Asset Security Flashcards
how many financial loses are there in the CISSP material?
3
What are the Asset Security controls?
- Data Classification
- labels
- retention
- ownership of data
(page 81)
What are the main mechanisms to protect high sensitive data (such as government or military)?
- need to know
- formal access approval
- clearance
- management of labels
objects have _________?
a. ) clearance
b. ) labels
clearance
what are the data classifications criteria used by most of the governments?
- ) Top secret
- ) Secret
- ) Confidential
what is sensitive but unclassified (SBU) labeling and an example on it?
this includes sensitive data which if leaked to public won’t cause national damage but still is sensitive. example, healthcare patients information.
whats the difference between clearance and formal access approval?
clearance is a decision/determinations whether a subject can be trusted to access national security data (this decision is made after a thorough background check by an administrative judge.
formal access approval is a formal document/paper showing the approval given by the data owner to a subject to access an object, the subject must understand what he is accessing and what are the consequences should the data become lost, destroyed, or compromised.
what is data remanence ?
it’s the data left on a magnetic storage device after using noninvasive ways to deleting the data.
what is the fastest memory on the system?
- RAM
- ROM
- Cache Memory
- Register file
Cache memory is the fastest on the system
register file is the fastest portion of the CPU cache.
what type of RAM does the Cache Memory use?
- DDRAM?
- RDRAM?
- SRAM?
- RAM?
SRAM (Static)
what are the types of the Cache Memory?
- Register file
- Level 1
- Level 2
what is SSD garbage collection process?
it’s the process of taking care of unused and unerased blocks and erased in the background.
what does the USB considered?
- Firmware
- RAM
- Flash Drive
- disk drive
it’s a flash drive and it’s not affected by simple magnetic fields like a magnetic disk (tape)
what is the command used to improve the garbage collection process?
- TMR
- TRIM
- ATA
- EEPROM
TRIM is the command.
what is a cold boot attack?
it’s an attack on the RAM, it boots using the OS saved on a USB for example and takes a copy of the RAM memory and dump it on the USB. The reason is that the RAM loses data after it reboots but still some data is kept as a remanence such as the encryption keys sometimes.