Chapter 5 (Domain 2: Asset Security) Flashcards
First steps in Asset Security
Identifying and classifying information and assets
Sensitive data
Any information that isn’t public or unclassified such as confidential, proprietary, protected, or any other type of data that an organization needs to protect due to its value to the organization, or to comply with existing laws and regulations
PII
Personally identifiable information (PII) is any information that can identify an individual
PHI
Protected health information (PHI) is any health-related information that can be related to a specific person
HIPAA
Health Insurance Portability and Accountability Act (HIPAA) mandates the protection of PHI
Proprietary data
Any data that helps an organization maintain a competitive edge such as software code it developed, technical plans for products, internal processes, intellectual property, or trade secrets
Data classification
Identifies the value of the data to the organization and is critical to protect data confidentiality and integrity. Included in a security policy or data policy.
US government data classification
Top secret
Secret
Confidential
Unclassified
Non-government data classification
Confidential/Proprietary
Private
Sensitive
Public
Sensitive information
Any information that isn’t public or unclassified
Asset classification
Asset classifications should match the data classifications
What comes after Data Classification?
Define the security requirements and identify security controls to implement those security requirements
What is the best way to protect the confidentiality of data?
Strong encryption protocols, authentication and authorization controls help prevent unauthorized access.
Data breach
Any event in which an unauthorized entity can view or access sensitive data
What is the most important information that a mark or label provides? (Marking or Labeling)
Classification of the data
Example of Marking or Labeling
Digital marks or labels, header or footer in a document, embed as a watermark
How is downgrading media handled?
Requires procedures that will purge the tape of all usable data.
Many organizations prohibit downgrading media at all.
It is rare to downgrade a system.
How is physical media stored?
Devices in locked safes or vaults and/or within a secure room that includes several additional physical security controls
How is sensitive data handled when no longer needed?
Should be destroyed when no longer needed
How are acceptable methods of destroying data defined?
An organization’s security policy or data policy should define the acceptable methods of destroying data based on the data’s classification