Security Operations 4.2 Flashcards
Explain the security implications of proper hardware, software, and data asset management.
Assignment/accounting
- A central asset tracking system. Associate a person with an asset. Useful for a tracking a system.
Classification
Type of asset/Hardware (Capital Expenditure)
Software (Operating expenditure).
Monitoring/Asset tracking.
Inventory Every asset, Laptops, Desktops.
Media Sanitization
During system disposal or decommissioning we may need to completely remove data so no usable information remains.
Asset Tag
Barcode, RFID , visible tracking number, organisation name.
Physical Destruction
Using a shredder or industrial pulveriser to completely destroy the device to avoid a security breach.
Can be done with a drill and a hammer.
Electromagnetic - Remove the magnetic field. Destroys hard drive data and renders the hard drive unusable.
Organisations may incinerate a device.
Certification of destruction
The third party may get involved and destroy drives and then provide a certificate of destruction.
Data retention
Backup your data.
How much data and where?
Regulatory compliance