Domain 2. Asset Security Flashcards
Highest Level government Data Classification Label
Top Secret
Common data classification label NOT used in government
Confidential
Data Owner
Management level, they assign sensitivity labels and backup frequency.
This could be you or a Data Owner from HR, Payroll or other departments.
Often the same as System Owner
Mission/Business Owner
Senior executives make the policies that govern our data security.
System Owner
Management level and the owner of the systems that house the data.
Often a Data Center Manager or an Infrastructure Manager.
Often the same as Data Owner
Data Custodian
Technical, hands-on employees who do the things.
Follow directions of Data Owner
Data Users
Data User is any employee, contractor or third-party provider who is authorized by the Data Owner to access information assets.
Data Controller
Same as Data Owner when Data Owner doesn’t exist.
Data Processor
Processors manage the data for Controllers. Often a third party. i.e (Outsourced Payroll)
Only approved way to deal with Top Secret data when no longer needed.
Destruction
Does Asset Handling and Management include phishing training/employee education?
YES
Who is responsible for ensuring due diligence and due care is followed?
Generally the data owner
NGO data classifications
Public
Sensitive
Private
Confidential
EOL vs EOS
End of Life vs End of Support.
End of Life: Manufacturer no longer produces a product for sale.
End of Support: Manufacturer no longer supports the product, provides replacment parts, patches, or updates.
EOS or EOSL
EOS (end-of-support) and EOSL (end-of-service-life) are synonymous terms used to describe a product or solution that is no longer actively supported by its manufacturer.
Tailoring sec controls vs Scoping sec controls
Tailoring is customizing a set of existing security controls to align with an organization’s mission and objectives.
Scoping is reviewing and selecting initial security controls for a new information system.
NIST 800-53
NIST SP 800-53 is a set of standards that federal agencies are required to meet. NIST SP 800-53 was created in response to the passage of the Federal Information Security Management Act (FISMA).
Security and Privacy Controls for Information Systems and Organizations
Anonymization
Anonymization is the process of removing data to the point that it is impossible to identify the subject(s). This is most effective with large data sets with many categories. Anonymization also cannot be reversed, making it impossible to use a secondary data set to retrace steps associated with the anonymization process. What sets it apart is anonymization can’t be reversed because the technique requires the shuffling of a large data set and no database to link that random data back to the original subject(s).