Chapter 5: Protecting Security of Assets Flashcards
Any data that helps an organization maintain a competitive edge
Proprietary data
Value of the data to the organization and is critical to protect data confidentiality and integrity.
data classification
Unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe.”
Top secret
Unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security
Secret
Unauthorized disclosure of which reasonably could be expected to cause damage to the national security
Confidential
Any data that doesn’t meet one of the descriptions for top secret, secret, or confidential data
Unclassified
The entity that applies the original classification to the sensitive data, and strict rules identify who can do so
Classification authority
Any information that isn’t public or unclassified.
Sensitive information
Similar to unclassified data
Public data
Data that should stay private within the organization but that doesn’t meet the definition of confidential or proprietary data
Private data
The highest level of classified data
Confidential or Proprietary data
Any data stored on media such as system hard drives, solid-state drives (SSDs), external USB drives, storage area networks (SANs), and backup tapes
Data at Rest
Any data transmitted over a network
Data in Transit
Data in memory or temporary storage buffers while an application is using it
Data in Uses
The best way to protect the confidentiality of data is to use _________ protocols
strong encryption
A physical security control and means that systems and cables from the classified network never physically touch systems and cables from the unclassified network.
Air gapped
Attempt to detect and block data exfiltration attempts. These systems have the capability of scanning unencrypted data looking for keywords and data patterns.
Data loss prevention (DLP)
There are two primary types of DLP systems:
Network-Based DLP and Endpoint-Based DLP
Labeling sensitive information ensures that users can easily identify the classification level of any data.
Marking
True or False:
If media or a computing system needs to be downgraded to a less sensitive classification, it must be sanitized using appropriate procedures
True
Data that remains on media after the data was supposedly erased.
Data remanence
The unused space within a disk cluster
Slack space
Generates a heavy magnetic field, which realigns the magnetic fields in magnetic media such as traditional hard drives, magnetic tape, and floppy disk drives.
Degausser
True of False:
A degausser will remove all data remanence on an SSD
False
They are only effective on magnetic media