Domain 2 Asset Security Flashcards

1
Q

INFORMATION LIFECYCLE

A

Life-cycle models describe the changes an entity experiences during its
lifetime.
Information can generate other information, similar to reproduction.
The life cycle of information consists of four phases: acquisition, use,
archival, and disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACQUISITION

A

Information is typically copied or created from scratch.
Once acquired, it undergoes preparation, including the addition of
metadata and indexing.
It must be stored with policy controls, such as encryption for sensitive
data and access restrictions.
Proper planning at this stage is crucial for security and efficiency,
especially in larger organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DISPOSAL

A

Data must eventually be destroyed or transferred to another party and then
destroyed.
Ensuring data is thoroughly and correctly destroyed is essential.
Data destruction methods include wiping, degaussing, or shredding
physical devices.
Proper destruction is complex when dealing with files, database
records, or systems with multiple data copies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CLASSIFICATION PROCEDURE

A
  1. Define classification levels.
  2. Specify criteria for classifying data.
  3. Identify data owners responsible for classification.
  4. Identify data custodians responsible for maintaining security levels.
  5. Indicate required security controls for each classification level.
  6. Document any exceptions.
  7. Provide methods for transferring data custody.
  8. Review classifications periodically and communicate changes.
  9. Outline procedures for declassifying data.
  10. Include classification issues in security awareness training for all
    employees.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LAYERS OF RESPONSIBILITY

A

Senior management sets the vision, goals, and business objectives.
Functional management understands departmental roles and security
impacts.
Operational managers and staff handle detailed technical and
procedural operations.
Each layer contributes to security practices, procedures, and controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SENIOR MANAGEMENT
RESPONSIBILITY:

A

● Senior managers, especially in the C-suite, carry ultimate responsibility
for the organization.
● They are accountable for organizational failures, fraud, and ensuring
due care in information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EXECUTIVE MANAGEMENT

A

● CEOs manage daily operations, strategic planning, and company growth
but cannot delegate ultimate responsibility.
● CFOs handle accounting, financial activities, and reporting to the SEC
and stakeholders.
● CIOs oversee the strategic management of information systems and
technology integration.
● CPOs ensure data privacy and compliance with legal and regulatory
requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DATA CUSTODIAN

A

Data custodians are responsible for the day-to-
day management and maintenance of data assets, including implementing and enforcing security controls defined by the data owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SECURITY ADMINISTRATOR

A

Security administrators implement and maintain network security devices
and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SUPERVISOR

A

Supervisors manage user activity and inform security changes based on
employee status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CHANGE CONTROL ANALYST

A

Change control analysts oversee the secure implementation of changes in
the network or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DATA ANALYST

A

Data analysts ensure data is organized and stored effectively to support
business objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RETENTION POLICIES

A

● No global consensus on data retention duration; it varies by country and
sector.
● Essential to have a documented policy that’s regularly audited.
● Outsourced contracts should include data retention and eradication
terms.
● Using the longest legal retention time for all data can be impractical
and costly.
● Different business units may have different retention needs.
● Segregate data based on specific legal retention requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DATA OWNERS

A

● Responsible for data classification and approving disclosure requests.
● Senior managers usually act as data owners.
● Policies should be in place to guide decisions on data access, with
exceptions documented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DATA PROCESSORS

A

● Key to protecting or compromising data privacy.
● Need clear guidelines on acceptable behavior and policy adherence.
● Require training and routine auditing to ensure compliance with laws and
policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DATA REMANENCE

A

Data remanence refers to the residual data traces that remain on a storage medium after deletion or formatting. This residual data can be recovered and pose a security risk if not properly sanitized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PROTECTING ASSETS

A

● Physical security combats theft, service interruptions, physical damage,
unauthorized access, and compromised system integrity.
● Real loss includes replacement costs, productivity and reputation impact,
consultant fees, and the restoration of data and production levels.
● Risk analysis involves inventory and valuation of hardware and the
valuable information within.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DATA SECURITY CONTROLS
Data at Rest

A

Vulnerable to physical access and network threats.
- Encrypted data is safer, but it is not always the default setting.
- Organizations are moving towards policies requiring encryption for
sensitive information, especially on portable devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DATA SECURITY CONTROLS
Data in Motion

A
  • Most vulnerable when traversing networks.
  • Strong encryption, like TLS or IPSec, is the best protection.
  • Awareness of potential man-in-the-middle attacks is crucial.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DATA SECURITY CONTROLS
Data in Use

A
  • Resides in primary storage and is difficult to protect as it’s usually
    decrypted during use.
  • Side-channel attacks are a risk to data in use.
  • Secure software development practices are necessary to mitigate risks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MEDIA CONTROLS

A

● Media can be electronic or non-electronic and requires diverse controls
for data preservation.
● Proper environmental storage, access restrictions, and clear labeling are
key practices.
● Secure disposal methods are critical to prevent data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PROTECTING MOBILE DEVICES

A

● Mobile theft is rising with a shift from hardware to data theft.
● Protection mechanisms include inventory management, OS hardening,
encryption, and remote wiping capabilities.

23
Q

PAPER RECORDS

A

● Used for storing valuable items and data backups.
● Types include wall safes, floor safes, chests, depositories, and vaults.
● Safes should have periodic combination changes and include tamper
detection features.

24
Q

SELECTING STANDARDS

A

● Standards should be cost-effective and relevant to the asset’s value.
● Adapting existing standards involves scoping (trimming) and tailoring
(modifying) to fit specific organizational needs.

25
Q

DATA LEAKAGE

A

● Data leaks can happen even with strong controls due to employee
negligence, the most common cause.
● Costs involve remediation, notification, fines, liabilities, mitigation
expenses, and direct damages.
● A company’s reputation and individuals’ identities may be at risk.

26
Q

Employee Role and Awareness in Data Leakage

A
  • Employees often cause leaks due to a lack of security awareness.
  • Employers must include security in routine communications, training, and
    performance reviews.
  • Employees may use personal or unsecured technologies to work remotely,
    risking data security.
27
Q

DATA LEAK PREVENTION (DLP )

A

● Focused on preventing sensitive data access by unauthorized external
parties.
● Not all data is equally protected; the focus is on data considered sensitive
and valuable.
● DLP should be part of a holistic approach, integrating people, processes,
and information.

28
Q

General Approaches to DLP

A

Integration with risk management processes is crucial.
- Understanding data inventories, flows, and protection strategies is key.
- Technology alone is insufficient; a comprehensive program encompassing
policies and culture is necessary.

29
Q

Data Inventories

A
  • Identify and characterize all sensitive data within the organization.
  • Prioritize data based on importance, format, and media.
  • Understand the value and risks associated with less critical but sensitive
    data.
30
Q

Data Flows

A
  • Data must move according to business processes, requiring an
    understanding of data flows for DLP.
  • DLP sensors should be placed not just at network perimeters but also
    internally, based on data flows.
31
Q

Data Protection Strategy

A
  • Must consider the risk of adversaries gaining internal network access.
  • Strategies include backup and recovery, data life-cycle, physical security,
    security culture, privacy, and organizational change.
32
Q

Implementation, Testing, and Tuning of DLP

A
  • Select DLP solutions based on an organization’s specific requirements.
  • Testing should verify that authorized processes work and that unauthorized
    processes are prevented.
  • Continual maintenance and improvement are necessary.
33
Q

Network DLP (NDLP)

A
  • Applies data protection policies to data in motion, typically at network
    perimeters.
  • NDLP devices may not detect leaks on unprotected subnetworks or offpremises.
34
Q

Endpoint DLP (EDLP)

A
  • Applies policies to data at rest and in use on each endpoint device.
  • Offers protection at the point of data creation and while data is in use.
  • Complexity and cost are higher, with unique challenges for each endpoint.
35
Q

Hybrid DLP

A
  • Combines NDLP and EDLP for comprehensive coverage.
  • Most expensive and complex but offers the best protection across an
    enterprise.
36
Q

Data disposal

A

Data disposal is the end of the data life cycle. Once data is no longer needed or has reached the end of its retention period, it should be securely and permanently destroyed. This process, known as data disposal, is crucial in preventing unauthorized access or disclosure of the information. It involves methods like degaussing, overwriting, or physical destruction for hardware and secure deletion techniques for software. Proper data disposal practices are essential in safeguarding sensitive information, even at the end of its life cycle.

37
Q

Scoping and Tailoring

A

Scoping and tailoring help organizations adapt security control frameworks to their needs and risk environment. Scoping involves determining the appropriate boundaries and scope of the security program, while tailoring involves customizing the security controls to fit the organization’s requirements, risk appetite, and unique circumstances. Scoping and tailoring ensure that the implemented security controls are relevant and effective for the organization.

38
Q

Digital Rights Management (DRM)

A

Digital Rights Management (DRM) is a technology that controls access to and usage of digital content, such as software, documents, and multimedia files. DRM can help protect intellectual property and prevent unauthorized sharing or copying of sensitive information.

39
Q

Labels

A

Labels indicate data classification, often in the form of metadata or physical markings on documents or storage media. Labels help ensure that the appropriate security controls are applied to protect the data based on classification.

40
Q

Clearance

A

Clearance is determining an individual’s eligibility to access classified information. Clearance levels should correspond to the different data classification levels to ensure that users can only access the information they need to perform their duties.

41
Q

Business or mission owners

A

Business or mission owners are responsible for the overall strategic goals and objectives of a specific business unit or mission within an organization.

42
Q

System Owner

A

The system owner is responsible for the overall operation and security of a specific information system or application.

43
Q

Data controllers

A

Data controllers determine the purposes and means of processing personal data, while data processors are responsible for processing personal data on behalf of the data controller. Both roles have specific responsibilities under various data protection regulations, such as the GDPR.

44
Q

Physical destruction

A

Physical destruction involves the destruction of the storage medium, rendering it unusable. This method is most suitable for highly sensitive data or when the storage medium has reached the end of its useful life. Standard physical destruction techniques include shredding, incineration, and crushing.

45
Q

Degaussing

A

Degaussing is a process that removes the magnetic field from a storage medium, such as a hard disk drive or magnetic tape, effectively erasing the data. This method is suitable for the destruction of data on magnetic storage media. However, it is inadequate for solid-state drives (SSDs) or other non-magnetic storage devices.

46
Q

Overwriting

A

Overwriting involves writing new data over the existing data on a storage medium, rendering the original data unrecoverable. This method can be used for magnetic and solid-state storage devices. Overwriting software often performs multiple passes, writing different data patterns to ensure the original data is completely obliterated. Overwriting is suitable for most data destruction scenarios but may not be sufficient for sensitive data.

47
Q

Cryptographic erasure

A

Cryptographic erasure involves deleting the encryption keys to encrypt data stored on a device. Without the encryption keys, the data becomes unreadable and effectively unrecoverable. This method is suitable for encryption storage devices and allows quick data erasure without physically destroying the device.

48
Q

Secure Erase

A

Secure Erase is a built-in function in many modern storage devices, such as hard disk drives and SSDs. This feature erases all data on the device by overwriting it with a predefined pattern or triggering the machine to perform an internal block erase. Secure Erase is an effective and efficient method for data destruction, provided that the storage device supports the feature.

49
Q

General Data Protection Regulation (GDPR)

A

A comprehensive data protection regulation in the European Union that applies to organizations that process the personal data of EU residents. GDPR mandates strict data protection requirements, including obtaining consent, providing notice, and implementing appropriate security measures to protect personal data.

50
Q

California Consumer Privacy Act (CCPA):

A

A data privacy law in California that grants consumers the right to know what personal information is being collected about them, the right to delete that information, and the right to opt out of the sale of their data.

51
Q

Personal Information Protection and Electronic Documents Act (PIPEDA)

A

PIPEDA is a Canadian federal privacy law governing private sector organizations’ collection, use, and disclosure of personal information during commercial activities. PIPEDA applies to organizations operating in Canada and those that collect, use, or disclose personal information about Canadian residents across provincial or national borders.

52
Q

Privacy Rule

A

Privacy Rule: Establishes standards for the use and disclosure of PHI (Protected Health Information) by covered entities and their business associates. The Privacy Rule grants patients rights to their health information, including the right to access, amend, and control who can access their PHI.

53
Q

Security Rule

A

Requires covered entities and their business associates to implement technical, physical, and administrative safeguards to protect electronic PHI (ePHI). This includes access controls, data encryption, and regular risk assessments.

54
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

While primarily focused on healthcare data, HIPAA also includes provisions related to PII in the context of healthcare providers, insurers, and their business associates.