Securing Workstations Flashcards
Auto-run and auto-play
Auto play cds inserted into the computer
3 Data states
Data at rest (in storage)
Data in transit / motion
Data in use / processing
Unencrypted data’s is also called
Cleartext / plaintext
Data in transit encryption types
TLS or SSL (website)
IPSec or L2TP (VPN)
WPA2 or AES (WIFI)
Encrypted data aka
Ciphertext
Data at rest 4 encryption types
Full disk
Folder
File
Database
6 end user best practices
Log off
Screensaver lock
Secure personal information
Clean desk policy
Hardware always in your possession
Data always protected
Degaussing
Magnet wipe HDD
Purging (sanitizing)
Data can’t be reconstructed by any known techniques
Clearing data
Mostly can’t be reconstructed
4 Data destruction meathods
Sanitizing
Purging
Overwriting
Zeroing
Electronic data destruction methods
Erasing / wiping (NOT SSD)
Standard format or low level format
Physical destruction methods
Degaussing (NOT SSD)
Drilling
Shredding
Incineration
Low level format
Provided by the manufacturer
Factory reset
Two types:
Secure erase
Crypto erase
Crypto erase
Self encrypting drive can just delete the key