Asset Security Flashcards

1
Q

is a process used in
information security to categorize data based on
its level of sensitivity and importance.

A

Information Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is to protect sensitive
information by implementing appropriate security
controls based on the level of risk associated with
that information

A

Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

There are several different classification schemes that organizations can use, but they
generally include a few common levels of classification, such as:

A

Public
Internal
Confidential
Secret
Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Information that is not sensitive and can be shared freely with anyone.
A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information that is sensitive but not critical, and should only be shared
within the organization.

A

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Information that is sensitive and requires protection, and should only
    be shared with authorized individuals or groups.
A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information that is extremely sensitive and requires the highest level of
protection, and should only be shared with a select group of authorized individuals.

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information that if disclosed would cause exceptionally grave damage
to the national security and access to this information is restricted to a very small
number of authorized individuals with a need-to-know.

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

also includes a process of
labeling the information with the appropriate
classification level and implementing access controls to
ensure that only authorized individuals can access the
information. This is done through the use of security
technologies such as firewalls, intrusion detection
systems, and encryption.

A

Information Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to classify Information?

A
  1. Assigning value to the information assets .
  2. Label each information asset.
  3. Method of handling each information asset.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assigning Value to Information Assets

A
  1. Confidential Information
  2. Classified Information
  3. Restricted Information
  4. Internal Information
  5. Public Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This system can use numeric
or alphabetic order, as long as it’s easy to understand and
follow.

A

Labeling System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a fundamental concept within data governance that plays a
crucial role in ensuring the effective management, accountability, and
utilization of data assets.

A

Data Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

refers to the designation of authority over specific sets of
data. It defines who has the legal right to control, utilize, and manage that
data.

A

Data Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

involves responsibility for the
maintenance, operation, and security of a specific IT system.

A

System Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ensures the system runs smoothly, is updated regularly, and is
protected against security threats.

A

System Owner

17
Q

Importance of Data Ownership

A

Accountability and Decision-Making
Data Governance Framework
Data Quality and Integrity
Compliance and Regulatory Requirements

18
Q

Data ownership provides a clear line
of accountability for the management and integrity of data. When a
designated owner is responsible for a specific data set, they take ownership
of its quality, accuracy, and compliance with regulatory requirements. This
accountability ensures that data-related decisions can be made promptly,
leading to faster and more effective decision-making processes.

A

Accountability and Decision Making

19
Q
  • Data ownership plays a pivotal role in ensuring
    data quality and integrity. When data ownership is clearly assigned, the
    designated owner takes responsibility for maintaining data accuracy,
    completeness, and consistency. They are motivated to implement data quality
    measures, establish data validation processes, and enforce data governance
    policies to safeguard data integrity.
A

Data Quality and Integrity

20
Q

Data ownership serves as a foundational
element of a robust data governance framework. It establishes roles,
responsibilities, and decision-making authority, enabling organizations to
define and enforce data-related policies, standards, and processes. Without
clear data ownership, data governance initiatives can become fragmented,
leading to inconsistent practices and hindered data management efforts.

A

Data Governance Framework

21
Q

Data ownership is closely linked to
compliance with regulatory requirements. Designating data owners ensures that
individuals are accountable for understanding and adhering to data protection
and privacy regulations. Data owners can monitor data usage, implement
necessary security measures, and ensure compliance with legal obligations,
mitigating risks associated with data breaches and non-compliance.

A

Compliance and regulatory Requirements

22
Q

Privacy concerns have become increasingly significant as more personal and
sensitive data is collected and shared online. Here are some key aspects to
consider:

A

Privacy Concerns
Privacy Laws
Measures to Protect Personal Data

23
Q

Privacy Concerns:

A

Data Breaches
Surveillance
Data Misuse

24
Q

Unauthorized access to personal data can lead to identity theft,
financial loss, and privacy violations.

A

Data Breaches

25
Q

Governments and organizations may monitor individuals’
activities, raising concerns about privacy and civil liberties.

A

Surveillance

26
Q

Companies may use personal data for purposes beyond what
users consented to, such as targeted advertising or selling data to third parties.

A

Data Misuse

27
Q

This EU regulation provides
comprehensive data protection and privacy for individuals within the European
Union. It mandates strict consent requirements and gives individuals the right to
access and delete their data.

A

GDPR

28
Q

In the U.S., _____
protects sensitive health information from being disclosed without the patient’s
consent or knowledge.

A

HIPAA

29
Q

This law gives California residents the
right to know what personal data is being collected about them, to whom it is
being sold, and the ability to access and delete their data.

A

CCPA

30
Q

Measures to Protect Personal Data

A

Encryption
Access Controls
Regular Audits
User EDucation

31
Q

Encrypting data ensures that it is unreadable to unauthorized
users.

A

Encryption

32
Q

Conducting regular audits and assessments can help identify
and mitigate potential vulnerabilities

A

Regular Audits

33
Q

Implementing strict access controls helps ensure that only
authorized individuals can access sensitive data.

A

Access Controls

34
Q

Educating users about privacy risks and safe practices can
empower them to protect their own data

A

User Education

35
Q

In 2024, _______ issued an executive order to protect Americans’
sensitive personal data from exploitation by countries of concern. This order
includes regulations to safeguard genomic data, biometric data, personal health
data, geolocation data, financial data, and other personal identifiers.

A

President Biden

36
Q

Privacy Laws

A

GDPR
HIPAA
CCPA