Domain 2 - Asset Security Flashcards

1
Q

Business/Mission Owners

A
  • Senior Management
  • Create the information program. ensure it’s staffed, funded, etc..
  • Responsible for ensure assets are protected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Owners

A
  • Management Employee
  • Responsible for ensuring that specific data is protected
  • Determine data sensitivity labels, frequency of backups
  • Focus on the data itself (paper/electronic)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System Owner

A
  • Management Employee
  • Responsible for the actual systems that house the data
  • Includes ASSURANCE OF hardware/software configuration (updates, patching, etc…)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Custodian

A
  • Hands-on protection of assets, such as data
  • PERFORMS backups, restoration, patches systems, configures AV, etc…
  • Custodians FOLLOW ORDERS and do not make critical decisions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Controller

A
  • Creates and manages sensitive data within an organization

- HR employees, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Processor

A
  • Manages data on behalf of data controllers

- Outsourced payroll, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Remanence

A

Data that persists beyond noninvasive means to delete it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Memory

A
  • Series of on-off switches representing bits

- May be chip-based, disk-based, tape, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Real Memory

A

“Primary Memory”

  • RAM
  • Directly accessible by the CPU
  • Used to hold instructions and data for currently executing processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Secondary Memory

A
  • Disk-based memory

- Not directly accessible by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cache Memory

A
  • Fastest memory on the system (must keep up with CPU)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Register File/Registers (memory)

A
  • Fastest portion of the CPU

- Small storage locations used by the CPU to store instructions and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Level 1 cache (memory)

A
  • Next fastest behind register
  • Located on the CPU itself
  • SRAM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PROM

A

Programmable Read Only Memory

  • Can be written to only once, typically at the factory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EPROM

A

Erasable Programmable Read Only Memory

  • May be flashed using ultraviolet light
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EEPROM

A

Electronically Erasable Programmable Read Only Memory

  • Electronically flashable using ‘flashing programs’
17
Q

PLD

A

Programmable Logic Device

  • Field-programmable device (programmed AFTER it leaves the factory)
  • EPROM, EEPROM, Flash Memory
18
Q

SSD (Solid State Drive)

A
  • Combination of flash memory (EEPROM) and DRAM
19
Q

What type of memory is flash memory?

A

EEPROM - Electronically Erasable Programmable Read Only Memory

20
Q

TRIM (SSD)

A
  • Improves garbage collection
  • Allows the drive to do garbage collection in the background
  • TRIM improves performance but does NOT reliably destroy data
21
Q

Garbage Collection (SSD)

A
  • Removes unallocated blocks of memory

- Works during idle time so it does not impact performance

22
Q

ATA Secure Erase

A

The only way to reliably wipe a SSD without physically destroying it

23
Q

PCI-DSS

A

Payment Card Industries Data Security Standard

- AMEX, Discover, Mastercard, Visa, others…

24
Q

PCI-DSS Core Principles

A
  • Build and maintain a secure network and systems
  • Protect cardholder data
  • Maintain a vulnerability management program
  • Implement strong access control measures
  • Regularly monitor and test networks
  • Maintain an information security policy
25
Q

OCTAVE

A

Operationally Critical Threat, Asset, and Vulnerability Evaluation

  • Risk Management Framework from Carnegie Mellon
  • Three-phase process for managing risk
  • FREE
26
Q

OCTAVE Three-Phase Process

A
  1. Identifies staff knowledge, assets, and threats
  2. Identifies vulnerabilities and evaluates safeguards
  3. Conducts risk analysis and develops risk mitigation strategy
27
Q

ISO

A

Internal Organization for Standardization

28
Q

ISO 17799/27002

A
  • 17799 was renamed to 27002 in 2005 to make it consistent with the 27000 series
  • Describes TECHNIQUES and best practices
29
Q

ISO 17799/27002 Areas (n=11)

A

§ Policy
§ Organization of information security
§ Asset management
§ Human resources security
§ Physical and environmental security
§ Communications and operations management
§ Access control
§ Information systems acquisition, development, and maintenance
§ Information security incident management
§ Business continuity management
§ Compliance

30
Q

ISO 27001

A

Describes REQUIREMENTS

AUDITS the best practices (from 27002)

31
Q

COBIT

A

Control Objectives for Information and Related Technology

  • Framework for employing information security governance best practices
  • Developed by ISACA
  • Four Domains
  • 34 Information Technology processes across the four domains
32
Q

COBIT Domains (n=3)

A
  1. Plan and Organize
  2. Acquire and Implement
  3. Deliver and Support
  4. Monitor and Evaluate

**There are 34 IT processes across the 4 domains

33
Q

ITIL

A

Information Technology Infrastructure Library

  • ITSM Framework
  • Five “Service Management Practices” publications
34
Q

ITIL Service Management Practices (n=5)

A
  1. Service Strategy
  2. Service Design
  3. Service Transition
  4. Service Operation
  5. Continual Service Improvement
35
Q

Public Sector Classification Levels

A
  • Unclassified
  • Sensitive but unclassified (SBU)
  • Confidential
  • Secret
  • Top Secret
36
Q

Private Sector Classification Levels

A
  • Public
  • Proprietary
  • Private
  • Confidential
  • Sensitive