect violations and enforce policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Commercial typical classification levels

A

Confidential
Private
Sensitive
Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly