Chapter 5: Protecting Security of Assets Flashcards
Any data that helps an organization maintain a competitive edge
Proprietary data
Value of the data to the organization and is critical to protect data confidentiality and integrity.
data classification
Unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe.”
Top secret
Unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security
Secret
Unauthorized disclosure of which reasonably could be expected to cause damage to the national security
Confidential
Any data that doesn’t meet one of the descriptions for top secret, secret, or confidential data
Unclassified
The entity that applies the original classification to the sensitive data, and strict rules identify who can do so
Classification authority
Any information that isn’t public or unclassified.
Sensitive information
Similar to unclassified data
Public data
Data that should stay private within the organization but that doesn’t meet the definition of confidential or proprietary data
Private data
The highest level of classified data
Confidential or Proprietary data
Any data stored on media such as system hard drives, solid-state drives (SSDs), external USB drives, storage area networks (SANs), and backup tapes
Data at Rest
Any data transmitted over a network
Data in Transit
Data in memory or temporary storage buffers while an application is using it
Data in Uses
The best way to protect the confidentiality of data is to use _________ protocols
strong encryption
A physical security control and means that systems and cables from the classified network never physically touch systems and cables from the unclassified network.
Air gapped
Attempt to detect and block data exfiltration attempts. These systems have the capability of scanning unencrypted data looking for keywords and data patterns.
Data loss prevention (DLP)
There are two primary types of DLP systems:
Network-Based DLP and Endpoint-Based DLP