Secure Data destruction Flashcards
What are the shredding security levels?
There are P2-P6, which P4 is the commercial level, then P5 = espionage proof, then P6 = DoD/NSA, military
What is pulping?
Same process as recycling and reduces documents to paper slurry
What is overwriting?
Writing new data over deleted data, DoD 5220.22 data sanitization standard, which means three passes meaning overwriting with zeros then overwriting with binary zeros, then a random bit pattern overwrites it.
What is pulverizing?
media destruction of hardware
What is degaussing?
Uses strong magnetics and scramble all the data to being unrecoverable and can be commercial grade
What is incineration
complete destruction of all media compnents through incineration
Host security-Antivirus and Anti malware?
They run through signatures and definitions have behavior monitoring and also use Heuristic and AI do cloud based submissions and prefer to sandboxing vs quarantine
What is EDR
Endpoint threat detections, and monitor endpoint behavior in real time
Data loss prevention and protection guide
protection of data in motion (VPN) and monitor and contorl data movement, do data classifiication
What is host based intrusion detection
It is a passive software that monitors, detects and alerts
What is a host based preventation?
monitors, detects and alerts and then deploys countermeasures
What are Host based firewalls
It monitors the traffic on the host and use implicit deny if something isn’t on a list it wont be able to connect. They can monitor disk, memory and network
What is the difference between host and network based
host based mean just that device is monitored and network based it monitors all of network traffic
What are NextGen firewalls
They use application inspection, SSL inspection, state awareness, and packet inspections