Domain 2 - Asset Security Flashcards

1
Q

Sensitive Data

A

Sensitive data is any information that isn’t public or unclassified. It can include confidential, proprietary, protected, or any other type of data that an organization needs to protect due to its value to the organization, or to comply with existing laws and
regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personally identifiable Information (PII)

A

Personally identifiable information (PII) is any information that can identify an individual.

Eg: name, social security number, date and place of birth, mother’s maiden name, or biometric records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protected Health Information (PHI)

A

Protected health information (PHI) is any health-related information that can be related to a specific person. In the United States, the Health Insurance Portability and Accountability Act (HIPAA) mandates the protection of PHI.

Eg: health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Proprietary Data

A

Proprietary data refers to any data that helps an organization maintain a competitive edge. It could be software code it developed, technical plans for products, internal processes, intellectual property, or trade secrets.

Protected by Copyrights, Patents and trade secret laws to an extent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Top Secret

A

Grave Damage to National Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secret

A

Serious Damage to National Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidential

A

Damage to National Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unclassified

A

Doesnot meet description for the other three.

Available to any one with a Freedom of Information (FOI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Classification Authority

A

Is the entity that applies the original classification to the sensitive data and strict rules identify who can do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidential Email

A
  1. ) Can only be viewed, not saved
  2. ) Email content cant be copied and pasted into other docs
  3. ) Emails cant be printed
  4. ) Forwarded emails cant be opened
  5. ) Only to recipients in the org
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do we manage Sensitive Data

A

Key goal is to prevent Data Breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Handling Sensitive Data

A

Refers to the secure transportation of media through its lifetime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Storing Sensitive Data

A

AES-256. Use Heating, ventilation and HVAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Remanence

A

Data remanence is the data that remains on a hard drive as residual magnetic flux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Removing Data Remanence

A

One way to remove data remanence is with a degausser. A degausser generates a heavy magnetic field, which realigns the magnetic fields in magnetic media such as traditional hard drives, magnetic tape, and floppy disk drives.

Degaussers using power will reliably rewrite these magnetic fields and remove data remanence. However, they are only effective on magnetic media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Erasing

A

Erasing media is simply performing a delete operation against a file, a selection of files, or the entire media

17
Q

Clearing

A

Clearing, or overwriting, is a process of preparing media for reuse and assuring that the cleared data cannot be recovered using traditional recovery tools. When media is cleared, unclassified data is written over all addressable locations on the media.

18
Q

Purging

A

Purging is a more intense form of clearing that prepare media for reuse in less secure environments. It provides a level of assurance that the original data is not recoverable using any known methods

19
Q

Declassification

A

Declassification involves any process that purges media or a system in preparation for reuse in an unclassified environment

20
Q

Sanitization

A

Sanitization is a combination of processes that removes data from a system or from media. It ensures that data cannot be recovered by any means

21
Q

Destruction

A

Destruction is the final stage in the life cycle of media and is the most secure method of sanitizing media.

Methods of destruction include incineration, crushing, shredding,disintegration, and dissolving using caustic or acidic chemicals

22
Q

Record Retention

A

Record retention involves retaining and maintaining important information as long as it is needed and destroying it when it is no longer needed.

An organization’s security policy or data policy typically identifies retention time frames.

23
Q

Data Owners

A

The data owner is the person who has ultimate organizational responsibility for data. The owner is typically the CEO, president, or a department head (DH). Data owners identify the classification of data and ensure that it is labeled properly.

They also ensure it has adequate security controls based on the classification and the organization’s security policy requirements.

24
Q

System Owner

A

The system owner is the person who owns the system that processes sensitive data

25
Q

Data Processor

A

A data processor is any system used to process data.

The EU Data Protection law defines a data processor as “a natural or legal person which processes
personal data solely on behalf of the data controller.”

26
Q

Administrators

A

A data administrator is responsible for granting appropriate access to personnel. They don’t necessarily have full administrator rights and privileges, but they do have the ability to assign permissions.

27
Q

Custodians

A

Data owners often delegate day-to-day tasks to a custodian. A custodian helps protect the integrity and security of data by ensuring it is properly stored and protected.

For example, custodians would ensure the data is backed up in accordance with a backup policy.