Domain 2 - Asset Management Flashcards
What is data acquisition?
The creation or retrieval of data
What are top secret and confidential classifications considered to be when applied to data?
Exceptionally grave damage
What arethe secret or private data classifications considered to be?
Serious Damage
What are the confidential and sensitive data classifications considered to be?
Damage
What are labels assigned to?
Objects
What manipulates objects?
Subjects
Who are the mission and business owners in data policies?
Senior executives / management
Who are the data / information owners in data policies?
Managers. They assign sensitivity labels and backup frequency.
Who are the data custodians in data policies?
Technical employess who handle backups, restore data, patch, etc..
Who are the system owners in data policies?
Managers and they are the owner of the systems that house the data. Like the infrastructure team.
Who are the data controllers and data processors in data policies?
They create and manage sensitive data in the organization. Processors manage data for controllers.
What is non-volatile memory?
It retains data in memory even after power loss. Most common use is the BIOS. Also known as ROM (Read only memory).
What is Programmable read only memory (PROM)?
Programmable, but usually done at the factory and could not be updated.
What is Erasable Programmable read only memory (EPROM)?
erasable read only memory.
What is Electronically erasable read only memory (EEPROM)?
Electronically erasable read only memory.
Where is L1 cache located?
On the CPU and is the fastest.W
What is the definition of Sanitization in data destruction?
It is a process of rendering target data infeasible for a given level of recovery.
What is the definition of purge in data destruction?
removing sensitive data from a system or device to a point where data recovery is no longer feasible even in a lab environment.
What is degaussing?
It is used for destroying magnetic media. It is useless on SSD.
What is Cloud Access Security Broker (CASB)?
Monitors user activity and enforces security policy compliance. Think AWS config.
In discretionary access control, who gives subjects ownership of objects.
Users give access to their files.
How does access control work when dealing with mandatory access control?
Based on a subjects clearance and an object’s labels.
What is RUBAC?
Rule based access control based on IF and THEN statements. Like a firewall.
What is the focus of the Bell-Lapadula security model focus?
Confidentiality
What type of access control is Bell-Lapadula?
Mandatory Access Control
What are the properties of Bell-Lapadula
No write ups
No write down
No read or write up and down.
(Think clearances)