Chapter 5: Protecting Security of Assets Flashcards
Any data that helps an organization maintain a competitive edge
Proprietary data
Value of the data to the organization and is critical to protect data confidentiality and integrity.
data classification
Unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe.”
Top secret
Unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security
Secret
Unauthorized disclosure of which reasonably could be expected to cause damage to the national security
Confidential
Any data that doesn’t meet one of the descriptions for top secret, secret, or confidential data
Unclassified
The entity that applies the original classification to the sensitive data, and strict rules identify who can do so
Classification authority
Any information that isn’t public or unclassified.
Sensitive information
Similar to unclassified data
Public data
Data that should stay private within the organization but that doesn’t meet the definition of confidential or proprietary data
Private data
The highest level of classified data
Confidential or Proprietary data
Any data stored on media such as system hard drives, solid-state drives (SSDs), external USB drives, storage area networks (SANs), and backup tapes
Data at Rest
Any data transmitted over a network
Data in Transit
Data in memory or temporary storage buffers while an application is using it
Data in Uses
The best way to protect the confidentiality of data is to use _________ protocols
strong encryption
A physical security control and means that systems and cables from the classified network never physically touch systems and cables from the unclassified network.
Air gapped
Attempt to detect and block data exfiltration attempts. These systems have the capability of scanning unencrypted data looking for keywords and data patterns.
Data loss prevention (DLP)
There are two primary types of DLP systems:
Network-Based DLP and Endpoint-Based DLP
Labeling sensitive information ensures that users can easily identify the classification level of any data.
Marking
True or False:
If media or a computing system needs to be downgraded to a less sensitive classification, it must be sanitized using appropriate procedures
True
Data that remains on media after the data was supposedly erased.
Data remanence
The unused space within a disk cluster
Slack space
Generates a heavy magnetic field, which realigns the magnetic fields in magnetic media such as traditional hard drives, magnetic tape, and floppy disk drives.
Degausser
True of False:
A degausser will remove all data remanence on an SSD
False
They are only effective on magnetic media
True or False:
The best way to destroy a SSD is by destruction using an approved disintegrator
True
Performing a delete operation against a file, a selection of files, or the entire media.
Erasing
Process of preparing media for reuse and ensuring that the cleared data cannot be recovered using traditional recovery tools.
Clearing or Overwriting
A more intense form of clearing that prepares media for reuse in less secure environments. It provides a level of assurance that the original data is not recoverable using any known methods.
Purging
Ensuring that the media cannot be reused or repaired and that data cannot be extracted from the destroyed media.
Destruction
Destroying the cryptographic key
Cryptographic Erasure
Retaining and maintaining important information as long as it is needed and destroying it when it is no longer needed
Record retention
True or False:
Pseudonymization is most useful when releasing a dataset to a third party (such as researchers aggregating data) without releasing any privacy data to the third party. Tokenization allows a third party (such as a credit card processor) to know the token and the original data.
True
A license grants access to a product and defines the terms of use.
DRM License
Requires a system to be connected with the internet to use a product.
Persistent Online Authentication
Use of a token, typically a random string of characters, to replace other data.
Tokenization
Process of removing all relevant data so that it is theoretically impossible to identify the original subject or person.
Anonymization
The person who has ultimate organizational responsibility for data.
data owner
The person who owns the asset or system that processes sensitive data.
asset owner
Any system used to process data
data processor
The person or entity that controls the processing of the data.
data controller
Helps protect the integrity and security of data by ensuring that it is properly stored and protected.
data custodian
A person who can be identified through an identifier, such as a name, identification number, or other means.
data subject
Provides a starting point and ensure a minimum security standard.
Baseline
What are the 4 baselines according to NIST SP 800-53B, “Control Baselines for Information Systems and Organizations”?
Low-Impact Baseline:
Controls in this baseline are recommended if a loss of confidentiality, integrity, or availability will have a low impact on the organization’s mission.
Moderate-Impact Baseline: Controls in this baseline are recommended if a loss of confidentiality, integrity, or availability will have a moderate impact on the organization’s mission.
High-Impact Baseline:
Controls in this baseline are recommended if a loss of confidentiality, integrity, or availability will have a high impact on the organization’s mission.
Privacy Control Baseline:
This baseline provides an initial baseline for any systems that process PII. Organizations may combine this baseline with one of the other baselines.
A part of the tailoring process and refers to reviewing a list of baseline security controls and selecting only those controls that apply to the IT systems you’re trying to protect.
scoping