Chapter 5 Protecting the Security of Assets Flashcards

1
Q

What are sample data classifications for a typical company?

A

Confidential or proprietary data would cause exceptionally grave damage to the mission of the organization.

Private information refers to data that should stay within the organization but does not meet the definition of confidential. Typically includes PII, PHI, internal employee data, and some financial data.

Sensitive information would cause damage to the mission. Might include internal network layout.

Public data is often posted publicly. Still need to think about integrity and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data remanence?

A

Data that remains on media after it was supposedly erased.

Slack space is the unused space in a disk cluster. Some systems fill this space with data from memory. Can use a degausser, but this is only useful on magnetic media. For SSDs, only disintegrators will work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is erasing?

A

Performing a delete operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is clearing?

A

AKA overwriting. Data is written over all addressable locations on the media. May not get everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is purging?

A

Prepares media for reuse. Could include repeating the clearing process multiple times, and combined with other methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is degaussing?

A

Running a magnet over magnetic tape. However, if done to a hard drive, someone could put the platters on a different drive. Doesn’t work for optical media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is cryptographic erasure?

A

Destroy the encryption keys. Should be combined with another method in case someone discovers the keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is digital rights management?

A

Attempts to provide copyright protection and prevent unauthorized use.

A DRM license grants access to a product and defines the terms of use. Typically a small file with a decryption key.

Persistent online authentication, aka always-on DRM, requires a system to be connected to the Internet to use a product. The system periodically connects with an authentication server.

Continuous Audit Trail tracks all use of the product. Combined with persistence, it can detect abuse, such as the product being used at the same time in two different locations.

Automatic expiration means that if you don’t pay to extend a subscription, access is automatically blocked.

Digital watermarks are intended to make it easier to detect the unauthorized copying of a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Cloud Access Security Broker?

A

Software placed between users and cloud-based resources. Can be on-premises or in the cloud. Monitors all activity accessing the cloud. For example, it could ensure that all data your employees are storing in the cloud is encrypted. Can be effective at detecting shadow IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Pseudonymization?

A

Using pseuodnyms to represent other data. Doing this can avoid more stringent requirements under GDPR. The process can be reversed to find the true name of the person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is tokenization?

A

Use of a token, typically a random string of characters, to replace other data. Typically used with credit cards. Difference from pseudonymization is the use of random characters instead of a fake name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is anonymization?

A

Process of removing relevant data so it is not personally identifiable. Difficult in practice. Randomized masking means swapping data in individual data so that the aggregate is still accurate, but no one line is correct. Cannot be undone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is the data owner?

A

Person with ultimate responsibility for the data. ID the classification of the data, ensure it is labeled correctly, and make sure there are security controls. Under SP 800-18, they must:

–establish the rules for appropriate use and protection of the subject data/information
–provide input to system owners regarding security requirements
–decide who has access to the information system
–Assist in the ID and assessment of the common security controls where the information resides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the responsibilities of system owners?

A

–Developing a system security plan
–Maintaining a system security plan and ensuring the system is deploying and operating
–Ensuring that system users and support personnel receive appropriate training
–Updating the system security plan as appropriate
–Assisting in the ID, implementation, and assessment of common security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the responsibilities of business owners?

A

Ensuring that systems provide value to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the responsibilities of data processors and data controllers?

A

GDPR defines a data processor as an entity that processes personal data on behalf of the data controller. For example, a third party payroll company would be the data processor. It must follow the direction of the data controller. The controller is the one that collected the data in the first place.

17
Q

What are the responsibilities of the data custodian?

A

Data owners often delegate day-to-day tasks to the custodian. The custodian helps protect the integrity and security of the data.

18
Q

What is the difference between tailoring and scoping?

A

Tailoring refers to modifying the list of security controls within a baseline to align with an organization’s mission.

Scoping refers to reviewing a list of baseline security controls and selecting only those that apply to the IT systems you’re trying to protect.