Domain 2 Flashcards
Data Destruction Methods
Erasing
Clearing (overwriting)
Purging
Degaussing
Destruction
Erasing
performing a delete operation against a file, files, or media. data is typically recoverable
Clearing (overwriting)
preparing media for reuse and ensuring data cannot be recovered using traditional recovery tools
Purging
a more intense form of clearing that prepares media for reuse in less secure environments.
Degaussing
creates a strong magnetic field that erases data on some media.
Destruction
the final stage in the lifecycle of media and is the most secure method of sanitizing media.
Government Data Classifications
Top Secret - Exceptionally grave damage Secret - serious damage Confidential - damage (sensitive but unclassified - SBU) Unclassified - no damage
Non-Government Data Classifications
Confidential/Proprietary - Exceptionally grave damage
Private - serious damage
Sensitive - damage
Public - no damage
Data Owner
Usually a member of senior management. Can delegate some day to day duties. Cannot delegate total responsibility.
Data Custodian
Usually someone in the IT department. Does not decide what controls are
needed, but does implement controls for data owner.
If the questions mentions day-to-day it’s custodian
Data Administrators
Responsible for granting appropriate
access to personnel (often via RBAC).
User
any person who accesses data via a computing system to accomplish work tasks.
Business/Mission Owners
Can overlap with the responsibilities of the system owner or be same role
Asset Owners
Owns asset or system that processes
sensitive data and associated security plans
GDPR Term: Data Processor
A natural or legal person, public authority,
agency, or other body, which processes personal data solely on behalf of the data controller.