Policies & Procedures Flashcards
Baseline
Created as reference points which are documented for use as a method of comparison during an analysis conducted in the future
Government Data Classifications
Unclassified Data
Can be released to the public
Sensitive but Unclassified
Items that wouldn’t hurt national security if released but could impact those whose data is contained in it
Confidential Data
Data that could seriously affect the government if unauthorized disclosure were to happen
Secret Data
Data that could seriously damage national security if disclosed
Top Secret Data
Data that could gravely damage national security if it were known to those who are not authorized for this level of information
Data Owner
A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity and availability of the information asset
The data owner is responsible for labeling the asset and ensuring that it is protected with appropriate controls
Data Steward
Responsible for maintaining quality of data
Responsible for data accuracy, privacy, & security
Data Custodian
A role responsible for handling the management of the system on which the data assets are stored
PCI DSS
Payment Card Industry Data Security Standard:
Contractual obligation to protect card information
GDPR
General Data Protection Regulation:
Personal data cannot be collected processed or retained without the individual’s informed consent
GDPR also provides the right for a user to withdraw consent, to inspect, amend, or erase data held about them
GDPR requires data breach notification within 72 hours
Deidentification
Methods and technologies that remove identifying information from data before it is distributed
Deidentification is often implemented as part of database design
Data Masking
Deidentification Method where generic or placeholder labels are substituted for real data while preserving the structure or format of the original data
Tokenization
A deidentification method where a unique token is substituted for real data
Aggregation/Banding
A deidentification technique where data is generalized to protect the individuals involved
Reidentification
An attack that combines a deidentification dataset with other data source to discover how secure the deidentification method used is
Due Diligence
Ensuring that IT infrastructure risks are known and managed properly
Due Care
Mitigation actions that an organization takes to defend against the risks that have been uncovered during due diligence
ISA
Interconnection Security Agreement:
An agreement for the owners and operators of the IT systems to document what technical requirements each organization must meet