Chap 2 - Information asset security Flashcards
what are assets
- people
- process / know-how
- facilities
- equipment
- retained knowledge
tangible assets
physical existence
intangible assets
exist in mind (e.g., brand)
IT asset mgmt lifecycle
- plan
- assign security needs
- acquire
- deploy
- manage
- retire
how to assign security needs to asset
either qualitative or quantitative.
the security needs first looks at classifying & categorizing the asset based on HARM to organization if hit
what is asset classification
process of recognizing the impact of asset if compromise based on CIA triad
what is asset categorization
process of grouping sets of data, information, knowledge that have comparable sensitivity –> similar security needs
what should classification/categorization policy include
- data classification/categorization -> criteria & process
- data access -> define role of subject who can access data
- data security -> generally available or restricted data by default
- data retention -> data retained for period of time (e.g., law -> telcos)
- data disposal -> printed VS digital
- data encryption -> if need to be encrypted and how
- appropriate use of data -> how to use the data
what are data sensitivity levels (classic)
- highly restricted
- moderately restricted
- low sensitivity / internal use
- unrestricted/ public
what are key issues related to classification & categorization
- responsibility
- accountability
what is the data security lifecycle
- creating
- storing
- using
- sharing
- archiving
- disposing
what are the key data roles (people)
- data subject -> individual who describe/identify by data
- data owner -> accountable for determining the value of the data
- data controller -> in absence of controller, he is accountable
- data steward -> responsible for the data content
- data processor -> entities that process data on behalf of controller
- data custodian -> responsible for the protection of the data (security)
what are the key data states
- data at rest
- data in motion (transit)
- data in use
what is the data lifecycle considerations
- data collection
- data location
- data maintenance
- data retention
- data remanence -> use e.g., CPU
- data destruction
what are the 3 ways for data destruction
- clearing -> overwrite data with random values also called “clobbering” or “zeroizing”
- Purging -> perform a delete operation - NOTE data may be recoverable
- physical destruction -> e.g. shred/destruct physically