Assets Security Flashcards

1
Q

What are the Information Life Cycles

A

Classification
Categorization
Ownership
Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Classification

A

helps organization to understand what the data-oriented ramifications of exploitation are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Data Classification labels

A
Top Secret
Secret
Confidential
Sensitive but unclassified (SBU)
Unclassified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Data Classifications Criteria

A

Value - what is it worth
Age - How current is the information (useful if beyond 5 years?)
Useful life - At what point is it no longer worth protecting
Personal Association - Medical records, personnel files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of regulated data

A

Card Holder Data (CHD) - cc#, name, expiration
Personally Identifiable Information (PII) - name, address, SSN, DOB
Protect Health Information (PHI) - PII + related health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the roles for Data Ownership

A
Business/Mission Owner
Data (Information) Owner
System Owner
Custodians
Users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Business/Mission Owner

A

Senior Leadership
provide adequate funding and manpower to implement
enforce program policy when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Data Owner

A

Also know as Information Owner
Accountable for the data
Determines who can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is System Owner

A

Owns the OS, DB, responsible for the patching etc..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Custodians

A

Hands on to achieve data protection
Performing testing and verifying backup
Data Restoration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are users of data

A

Individuals who be granted access to use data as part of their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Data Controller

A

creates/manages sensitive data

must legally ensure security of data access by data processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Data Processor

A

3rd party that access the organization sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is degaussing

A

applying large magnetic field to erase magnetic media (hard disk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is best way to remove data

A

Degaussing

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the types of data storage & memory

A
Real, main, or primary memory
Secondary memory/storage
Write Once Read Many (WORM)
Volatile Storage
Non-volatile storage
Sequential storage
17
Q

What is primary memory/storage

A

Ram

18
Q

What is secondary memory/storage

A

Disk

19
Q

What is volatile memory

A

Directly access by CPU
SRAM/DRAM
Need power to persist

20
Q

What is non-volatile memory

A

Stored in location not accessible by CPU

Think firmware

21
Q

What is Random Access Storage

A

RAM - can access randomly

22
Q

What is sequential storage

A

Write and read in sequence - think of tape backup

23
Q

What are the types of RAM

A

Registers
SRAM (cache memory)
DRAM
General rule - fastest memory is closest to the CPU

24
Q

Programmable ROM (PROM)

A

Modified Once

Firmware

25
Q

Erasable and Programmable ROM (EPROM)

A

can be erased and reprogrammed

Not the norm

26
Q

Electrically Erasable Prom (EEPROM)

A

rewritten and rewritten
Flash drive
Firmware

27
Q

Programmable Logic Device (PLD)

A

Integrated circuit that be modified programmatically

What PROM, EPROM, EEPROM is referred to

28
Q

ISO 27002

A

Best practices

Formerly 17799

29
Q

ISO 27001

A

Auditing

30
Q

What is scoping

A

determining applicable portions of a standard that will be followed.

31
Q

What is tailoring

A

customizes a standard for an organization

Begins with scoping, then add compensating control and parameters

32
Q

What organization manages RFC (Request for Comments)

A

IETF

33
Q

What is SRAM

A

volatile, fast, less amount, cache

34
Q

What is DRAM

A

Refresh regular basis, cheapest