Domain 2 - Asset Security Flashcards
Assigning labels to data within an organization. It also identifies the value of data and is critical to protect confidentiality and integrity. This ultimately drives what controls we put in place.
Data Classification
Government Data Classification Levels
Top Secret, Secret, Confidential, Unclassified
Commercial Data Classification Levels
Confidential, Private, Sensitive and Public
Responsible for defining data classifications and ensuring systems and data are properly marked.
Data Owner
Person who owns the system that processes sensitive data. Typically the same person as data owner
System Owner
Person who assigns permissions based on the principle of least privilege and the need to know.
Data Administrator
They help protect the integrity and security of data by ensuring it is properly stored and protected.
Data Custodian
Any person who accesses data via a computing system to accomplish work tasks.
Users
Any information that can identify an individual.
Personally Identifiable Information (PII)
Any health related info that can be related to a specific person.
Protected Health Information (PHI)
Data that remains on a hard drive as residual magnetic flux.
Data remanence
Simply performing a delete operation against a file, a selection of files, or the entire media.
Erasing
A process of preparing media for reuse and assuring that the cleared data cannot be recovered using traditional recovery tools.
Clearing, or overwriting
An intense form of clearing that prepares media for reuse in less secure environments.
Purging
Involves any process that purges media or a system in preparation for reuse in an unclassified environment.
Declassification