Security Operations 4.2 Flashcards

Explain the security implications of proper hardware, software, and data asset management.

1
Q

Assignment/accounting

A
  • A central asset tracking system. Associate a person with an asset. Useful for a tracking a system.

Classification
Type of asset/Hardware (Capital Expenditure)
Software (Operating expenditure).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Monitoring/Asset tracking.

A

Inventory Every asset, Laptops, Desktops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Media Sanitization

A

During system disposal or decommissioning we may need to completely remove data so no usable information remains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset Tag

A

Barcode, RFID , visible tracking number, organisation name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Destruction

A

Using a shredder or industrial pulveriser to completely destroy the device to avoid a security breach.

Can be done with a drill and a hammer.
Electromagnetic - Remove the magnetic field. Destroys hard drive data and renders the hard drive unusable.

Organisations may incinerate a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Certification of destruction

A

The third party may get involved and destroy drives and then provide a certificate of destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data retention

A

Backup your data.
How much data and where?

Regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly