Chapter 5 Protecting the Security of Assets Flashcards
What are sample data classifications for a typical company?
Confidential or proprietary data would cause exceptionally grave damage to the mission of the organization.
Private information refers to data that should stay within the organization but does not meet the definition of confidential. Typically includes PII, PHI, internal employee data, and some financial data.
Sensitive information would cause damage to the mission. Might include internal network layout.
Public data is often posted publicly. Still need to think about integrity and availability.
What is data remanence?
Data that remains on media after it was supposedly erased.
Slack space is the unused space in a disk cluster. Some systems fill this space with data from memory. Can use a degausser, but this is only useful on magnetic media. For SSDs, only disintegrators will work.
What is erasing?
Performing a delete operation.
What is clearing?
AKA overwriting. Data is written over all addressable locations on the media. May not get everything.
What is purging?
Prepares media for reuse. Could include repeating the clearing process multiple times, and combined with other methods.
What is degaussing?
Running a magnet over magnetic tape. However, if done to a hard drive, someone could put the platters on a different drive. Doesn’t work for optical media.
What is cryptographic erasure?
Destroy the encryption keys. Should be combined with another method in case someone discovers the keys.
What is digital rights management?
Attempts to provide copyright protection and prevent unauthorized use.
A DRM license grants access to a product and defines the terms of use. Typically a small file with a decryption key.
Persistent online authentication, aka always-on DRM, requires a system to be connected to the Internet to use a product. The system periodically connects with an authentication server.
Continuous Audit Trail tracks all use of the product. Combined with persistence, it can detect abuse, such as the product being used at the same time in two different locations.
Automatic expiration means that if you don’t pay to extend a subscription, access is automatically blocked.
Digital watermarks are intended to make it easier to detect the unauthorized copying of a file.
What is a Cloud Access Security Broker?
Software placed between users and cloud-based resources. Can be on-premises or in the cloud. Monitors all activity accessing the cloud. For example, it could ensure that all data your employees are storing in the cloud is encrypted. Can be effective at detecting shadow IT.
What is Pseudonymization?
Using pseuodnyms to represent other data. Doing this can avoid more stringent requirements under GDPR. The process can be reversed to find the true name of the person.
What is tokenization?
Use of a token, typically a random string of characters, to replace other data. Typically used with credit cards. Difference from pseudonymization is the use of random characters instead of a fake name.
What is anonymization?
Process of removing relevant data so it is not personally identifiable. Difficult in practice. Randomized masking means swapping data in individual data so that the aggregate is still accurate, but no one line is correct. Cannot be undone.
Who is the data owner?
Person with ultimate responsibility for the data. ID the classification of the data, ensure it is labeled correctly, and make sure there are security controls. Under SP 800-18, they must:
–establish the rules for appropriate use and protection of the subject data/information
–provide input to system owners regarding security requirements
–decide who has access to the information system
–Assist in the ID and assessment of the common security controls where the information resides
What are the responsibilities of system owners?
–Developing a system security plan
–Maintaining a system security plan and ensuring the system is deploying and operating
–Ensuring that system users and support personnel receive appropriate training
–Updating the system security plan as appropriate
–Assisting in the ID, implementation, and assessment of common security controls
What are the responsibilities of business owners?
Ensuring that systems provide value to the organization.