Domain 2: Asset Security Flashcards
Information lifecycle
Acquisition, Use, Archival and Disposal
Define the Acquisition information lifecycle stage?
This includes creation or copying of data and applying policy controls, such as encryption
Define the Use information lifecycle stage?
Where data is read or modified by users. Need to ensure confidentiality, integrity and availability are applied here.
Define the Archival information lifecycle stage?
Process of archiving or backing-up data for business or regulatory purposes
Define the Disposal information lifecycle stage?
Process of destruction of data that is no longer needed. Data must be rendered sufficiently difficult for an adversary to recover so that the risk of such recovery is acceptable to our organisation.
Define Data Classification
Development of sensitivity labels based on value of data
Define PII
Personally Identifiable Information. This is any information about an individual. This can include name, social security number, DOB, biometric records.
Define PHI
Protected Health Information. This is any health related information that can be related to a specific person. The Health Insurance Portability and Accountability Act (HIPAA) mandates the protection of PHI.
Types of data that classification levels apply to?
ALL data, regardless of format, including digital, paper, video, fax, audio etc
Define common levels of classifications for Government/Military use
Top Secret, Secret, Confidential, Sensitive but unclassified, and Unclassified
Define common levels of classifications for private/commercial use
Confidential, Private, Sensitive, Public
Define information classification
Process of understanding the value and assigning classification labels for both physical assets, and digital assets
Define asset classification
Ensure that physical assets are also adequately protected, through use of sensitivity classification
Data protection key considerations
Who has access to the data, what controls are in place, and what devices can be used to access data.
Three states of data
Data at Rest, Data in Transit, Data in Use
Define Data at Rest
Involves data stored on media such as system hard drives, external USB drives, and backup tapes. Use of encryption is popular here.
Define Data in Transit
Involves data transmitted over a network. Use of TLS is applied here
Define Data in Use
Refers to data in memory or temporary storage buffers, while an application is using it. Application buffers are typically cleared after use
Define data breach
Any event in which an unauthorised entity can view or access sensitive data
Define data leak
Where the confidentiality of data has been compromised
Role of Executives
Hold ultimate responsibility for everything that happens in their organisation
CSO vs CISO
CSO focused on broader security risks (including, physical security), while CISO is typically much more technology focused