Domain 2: Asset Security Flashcards
Familiarize yourself with terminology for asset classification, data handling, and privacy protection.
Define:
Arbitration
The process in data transmission that determines which device has control over a communication line at any given time to prevent data collisions on shared networks.
In the context of data transmission, arbitration is the process used to determine which device has control over the communication line at any given time. In a network where multiple devices may need to transmit data simultaneously, an arbitration mechanism ensures that only one device transmits at a time to avoid data collisions. This process is particularly crucial in bus networks or other shared-medium networks where the possibility of data collision is high.
Define:
ASCII
The American Standard Code for Information Interchange, a character encoding standard assigning unique 7-bit binary numbers to represent text in computers.
ASCII, or the American Standard Code for Information Interchange, is a character encoding standard used to represent text in computers and other devices that use text. Each letter, digit, or symbol is assigned a unique 7-bit binary number. ASCII is foundational for many protocols and data manipulation processes, and understanding its role can be crucial in tasks such as data forensics and network traffic analysis.
Or visit this Wikipedia page.
Define:
Asset
Any valuable component within an environment, tangible such as hardware or intangible like data, that supports information-related activities and requires protection.
An asset, in the context of security, is any data, device, or other component of the environment that supports information-related activities. Assets generally hold value for an organization and can be tangible, such as a server or a workstation, or intangible, such as proprietary data or intellectual property. The protection of these assets is the primary focus of security strategies.
For more information, view this lecture on External dependencies in BIA. Or visit this Wikipedia page.
Define:
Asset Inventory
A comprehensive list of an organization’s assets, including hardware, software, and other resources, crucial for effective vulnerability and incident management.
A comprehensive list or record of an organization’s assets. It includes all types of assets, like hardware, software, data, and other resources, detailing their configuration, location, and ownership. Regularly updating and maintaining the asset inventory is key for effective vulnerability management, incident response, and overall risk management.
For more information, view this lecture on BIA (Business Impact Analysis). Or visit this Wikipedia page.
Define:
Asset Security
The protective measures and strategies implemented to safeguard an organization’s assets, both physical and digital, to ensure their secure and continuous operation.
The practice of safeguarding an organization’s assets, which encompasses both physical and digital forms, to prevent unauthorized access, theft, and damage. This involves implementing security controls like access management, encryption, physical security measures, and regular security audits to ensure the confidentiality, integrity, and availability of assets.
Define:
Backup Tapes
Backup tapes are magnetic storage media used to archive and recover large volumes of data, ensuring business continuity and compliance with retention policies.
Organizations rely on backup tapes for cost-effective, offsite data storage, safeguarding critical information from hardware failures, ransomware, or accidental deletions. They are typically stored in secure facilities, protecting them from physical or environmental hazards. While restoration can be slower compared to disk-based systems, backup tapes remain a trusted medium for long-term archival solutions, proving essential in disaster recovery strategies.
For more information, view this lecture on Data Handling, Data Storage, and Data Retention. Or visit this Wikipedia page.
Define:
Cache Memory
A type of computer memory storing frequently accessed data for quick retrieval, improving system performance, but requiring careful management to prevent side-channel attacks.
A type of computer memory that temporarily stores frequently used data for quick access. By leveraging cache memory, a system can significantly improve its performance and efficiency, as fetching data from the cache (located close to the processor) is faster than obtaining it from primary memory locations. Cache memory management is essential to avoid possible vulnerabilities, such as cache-based side-channel attacks.
For more information, view this lecture on Memory and Data Remanence. Or visit this Wikipedia page.
Define:
Cell
A fundamental unit of data storage in a grid within databases or spreadsheets, holding data pieces like text, numbers, or formulas, requiring proper management for data security.
In the context of computer systems, a cell is a fundamental unit of data storage, often found in a grid within a database or a spreadsheet. Each cell is identified by its unique address, resulting from the combination of its corresponding row and column labels, and can hold a piece of data such as a text string, a number, or a formula. Proper cell management, including access controls and data encryption, is crucial to prevent unauthorized data access or manipulation, ensuring data integrity and confidentiality.
Or visit this Wikipedia page.
Define:
Cell Suppression
A data protection technique in statistical databases that withholds certain cells to ensure the privacy of sensitive information, preventing disclosure and re-identification.
A data protection technique used in statistical databases to ensure the privacy and confidentiality of sensitive information. By intentionally withholding (suppressing) the publication of certain data cells (individual entries or values) in a released table, this method prevents the disclosure of information that could be used to identify individuals or confidential attributes, especially in tables with small cell counts. Cell suppression is a form of data anonymization aimed at reducing the risk of re-identification in datasets that are shared or published for research, analysis, or public use.
Or visit this Wikipedia page.
Define:
Certification Of Systems
Evaluating a system against criteria or standards to ensure it meets requirements for quality, performance, and security, often involving testing and review.
The formal process by which a system is evaluated against predefined criteria or standards to ensure it meets certain requirements related to quality, performance, and security. System certification often involves rigorous testing, analysis, and review by independent assessors or certifying bodies. In the context of IT and cybersecurity, certification might assess a system’s compliance with security standards, such as ISO/IEC 27001, Common Criteria (ISO/IEC 15408), or NIST frameworks. Achieving certification typically signals that a system is reliable, secure, and trustworthy, and it can be a critical factor for businesses that prioritize data protection and wish to ensure the confidentiality, integrity, and availability of their information systems.
For more information, view this lecture on Data Security Frameworks. Or visit this Wikipedia page.
Define:
Classification
The process of categorizing data based on sensitivity and criticality to apply appropriate security controls.
The process of categorizing data based on its level of sensitivity, value, and criticality. Data can be classified into different categories, such as public, internal, confidential, or highly confidential. The aim of classification is to apply appropriate security controls to safeguard the data. The level of security and access controls implemented is determined by the data’s classification.
For more information, view this lecture on Data Classification and Clearance. Or visit this Wikipedia page.
Define:
Classified
Data assigned a classification level due to its sensitivity, with access restricted to authorized individuals with necessary clearance.
The data or information that has been given a specific classification level based on its sensitivity and the potential impact on an organization or a nation should it be disclosed unauthorizedly. Common classifications include confidential, secret, and top secret. Access to classified information is typically restricted to individuals who have the necessary clearance level and a legitimate need to know.
For more information, view this lecture on Data Classification and Clearance. Or visit this Wikipedia page.
Define:
Classified Information Spillage
An event where classified data is exposed on systems not accredited to handle such classification, leading to potential unauthorized access.
An event where information that has been classified is transferred, processed, or stored on a system that is not accredited or authorized to handle data of such classification level. The spillage could occur accidentally or deliberately, and it poses a significant risk because it may lead to unauthorized disclosure of sensitive or classified information. Measures are taken in organizations to prevent such spillages and to manage them effectively when they occur.
Or visit this Wikipedia page.
Define:
Clearance
Authorization granted to an individual to access certain classified information or areas, following a background assessment.
The authorization given to an individual, allowing them to access certain classified information or areas. This process involves a thorough assessment of the individual’s background, including past conduct, trustworthiness, and loyalty to their nation. The clearance level required depends on the sensitivity of the information that the individual needs to access.
For more information, view this lecture on Data Classification and Clearance. For more information, view this lecture on Type 2 authentication - “Something you have” or “Possession factors”. Or visit this Wikipedia page.
Define:
Clearance Level
The authorized level of access to classified information, based on an individual’s background check and the information’s sensitivity.
This denotes the degree to which an individual may access classified data or secure areas. There are several levels of clearance, which can vary depending on the organization or country but generally include levels such as Confidential, Secret, and Top Secret. The higher the clearance level, the more sensitive the information the individual can access. To receive a specific clearance level, an individual must undergo a background investigation to assess their trustworthiness and reliability.
For more information, view this lecture on Data Classification and Clearance. Or visit this Wikipedia page.
Define:
Cloud Access Security Broker
(CASB)
A gatekeeper service extending security policies to cloud services, controlling access, and protecting data in the cloud.
A service that acts as a gatekeeper, allowing organizations to extend their security policies beyond their own infrastructure to cloud services. It sits between the cloud service user and cloud applications and can enforce security policies such as authentication, single sign-on, and more. By providing visibility into and control over cloud applications, CASBs help organizations maintain compliance and protect data in the cloud.
For more information, view this lecture on Data Protection. Or visit this Wikipedia page.
Define:
Cryptographic Erasure
Ensuring irretrievable data on storage devices by overwriting with a key that’s then destroyed.
A method of ensuring that information on a storage device is irretrievable. It involves using a cryptographic algorithm to overwrite data with a key that is subsequently destroyed. Since the key is required to decrypt the data, its destruction essentially renders the data permanently inaccessible. This is a particularly effective method of data sanitization when the physical destruction of storage devices isn’t possible or desirable.
For more information, view this lecture on Data Remanence and Destruction. Or visit this Wikipedia page.
Define:
CYOD
(Choose Your Device)
CYOD is a mobile device strategy allowing employees to choose from a company-approved list of equipment, balancing personal preference and organizational security.
Unlike BYOD, where individuals use their own devices, CYOD limits models and operating systems to mitigate security risks. IT departments pre-configure approved hardware with necessary policies and software, ensuring easier maintenance and uniform management. This arrangement offers user autonomy, reduces compatibility issues, and helps protect sensitive data. Effective CYOD policies streamline device provisioning while maintaining compliance and operational control.
Or visit this Wikipedia page.
Define:
Data at Rest
Inactive data stored in any digital form, such as databases or backups, requiring encryption and access controls for protection.
Refers to inactive data that is stored physically in any digital form, such as databases, data warehouses, spreadsheets, archives, tapes, or off-site backups. It contrasts with data in transit or data in use. Protecting data at rest typically involves encryption and access controls to mitigate the risk of unauthorized access or data breaches.
For more information, view this lecture on The 3 States of Data (data at rest, data in motion, and data in use). For more information, view this lecture on The CIA Triad- Part 1- Confidentiality, Integrity, and Availability. Or visit this Wikipedia page.
Define:
Data Classification
Organizing data into categories for efficient use, applying controls based on sensitivity to manage risk and ensure secure handling.
The process of organizing data into categories for its most effective and efficient use. Classification helps manage risk by applying appropriate controls based on the sensitivity and value of the data. It typically involves categorizing data as public, internal, confidential, or secret to guide users on how to handle and secure it. Proper classification is crucial for compliance, data security, and minimizing the risk of data breaches.
For more information, view this lecture on Data Classification and Clearance. Or visit this Wikipedia page.
Define:
Data Classification Scheme
A framework categorizing data based on sensitivity, importance, and legal requirements, guiding protective measures.
A structured framework used to categorize data based on its level of sensitivity, importance, and legal obligations. Such schemes allow organizations to effectively manage and protect their data by setting rules for access, storage, and transfer and ensuring that adequate protective measures are applied consistently throughout the organization’s data ecosystem.
For more information, view this lecture on Data Classification and Clearance. Or visit this Wikipedia page.
Define:
Data Contamination
The introduction of erroneous or irrelevant information into a system, leading to inaccuracy and potential security risks.
The process by which data becomes corrupt or tainted due to the introduction of erroneous, misleading, or irrelevant information. This can happen through human error, data integration issues, or malicious activity, such as a cyber-attack. Contaminated data can lead to inaccurate analyses, misguided business decisions, or compromised machine learning models. In cybersecurity, it is essential to maintain the integrity of data by implementing controls that prevent contamination, such as input validation, data sanitation processes, and activity monitoring, to detect and mitigate any contamination incidents quickly.
Define:
Data Controller
An entity determining the purposes and means of personal data processing, with legal obligations for data handling and protection.
An individual, organization, or entity that determines the purposes and means of processing personal data. In the context of privacy laws, such as the GDPR, data controllers have specific legal obligations regarding the handling of data, including ensuring its protection and privacy, responding to data subject’s rights requests, and reporting data breaches. They are differentiated from data processors, who process personal data on behalf of a data controller.
For more information, view this lecture on Mission, Data, System Owners, and Data Custodians.
Define:
Data Custodian
A party responsible for data maintenance, implementing technical measures to ensure data safety and integrity.
An individual or organization responsible for the maintenance and care of data or data sources. Their duties typically involve implementing technical controls, procedures, and systems that ensure the safety and quality of the data, such as performing regular backups, enforcing access controls, and ensuring data integrity.
For more information, view this lecture on Mission, Data, System Owners, and Data Custodians.