Asset Security Flashcards

1
Q

What is the purpose of classification?

A

To drive what CONTROLS must be put in place to protect the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three C’s of classification?

A

Cost: Determine the value of the data.
Classify: Create criteria for classification.
Controls: Determine the baseline security configuration for each classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who determines the classification of data?

A

The Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who maintains the data?

A

Data Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the military classification labels from highs to lowest?

A

Top Secret
Secret
Sensitive, but unclassified (SBU)
Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are classification terms normally associated with nongovernmental organizations?

A

Private
Proprietary
Sensative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe some steps for system hardening and baselining.

A
  1. Remove unnecessary services
  2. Install latest patches
  3. Rename default accounts
  4. Change default settings
  5. Enable security configurations like auditing, firewalls, updates, etc.
  6. Don’t forget physical security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What comprises the actions that organizations take to prevent unauthorized EXTERNAL parties from gaining access to sensitive data?

A

Data Leak Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of DLP pertains to data in motion?

A

Network Data Loss Prevention

NDLP products are normally implemented as appliances that are deployed at the perimeter of an organizations’ network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of DLP pertains to data at rest?

A

Endpoint DLP

Software running on each protected endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of DLP pertains to data in use?

A

Endpoint DLP

Software running on each protected endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should a data retention policy contain?

A

Address what data is to be retained, where, how, and for how long.

Must consider legal, regulatory, and operational requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the NIST SP that provides guidelines to combat data remanence?

A

NIST SP 800-88 “Guidelines for Media Sanitization”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the term for the process of removing or reducing magnetic field patterns on conventional disk drives or tapes?

A

Degaussing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the 4 step information life cycle?

A

Acquisition
Use
Archival
Disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The methodology that identifies the path to meet user requirements.

A

Data Modeling

17
Q

The residual physical representation of data that has been in some way erased.

A

Data Remanence

18
Q

The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique.

A

Purging

19
Q

An assessment of quality based on standards external to the process and involves reviewing of the activities and quality control processes to ensure final products meet predetermined standards of quality.

A

Quality Assurance

20
Q

An assessment of quality based on internal standards, processes, and procedures established to control and monitor quality.

A

Quality Control (QC)