Domain 2: Asset Security Flashcards

1
Q

Accountability

A

Ensures that account management has assurance that only authorized users are accessing the system and using it properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset

A

Anything of value owned by an organization. Assets include both tangible items such as information systems and physical property and intangible assets such as intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baseline

A

A document, the lowest level of security configuration allowed by a standard or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Categorization

A

The process of grouping sets of data, information, or knowledge that have comparable sensitivities (impact or loss ratings), and have similar security needs mandated by law, contracts or other compliance regimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Classification

A

The process of recognizing the impacts to the organization if its information suffers any security compromise to its confidentiality-, integrity-, availability-, non-repudiation-, authenticity-, privacy-, or safety-related characteristics. Classifications are derived from the compliance mandates the organization must operate within, whether these are laws, regulations, contract-specified standards, or other business expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clearing

A

The removal of sensitive data from storage devices in such a way that there is assurance the data may not be reconstructed using normal system functions or software recovery utilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Custodian, Custodian

A

The individual who manages permissions and access on a day-to-day basis based on instructions from the data owner. Responsible for protecting an asset that has value, while in the custodian’s possession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defensible Destruction

A

Eliminating data using a controlled, legally defensible, and regulatory compliant way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Inventory

A

Complete list of items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purging

A

The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Qualitative

A

Measuring something without using numbers, using adjectives, scales, or grades.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Quantitative

A

Using numbers to measure something—usually monetary values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Recovery

A

The process of jointly addressing business resiliency and restoration of critical infrastructure and functionality after a disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Responsibility

A

Obligation for doing something. Can be delegated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Scoping

A

Limiting the general baseline recommendations by removing those that do not apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tailoring

A

The process by which a security control baseline is modified based on (i) the application of scoping guidance, (ii) the specification of compensating security controls, if needed, and (iii) the specification of organization defined parameters in the security controls via explicit assignment and selection statements.

discoverizing

17
Q

Data Loss Prevention

A

systems attempt to detect and block data exfiltration attempts

18
Q

Marking Sensitive Data

A

Ensuring data has a classification label, important for DLP systems to deny sensitive data from leaving the organization

19
Q

Data Remanence

A

the data that remains on media after the data was supposedly erased

20
Q

degausser

A

a heavy magnetic field, which realigns the magnetic fields in magnetic media such as traditional hard drives, magnetic tape, and floppy disks.

Does not work with SSDs

21
Q

Erasing

A

simply performing a delete operation against a file, or selection of files

22
Q

Digital Rights Management

A

attempts to provide copywrite protection for copyrighted works

23
Q

Cloud Access Security Broker

A

software placed logically between users and cloud based resources, monitors all activity, typically provides authentication and authz,

they BROKER the ACCESS

24
Q

Shadow IT

A

The Use of IT without approval or even knowledge of the IT department

25
Q

Tokenization

A

Use of a token, random string of characters, to replace other data

26
Q

Data Owner

A

the person who has ultimate organizational responsibility for data, they identify the classification

27
Q

Asset Owners

A

person who owns the asset or system that processes sensitive data

28
Q

Data Processor

A

any system used to process data

In GDPR, a natural or legal person, public authority, agency, or other body, which processes data solely on behalf of the the data controller

29
Q

Data Subject

A

a person who can be identified from the data

30
Q
A