Domain 2: Asset Security Flashcards
What is the information life cycle?
Information goes through a life cycle that starts with its acquisition and ends with its disposal.
How is new information prepared for use?
By adding metadata, including classification labels.
What is the risk of data replication?
Ensuring the consistency of data
What is an effect of data aggregation?
Data aggregation may lead to an increase in classification levels.
What is an effective control during the information life cycle?
Cryptography can be an effective control at all phases of the information life cycle.
What determines how information goes through the information life cycle?
The data retention policy drives the timeframe at which information transitions from the archival phase to the disposal phase of its life cycle.
Why classify information?
Information classification corresponds to the information’s value to the organization.
What differentiates different information classification?
Each classification should have separate handling requirements and procedures pertaining to how that data is accessed, used, and destroyed.
Who is ultimately responsible for an organization’s security?
Senior executives are ultimately responsible to the shareholders for the successes and failures of their corporations, including security issues.
Data owner
The data owner is the manager in charge of a specific business unit and is ultimately responsible for the protection and use of a specific subset of information.
Data owners vs. data custodians
Data owners specify the classification of data, and data custodians implement and maintain controls to enforce the set classification levels.
What consideratrions go into a data retention policy?
The data retention policy must consider legal, regulatory, and operational requirements.
What is a data retention policy?
The data retention policy should address what data is to be retained, where, how, and for how long.
E-discovery
Electronic discovery (e-discovery) is the process of producing for a court or external attorney all electronically stored information (ESI) pertinent to a legal proceeding.
NIST SP 800 - 88 , Revision 1
“Guidelines for Media Sanitization,” describes the best practices for combating data remanence.
How is overwriting data accomplished?
Overwriting data entails replacing the 1’s and 0’s that represent it on storage media with random or fixed patterns of 1’s and 0’s to render the original data unrecoverable.
Degaussing
Degaussing is the process of removing or reducing the magnetic field patterns on conventional disk drives or tapes.
Data at rest
Data at rest refers to data that resides in external or auxiliary storage devices, such as hard drives or optical discs.
How do you protect data at rest?
Whole-disk encryption is a good way to protect data at rest.
Data in motion
Data in motion is data that is moving between computing nodes over a data network such as the Internet.