Domain 2: Asset Security Flashcards
Data Lifecycle *6 steps)
1- Collect 2- Store 3- Use 4- Share 5- Retain 6- Destroy
Data Owner
Individuals responsible for dictating how and why data should be used; determines how the data must be secured (risk treatment); determines the appropriate value and classification of information generated by the owner or department; communicates Data Classification.
Data Controller
Determines the purposes and means of data processing. Responsible for adhering to all principles relating to processing personal data. Negotiate privacy protections / data processing agreements.
Data Custodian
Maintains the protection of data according to the information classification. Delegated by the Data Owner and is usually IT personnel.
Digital Rights Management
A set of tools and processes focused on controlling the use, modification, and distribution of intellectual property (IP) throughout its lifecycle.
Data Clearing
Digitally wiping or “Overwriting” data with zeroes (zeroing).
Data Purging
Digital destruction of data by methods including degaussing (using a strong magnetic field to destroy data).
Data Destruction
Physically destroying the media.
Data Loss Prevention (Steps)
- Discovery & Classification
- Monitoring
- Enforcement
Cloud Access Security Broker - 4 Functions
- Visibility – Provide insight into cloud usage
- Data Security – Monitor & help prevent data exfiltration
- Threat Protection
- Compliance