Domain 2 -- Asset Security Flashcards

1
Q

What are the four phases of the Information Life cycle?

A
  1. Acquisition
  2. Use
  3. Archival
  4. Disposal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the difference between a Backup and an Archive?

A
  • A backup is a copy of the data set currently in use that is made for the purpose of recovering from the loss of the original data
  • A data archive is a copy of a data set that is no longer in use, but is kept in case it is needed at some future point. Archived data is normally removed from its original location to free up available storage space for data in use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Each Data classification system should have its own ____________ and ___________ requirements.

A

handling

destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four common levels of sensitivity for a commercial business – from highest to lowest?

A
  • Confidential (Proprietary)
  • Private
  • Sensitive
  • Public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the five levels of sensitivity from highest to lowest for military purposes?

A
  • Classified
    • Top secret
    • Secret
    • Confidential
  • Unclassified
    • Sensitive but unclassified
    • Unclassified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the difference between privacy and security?

A
  • Privacy indicates the amount of control an individual should be able to have and expect to have as it relates to the release of their own sensitive information.
  • Security refers to the mechanisms that can be put into place to provide this level of control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of the Data Owner?

A

A data owner is usually a member of management, who is in charge of a specific business unit and who is responsible for the protection and use of a specific subset of information

  • Data owner decides on the how the data is classified
  • Data owner is responsible to ensure that the necessary security controls are in place
  • Defining user access criteria
  • Approves access requests or. .
  • May choose to delegate access requests to data custodians
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of the Data Custodian?

A

The data custodian:

  • Responsible to maintain and protect data
  • Usually filled by the IT or Security dept.
  • Duties include
    • Implementing / maintaining security controls
    • performing backups
    • Validating the integrity of the data
    • Restoring backups
    • Retaining records of activity
    • Fulfilling requiremetns of company security policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is e-Discovery and what are the eight steps associated with it?

A

e-Discovery of electronically stored information (ESI) is the process of producing for a court or external attorney all ESI pertinent to a legal proceeding. The Electronic Discovery Reference Model identifies 8 steps:

  1. Identification
  2. Preservation
  3. Collection
  4. Processing
  5. Review
  6. Analysis
  7. Production
  8. Presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data remanence and what are four ways to combat it?

A

Data remance refers to the fact that even after you “delete” the data, it may be marked as deleted, but it is actually still available on the storage media

Ways to combat it:

  1. Overwriting with 1’s and 0’s to make the data unreadable
  2. Degausing (magnetic field)
  3. Encryption (store the data in encrypted form and then just delete the key securely) – this is what mobile devices do
  4. Physical destruction – commonly with chemicals or by shredding or incineration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you protect data at rest?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you protect Data in Motion?

A

Transport Layer Security (TLS) or IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is data in use attacked?

A

Most often by means of a side channel attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the key attributes/tasks for Media management?

A
  • Tracking
  • Effectively implementing access controls
  • Tracking the number and location of backup versions
  • Documenting the history of changes to the media
  • Ensuring environmental conditions do not endanger the media
  • Ensuring media integrity
  • Inventorying the media on a scheduled basis
  • Carrying out secure disposal activities
  • Internal and external labeling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is scoping?

A

Scoping is the process of taking a broad standard and trimming out the irrelevant or otherwise unwanted parts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Tailoring?

A

Tailoring is when you make changes to specific provisions of a standard to suit your needs better.

17
Q

What is data leak prevention? (DLP)

A

Data Leak Prevention comprises the actions that organizations take to prevent unauthorized access to sensitive data.

18
Q

What’s the difference between a data loss and a data leak?

A

With a data loss, you don’t know where the data is.

With a data leak, you do know that the data has been compromised (example when the data appears on the internet).

19
Q

What are the approaches to Data Leak Prevention (DLP)?

A
  • Data Inventories
  • Data Flows
  • Data Protection Strategy
    • Backup and Recovery (don’t let thieves steal backup)
    • Think about the data life cycle and securing it as it goes through the different stages of the life cycle
    • Physical security
    • Security Culture
    • Privancy
    • Organizational change (i.e. mergers and acquisitions)
  • Implement a DLP solution
    • One that prevents data loss, not just alerts us to it (alerts can be ignored)
20
Q

What is the concept of DLP Resliency?

A

DLP resiliency deals with the ability of an organization to bounce back from a crisis and get back to normal quickly.

If your whole plan is based on keeping adversaries off your network, you’ll be in deep trouble when they succeed and actually gain access to your network.

21
Q

What is NDLP

A

Network Data Loss Prevention

This usually boils down to installing NDLP devices on the network.

The biggest drawback of NDLP is that it only protects data on the organizations network.

22
Q

What is Endpoint DLP?

A

Endpoint DLP applies protection policies to data at rest and data in use.

It relies on agents running on all of the systems that are being protected

23
Q

Are hybrid NDLP/EDLP solutions a possibility? If so, what are the drawbacks?

A

Yes, a hybrid approach is possible.

The biggest drawback is the cost.

24
Q

What’s the difference between clearing and sanitizing

A

Clearing is where you write 1’s and 0’s to make the data that had been on the drive unreadable.

Sanitizing is even better and it’s a combination of processes to make the data even more difficult to recover