Domain 2. Asset Security Flashcards

1
Q

Highest Level government Data Classification Label

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common data classification label NOT used in government

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Owner

A

Management level, they assign sensitivity labels and backup frequency.

This could be you or a Data Owner from HR, Payroll or other departments.

Often the same as System Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mission/Business Owner

A

Senior executives make the policies that govern our data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

System Owner

A

Management level and the owner of the systems that house the data.

Often a Data Center Manager or an Infrastructure Manager.

Often the same as Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Custodian

A

Technical, hands-on employees who do the things.

Follow directions of Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Users

A

Data User is any employee, contractor or third-party provider who is authorized by the Data Owner to access information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Controller

A

Same as Data Owner when Data Owner doesn’t exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Processor

A

Processors manage the data for Controllers. Often a third party. i.e (Outsourced Payroll)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Only approved way to deal with Top Secret data when no longer needed.

A

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does Asset Handling and Management include phishing training/employee education?

A

YES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who is responsible for ensuring due diligence and due care is followed?

A

Generally the data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NGO data classifications

A

Public
Sensitive
Private
Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EOL vs EOS

A

End of Life vs End of Support.

End of Life: Manufacturer no longer produces a product for sale.

End of Support: Manufacturer no longer supports the product, provides replacment parts, patches, or updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EOS or EOSL

A

EOS (end-of-support) and EOSL (end-of-service-life) are synonymous terms used to describe a product or solution that is no longer actively supported by its manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tailoring sec controls vs Scoping sec controls

A

Tailoring is customizing a set of existing security controls to align with an organization’s mission and objectives.

Scoping is reviewing and selecting initial security controls for a new information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NIST 800-53

A

NIST SP 800-53 is a set of standards that federal agencies are required to meet. NIST SP 800-53 was created in response to the passage of the Federal Information Security Management Act (FISMA).

Security and Privacy Controls for Information Systems and Organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Anonymization

A

Anonymization is the process of removing data to the point that it is impossible to identify the subject(s). This is most effective with large data sets with many categories. Anonymization also cannot be reversed, making it impossible to use a secondary data set to retrace steps associated with the anonymization process. What sets it apart is anonymization can’t be reversed because the technique requires the shuffling of a large data set and no database to link that random data back to the original subject(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tokenization

A

Tokenization replaces sensitive data with a string of characters or a token. The original data is held by a third party but NOT retrievable.

20
Q

Pseudonymization

A

Replaces data with a pseudonym or alias to protect privacy.

A separate database holds the actual identities and mappings to the pseudonym.

21
Q

Military and Government data classifications

A

Unclassified
Sensitive but Unclassified
Confidential
Secret
Top Secret

22
Q

Private/Civilian data classifications

A

Public
Sensitive
Private
Confidential

23
Q

Kerckhoffs’s principle

A

Kerckhoffs’s principle is often described as “the enemy knows the system.” It assumes that everything about a cryptographic system is public knowledge except for the key.

24
Q

Marking/Labeling

A

Marking and Labeling is when the classification level is physically added to the document or media.

25
Q

Blowfish

A

Symmetric

Blowfish was invented by Bruce Schneier who chose not to patent it, but made it available for free, public use. Blowfish has a fixed block size of 64 bits and a variable key size anywhere from 32-448 bits. Blowfish uses 16 rounds of encryption, regardless of key length.

26
Q

Poodle attack

A

In 2014, an attack known as the Padding Oracle On Downgraded Legacy Encryption (POODLE) demonstrated a significant flaw in the SSL 3.0 fallback mechanism. SSL is considered insecure and should be replaced by a new version of TLS.

27
Q

Should PII be classified as Confidential?

A

Personally identifiable information (PII) generally does not help a company maintain a competitive edge over other companies. PII should be classified as Private, not Confidential.

TO DO - review: CISSP All-in-One Exam Guide, 8th Edition. Pg 198-201.

CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition. Pg 182-185.

28
Q

NIST SP 800-122

A

PII

Guide to protecting PII

29
Q

NIST SP 800-124

A

Guidelines for Managing the Security of Mobile Devices in the Enterprise

30
Q

NIST SP 800-171

A

Protecting controlled unclassified info in nonfederal info systems and orgs.

Used by non-government orgs when contracted by the us fed gov.

31
Q

Data Protection Directive (DPD)

A

Non-enforceable predecessor to the GDPR

The Data Protection Directive (DPD) was not directly enforceable, forcing every European state to create their own individual laws pertaining to data privacy. This ultimately led to the United States creating their Safe Harbor Privacy Principles to comply with this European directive.

32
Q

GDPR

A

General Data Privacy Requirement. Enacted in 2018.

33
Q

Tagging -

A

Technique to attach additional information about a file, i.e. date of creation, creator, purpose, disposal timelines, etc.

34
Q

e-Discovery

A

Electronic discovery (e-Discovery) is a term used to describe the process of identifying and producing electronically stored information (ESI) requested by a court subpoena.

35
Q

Legal hold (AKA litigation hold)

A

Legal request that information is not destroyed.

36
Q

Intangible Asset

A

Asset that you can’t touch. ALSO includes copyrights, trademarks, patents, and similar intellectual property.

37
Q

Tangible Asset

A

Asset that you can touch.

38
Q

Cryptoshredding

A

Secure data destruction process.

Delete data, overwrite with junk, encrypt the junk, throw away the encryption key.

39
Q

NIST 800-37

A

NIST SP 800-37 introduces the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizations.

40
Q

Sanitization

A

Sanitization is a process that completely removes data or renders it impossible to recover from media. Sanitization can include the destruction of the media.

This is a parent term for all data removal methods.

41
Q

Baseline

A

A baseline is the minimum level of acceptable security applied to a system. Baselines are used to standardize security levels across multiple systems.

42
Q

Guidelines

A

Guidelines are recommended actions or behaviors if a standard does not apply.

43
Q

Standards

A

Standards document, in detail, the security requirements for a subset of technology. Standards are generally referenced by and enforced in a separate security policy.

CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition. Pg 24-25.

44
Q

Procedure

A

Procedures are step-by-step instructions to accomplish a task.

45
Q

Policy

A

Policies are high-level documents that align security objectives with business objectives.