Domain 2 - Asset Security Flashcards

1
Q

Government Classification Levels

A
  1. Unclassified: No damage
  2. Sensitive but unclassified: Minimal damage
  3. Confidential: Damage
  4. Secret: Serious Damage
  5. Top Secret: Exceptionally Grave Damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Commercial Classification Levels

A
  1. Public: No damage
  2. Sensitive: Damage
  3. Private: Serious Damage
  4. Confidential/Proprietary: Exceptionally Grave Damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Senior management statement of policy

A

States importance, support and commitment to policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GDPR Principles

A
  1. Data breach notification: 24 hours
  2. Creation of centralised data prevention authorities in each EU member state
  3. Individuals have access to own data
  4. Data portability between service providers
  5. Right to be forgotten
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information security officer

A
  • Ensure policies etc. are written by app. Unit
  • Implement/operate CIRTs
  • Provide leadership for security awareness
  • Communicate risk to senior management
  • Stay abreast of current threats and technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Owner

A
  • Ultimate organizational responsibility for data
  • Categorize systems and data, determine level of
    classification
  • Required controls are selected for each classification
  • Select baseline security standards
  • Determine impact information has on organization
  • Understand replacement cost (if replaceable)
  • Determine who needs the information and
    circumstances for release
  • Determine when information should be destroyed
  • Responsible for asset
  • Review and change classification
  • Can delegate responsibility to data custodian
  • Authorize user privileges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Custodian

A
  • Day-to-day tasks, grants permission to users in DAC
  • Adhere to data policy and data ownership guidelines
  • Ensure accessibility, maintain and monitor security
  • Dataset maintenance, , archiving
  • Documentation, including updating
  • QA, validation and audits
  • Run regular backups/restores and validity of them
  • Insuring data integrity and security (CIA)
  • Maintaining records in accordance to classification
  • Applies user authorization
  • Implement security controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System Owners

A

Select security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

System Administrators

A

Assign permission to access and handle data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Clearing/overwritting

A

Renders data inaccessible by normal means. – Prepping media for reuse at same level. Removal of
sensitive data from storage devices in such a way that the data may not be reconstructed using normal system functions or utilities. May be recoverable with special lab equipment. Data just overwritten.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Purging

A

Overwriting data multiple times. More intensive than clearing. More intense than clearing. Media can be reused in lower systems. Removal of sensitive data with the intent that the data cannot be reconstructed by any known technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Degaussing

A

Only works on HDDs and Magnetic tapes, NOT on optical media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Erasing

A

Simply hitting delete on OS, marks storage space as unavailable instead of clearing the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security labelling

A

Use of security attributes for internal data structures within an organisation. This is for machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security marking

A

Use of human readable security attributes, such as ‘Personal’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Santising

A

Series of processes that removes data, ensures data

is unrecoverable by any means. Removing a computer from service and disposed of. All storage media removed or destroyed.

17
Q

Scoping

A

reviewing baseline security controls and selecting only

those controls that apply to the IT system you’re trying to protect.

18
Q

Tailoring

A

modifying the list of security controls within a baseline

so that they align with the mission of the organization.

19
Q

Supplementation

A

adding assessment procedures or assessment details to adequately meet the risk management needs of the organization.

20
Q

Link Encryption

A

is usually point to point EVERYTHING ENCRYPTED

“Black pipe, black oil, black ping pong balls” all data is encrypted, normally did by service providers

21
Q

End to End Encryption

A

You can see ALL BUT PAYLOAD, normally done by

users