Domain 2 -- Asset Security Flashcards
What are the four phases of the Information Life cycle?
- Acquisition
- Use
- Archival
- Disposal
What’s the difference between a Backup and an Archive?
- A backup is a copy of the data set currently in use that is made for the purpose of recovering from the loss of the original data
- A data archive is a copy of a data set that is no longer in use, but is kept in case it is needed at some future point. Archived data is normally removed from its original location to free up available storage space for data in use
Each Data classification system should have its own ____________ and ___________ requirements.
handling
destruction
What are the four common levels of sensitivity for a commercial business – from highest to lowest?
- Confidential (Proprietary)
- Private
- Sensitive
- Public
What are the five levels of sensitivity from highest to lowest for military purposes?
- Classified
- Top secret
- Secret
- Confidential
- Unclassified
- Sensitive but unclassified
- Unclassified
What’s the difference between privacy and security?
- Privacy indicates the amount of control an individual should be able to have and expect to have as it relates to the release of their own sensitive information.
- Security refers to the mechanisms that can be put into place to provide this level of control.
What is the role of the Data Owner?
A data owner is usually a member of management, who is in charge of a specific business unit and who is responsible for the protection and use of a specific subset of information
- Data owner decides on the how the data is classified
- Data owner is responsible to ensure that the necessary security controls are in place
- Defining user access criteria
- Approves access requests or. .
- May choose to delegate access requests to data custodians
What is the role of the Data Custodian?
The data custodian:
- Responsible to maintain and protect data
- Usually filled by the IT or Security dept.
- Duties include
- Implementing / maintaining security controls
- performing backups
- Validating the integrity of the data
- Restoring backups
- Retaining records of activity
- Fulfilling requiremetns of company security policy
What is e-Discovery and what are the eight steps associated with it?
e-Discovery of electronically stored information (ESI) is the process of producing for a court or external attorney all ESI pertinent to a legal proceeding. The Electronic Discovery Reference Model identifies 8 steps:
- Identification
- Preservation
- Collection
- Processing
- Review
- Analysis
- Production
- Presentation
What is data remanence and what are four ways to combat it?
Data remance refers to the fact that even after you “delete” the data, it may be marked as deleted, but it is actually still available on the storage media
Ways to combat it:
- Overwriting with 1’s and 0’s to make the data unreadable
- Degausing (magnetic field)
- Encryption (store the data in encrypted form and then just delete the key securely) – this is what mobile devices do
- Physical destruction – commonly with chemicals or by shredding or incineration
How do you protect data at rest?
Encryption
How do you protect Data in Motion?
Transport Layer Security (TLS) or IPSec
How is data in use attacked?
Most often by means of a side channel attack
What are the key attributes/tasks for Media management?
- Tracking
- Effectively implementing access controls
- Tracking the number and location of backup versions
- Documenting the history of changes to the media
- Ensuring environmental conditions do not endanger the media
- Ensuring media integrity
- Inventorying the media on a scheduled basis
- Carrying out secure disposal activities
- Internal and external labeling
What is scoping?
Scoping is the process of taking a broad standard and trimming out the irrelevant or otherwise unwanted parts.