Chapter 5 Mod 1: Understand Data Security Flashcards

Data Security, System Handling, Best Practice Security Policies, Security Awareness Training

1
Q

What are the six major sets of activities that data goes through in its lifetime according to the data security life cycle model?

A

The six major sets of activities are creating, storing, using, sharing, archiving, and destroying the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the data security life cycle model align with the roles of people and organizations in handling data?

A

The data security life cycle model aligns with the roles by providing a framework for the evolution of data from creation to destruction, accommodating different roles and responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three states of data mentioned in the text, and how does the data security life cycle model contextualize them?

A

The three states are in use, at rest, and in motion. The model contextualizes these states to provide a comprehensive view of data handling from creation to disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the significance of the data security life cycle model in the context of data handling?

A

The model is significant as it helps align roles, provides a framework for data evolution, and contextualizes the different states of data, offering a holistic approach to data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

During which set of activities does data get modified, supplemented, or partially deleted?

A

Data gets modified, supplemented, or partially deleted during the “using the knowledge” set of activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does archiving fit into the data life cycle, and when does it occur?

A

Archiving occurs when data is temporarily not needed, providing a way to preserve data for future use, and it is one of the sets of activities in the data life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is destroying data an essential part of the data life cycle?

A

Destroying data is essential to the data life cycle to ensure that data is eliminated when it is no longer needed, preventing security risks and maintaining data hygiene.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the key stages in the life cycle of data, as mentioned in the text?

A

The key stages in the life cycle of data are creating, storing, using, sharing, archiving, and destroying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is it important to recognize and protect different data assets?

A

It’s crucial to recognize and protect different data assets based on their value and associated risks to prevent compromise, destruction, or unauthorized changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does government regulation, such as HIPAA or OSHA, impact data handling practices?

A

Government regulations like HIPAA and OSHA impose specific requirements on data handling practices, such as the duration for which medical records must be maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the significance of classification and labeling in data handling?

A

Classification and labeling help determine the sensitivity of data, restrict access accordingly, and ensure that access controls align with the correct level of data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some examples of regulatory requirements in the US regarding data security?

A

In the US, regulatory requirements include OSHA rules for maintaining medical records, HIPAA standards for medical data retention, and PCI DSS requirements for securely handling credit card information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is defensible destruction important in the context of data handling?

A

Defensible destruction ensures that there is a regulatory mandate supporting the decision to destroy data, and it involves secure and compliant methods to prevent any unauthorized access to the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What challenges may arise in the destruction of digital records, and how can they be addressed?

A

Challenges in the destruction of digital records include the misconception of simply emptying the virtual trash can. To address this, one needs to understand secure destruction methods and use technical equipment like degaussing for physical media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the GDPR in the European Union impact the handling of financial data?

A

The GDPR in the European Union has specific requirements regarding the handling of financial data, and organizations need to comply with these regulations to protect data properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is it crucial to classify and label data appropriately?

A

Classifying and labeling data is crucial to ensure it is treated and controlled in a manner consistent with its sensitivity. This helps protect the value of the data and prevents unauthorized access or leakage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does classification contribute to efficient design and implementation of security processes?

A

Classification leads to more efficient design and implementation of security processes by allowing the organization to treat protection needs for similarly classified information with the same control strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the significance of assessing the potential impact or loss to the organization before labeling data?

A

Assessing potential impact or loss helps in the classification process by determining the sensitivity of the data. This assessment guides the labeling, handling, and use of data based on its characteristics of confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is it important for organizations to create their classification systems?

A

Organizations need to create their classification systems to meet their specific needs. It allows them to define sensitivity levels, manage risks, and implement controls tailored to their unique business requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the common sensitivity levels and labels for classified information?

A

Common sensitivity levels include highly restricted, moderately restricted, low sensitivity (internal use only), and unrestricted public data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does data retention contribute to effective data handling practices?

A

Data retention ensures that information is kept only for as long as beneficial. It helps organizations comply with industry standards, laws, and regulations, and it reduces the volume of stored information to only necessary data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the key aspects of records retention policies, and why is it a mistake to apply the longest retention period universally?

A

Records retention policies should ensure personnel understand retention requirements, document information types, and retain information based on required schedules. Applying the longest retention period universally wastes storage, increases the risk of exposure, and may violate regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the potential security concerns associated with data remanence, and how can they be addressed?

A

Data remanence refers to data left on media after deletion, posing a security concern. To address this, steps such as clearing the device, purging the device, or physically destroying the device can be taken to reduce the risk of compromising sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why do businesses classify information, and what is the primary concern associated with not keeping information confidential?

A

Businesses classify information to recognize its value and prevent others from stealing their advantage. The primary concern is the potential loss of temporary value and importance if information is not kept confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the role of classifications in dictating rules and restrictions for information, and how does it contribute to information security?

A

Classifications dictate rules and restrictions for how information can be used, stored, or shared, contributing to information security by ensuring proper handling. They prevent the leakage of sensitive information and protect its value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the fundamental question that classification of data seeks to answer, and how does it influence the labeling, handling, and use of data?

A

The fundamental question is “Is it secret?” Classification influences the labeling, handling, and use of data by determining its sensitivity, guiding how it should be treated to maintain confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the key process in classification, and how does it relate to recognizing organizational impacts?

A

The key process in classification is recognizing organizational impacts. Classification involves assessing potential security compromises related to the characteristics of confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

From where are classifications derived, and how do they reflect an organization’s risk management approach?

A

Classifications are derived from laws, regulations, contract-specified standards, or business expectations. They reflect an organization’s risk management approach by indicating the severity of potential impacts, such as “minor disruption” or “grave threat to the organization’s existence.”

29
Q

What is the immediate benefit of classification, and how does it contribute to the efficiency of security processes?

A

The immediate benefit of classification is that it leads to more efficient design and implementation of security processes. Treating similarly classified information with the same controls strategy enhances efficiency in protecting data based on its sensitivity.

30
Q

What role do security labels play in the protection of classified information, and why is it important to assign sensitivity levels to data assets?

A

Security labels play a crucial role in implementing controls for protecting classified information. Assigning sensitivity levels to data assets is important to determine the presumed harm to the organization and the required security protection for each asset.

31
Q

Why is it reasonable to desire a simple way of assigning sensitivity levels to data assets, and what does the spectrum of needs represent?

A

It is reasonable to desire a simple way of assigning sensitivity levels to data assets for ease of management. The spectrum of needs represents varying levels of presumed harm to the organization, with higher levels requiring greater security protection.

32
Q

What cautionary note is provided regarding clear and precise boundaries between different sensitivity labels?

A

The cautionary note is that clear and precise boundaries between different sensitivity labels, such as “low sensitivity” and “moderate sensitivity,” may not exist. The distinction can be subjective and may vary based on organizational interpretations.

33
Q

How many classifications are typically manageable in professional practice, and why is it essential to strike a balance in the number of classifications?

A

Typically, two or three classifications are manageable in professional practice. It is essential to strike a balance in the number of classifications to distinguish between sets of assets with differing sensitivity/value without causing confusion. More than four classifications tend to be difficult to manage.

34
Q

Describe the characteristics and potential consequences of data with the “Highly restricted” sensitivity label.

A

Data with the “Highly restricted” sensitivity label could possibly put the organization’s future existence at risk. Compromise could lead to substantial loss of life, injury, property damage, and result in litigation and claims.

35
Q

What are the potential impacts of compromising data labeled as “Moderately restricted,” and why is it important to distinguish between sensitivity levels?

A

Compromising data with the “Moderately restricted” sensitivity label could lead to the loss of temporary competitive advantage, loss of revenue, or disruption of planned investments or activities. Distinguishing between sensitivity levels is crucial for tailoring security measures appropriately.

36
Q

What are the potential consequences of compromising data labeled as “Low sensitivity,” and why is this classification sometimes referred to as “internal use only”?

A

Compromising data with the “Low sensitivity” label could cause minor disruptions, delays, or impacts. This classification is sometimes referred to as “internal use only” to signify its limited sensitivity.

37
Q

How is “Unrestricted public data” defined, and what distinguishes it from other sensitivity labels?

A

“Unrestricted public data” is already published, and no harm can come from further dissemination or disclosure. It is distinguished by being openly available without restrictions.

38
Q

Why is it crucial for organizations to define and implement their own data retention policies?

A

Organizations need to define and implement their own data retention policies because external requirements may not be set for all types of data. These policies ensure that data is kept only for as long as it is beneficial, and they provide guidelines for destruction when data reaches its retention limit.

39
Q

What responsibilities do security professionals have in relation to data retention and destruction?

A

Security professionals are responsible for ensuring that data destruction is performed when an asset reaches its retention limit. They must maintain an accurate inventory, including the asset location, retention period requirement, and destruction requirements. Additionally, security professionals should conduct periodic reviews of retained records to reduce unnecessary information storage.

40
Q

What role do records retention policies play, and what do they indicate about an organization’s obligations?

A

Records retention policies indicate how long an organization is required to maintain information and assets. These policies guarantee that personnel understand the various retention requirements for different types of data. They also ensure that the organization appropriately documents retention requirements for each type of information, and that systems, processes, and individuals retain information in accordance with the required schedule but no longer.

41
Q

Why is applying the longest retention period to all types of information a common mistake, and what risks does it pose?

A

Applying the longest retention period to all types of information is a common mistake because it wastes storage and increases the risk of data exposure. It adds unnecessary “noise” when searching for relevant records. This practice may also violate externally mandated requirements, such as legislation, regulations, or contracts, resulting in fines or other judgments.

42
Q

What is the importance of conducting periodic reviews of retained records in organizations?

A

Conducting periodic reviews of retained records is important to reduce the volume of stored information and ensure that only necessary information is preserved. It helps organizations maintain efficient data management practices and stay in compliance with retention requirements.

43
Q

What is data remanence, and why is it considered a significant security concern?

A

Data remanence refers to the data that might be left on media even after deleting, and it is considered a significant security concern because it poses the risk of compromising sensitive information. Even after deletion, remnants of data may still be recoverable, raising potential security threats.

44
Q

What are the steps that can be taken to reduce the risk of data remanence, and what methods can be employed?

A

Steps to reduce the risk of data remanence include:

1) Clearing the device or system: Involves writing multiple patterns of random values throughout all storage media.

2) Purging the device or system: Eliminates or greatly reduces the chance of residual physical effects from the original data values.

3) Physical destruction of the device or system: Involves mechanically shredding, chopping, breaking up, etching in acid, or burning the device.

45
Q

What is the process of clearing a device or system, and what are the potential risks associated with it?

A

Clearing a device or system involves writing multiple patterns of random values throughout all storage media, a process known as “overwriting” or “zeroizing.” However, writing zeros carries the risk that a missed block or storage extent may still contain recoverable, sensitive information after the process is completed.

46
Q

Why might purging a device or system be necessary, and what does it aim to achieve?

A

Purging a device or system may be necessary to eliminate or greatly reduce the chance of residual physical effects from the writing of the original data values. It aims to ensure that even after clearing, there are no remnants or “ghosts” of data that could be recovered.

47
Q

Why is physical destruction considered the ultimate remedy to data remanence, and what are the methods involved?

A

Physical destruction is considered the ultimate remedy to data remanence because it ensures that the data is irrecoverable. Methods include mechanically shredding, chopping, breaking up, etching in acid, or burning the device. The remains may be disposed of, such as burying them in protected landfills.

48
Q

What is logging, and why is it considered the primary form of instrumentation for capturing signals generated by events?

A

Logging is the process of capturing signals generated by events within the systems environment. It is considered the primary form of instrumentation because it records measurable or observable changes in elements or resources within the system. Although logging imposes a computational cost, it is invaluable for determining accountability.

49
Q

Why do major controls frameworks emphasize the importance of organizational logging practices, and what information is typically recorded and reviewed?

A

Major controls frameworks emphasize logging practices because they are crucial for security. Recorded and reviewed information includes user IDs, system activities, dates/times of key events (e.g., logon and logoff), device and location identity, successful and rejected system and resource access attempts, and system configuration changes.

50
Q

How does logging and monitoring contribute to identifying inefficient or improperly performing systems, detecting compromises, and providing a record of system usage?

A

Logging and monitoring contribute to identifying inefficient or improperly performing systems by capturing information on system health. They also help in detecting compromises by recording unusual or unauthorized activities. Additionally, logs provide a record of how systems are used, aiding in accountability and understanding system relationships.

51
Q

Why are log reviews considered an essential function, and what purposes do they serve in terms of security assessment and testing?

A

Log reviews are essential for security assessment and testing as they help identify security incidents, policy violations, fraudulent activities, and operational problems near the time of occurrence. They also support audits, forensic analysis, and the establishment of organizational security baselines.

52
Q

What challenges are organizations likely to face in maintaining effective log management, and what measures should be taken to protect log data?

A

Organizations may face challenges such as unauthorized changes to log information, alterations to recorded messages, log file editing or deletion, and exceeding storage capacity. To protect log data, organizations must implement controls against unauthorized changes, adhere to retention policies, and take appropriate measures to preserve the integrity and confidentiality of log data, considering its sensitive nature.

53
Q

How does logging contribute to accountability in a system, and why is it considered invaluable despite the computational cost?

A

Logging contributes to accountability by recording events and changes in the system. It is considered invaluable because it provides a record of actions and helps determine who or what is responsible for specific events, despite the computational cost.

54
Q

What specific information is recommended to be recorded in log entries, and why is this information considered crucial for effective log reviews?

A

Recommended information for log entries includes user IDs, system activities, dates/times of key events, device and location identity, and system access attempts. This information is crucial for effective log reviews as it helps in identifying security incidents, policy violations, and operational problems.

55
Q

Why do log reviews play a crucial role in supporting audits, and what benefits do historic audit logs provide?

A

Log reviews play a crucial role in supporting audits by identifying security incidents, policy violations, and fraudulent activities. Historic audit logs provide benefits by helping determine if a vulnerability identified in a system has been previously exploited.

56
Q

How does the preservation of original logs contribute to the organization’s security measures, and what risks are associated with alterations to log information?

A

The preservation of original logs is essential for maintaining evidence and preventing attackers from hiding their actions. Risks associated with alterations to log information include compromised integrity, potential loss of crucial details, and challenges in identifying and responding to security incidents.

57
Q

What are some operational problems that organizations may encounter related to the logging facility, and how can organizations ensure adherence to log retention policies?

A

Operational problems related to the logging facility include alterations to recorded messages, log file editing or deletion, and exceeding storage capacity. Organizations can ensure adherence to log retention policies by implementing controls against unauthorized changes and regularly reviewing and managing log data in accordance with legal and corporate requirements.

58
Q

What is the focus of ingress monitoring, and what are some devices and tools mentioned in the text that provide logging and alerting opportunities for ingress monitoring?

A

Ingress monitoring focuses on surveillance and assessment of all inbound communications traffic and access attempts. Devices and tools for ingress monitoring include firewalls, gateways, remote authentication servers, IDS/IPS tools, SIEM solutions, and anti-malware solutions.

59
Q

How is egress monitoring related to data loss prevention (DLP), and what are some forms of data that a DLP solution should inspect when leaving the organization’s IT environment?

A

Egress monitoring is related to data loss prevention (DLP), and it aims to regulate data leaving the organization’s IT environment. A DLP solution should inspect all forms of data leaving the organization, including email content and attachments, copy to portable media, File Transfer Protocol (FTP), posting to web pages/websites, and applications/application programming interfaces (APIs).

60
Q

Name two specific tools or devices mentioned in the text that are associated with egress monitoring and data loss prevention.

A

Two specific tools or devices associated with egress monitoring and data loss prevention are firewalls and DLP solutions.

61
Q

What does SIEM stand for, and how does it contribute to ingress monitoring according to the text?

A

SIEM stands for Security Information and Event Management. SIEM solutions contribute to ingress monitoring by offering logging and alerting opportunities for all inbound communications traffic and access attempts.

62
Q

Explain the term “data leak protection” and why is it associated with egress monitoring?

A

“Data leak protection” (DLP) is associated with egress monitoring, and it refers to efforts to regulate and prevent unauthorized data leaving the organization’s IT environment. DLP solutions inspect various forms of data to prevent data leaks, ensuring sensitive information does not leave the organization without proper authorization.

63
Q

What is the primary purpose of encryption in our modern digital world?

A

The primary purpose of encryption is to protect information by keeping its meaning or content secret and making it unintelligible to someone who does not have a way to decrypt (unlock) that protected information.

64
Q

Define the terms “plaintext” and “ciphertext” as used in the context of encryption.

A

n the context of encryption, the “plaintext” refers to the original set of data, and the “ciphertext” refers to the otherwise unintelligible encrypted form of that data.

65
Q

What cryptographic service does confidentiality provide, and who is the intended recipient of the confidential information?

A

Confidentiality provides the cryptographic service of hiding or obscuring a message so that it cannot be understood by anyone except the intended recipient. The intended recipient is the authorized party who is allowed to have access to the confidential information.

66
Q

How does cryptography contribute to integrity, and what cryptographic tools are mentioned that can provide integrity services?

A

Cryptography contributes to integrity by using hash functions and digital signatures, which can provide integrity services. Hash functions and digital signatures allow a recipient to verify that a message has not been altered by malice or error. Any changes, deliberate or accidental, will result in different results (by sender and by recipient).

67
Q

In the context of integrity services, what is meant by “message integrity controls”?

A

“Message integrity controls” refer to mechanisms, such as hash functions and digital signatures, that ensure the integrity of a message. These controls allow the recipient to verify that the message has not been altered, whether deliberately or accidentally, by comparing the results obtained by the sender and the recipient.

68
Q
A