Assets Security Flashcards

(34 cards)

1
Q

What are the Information Life Cycles

A

Classification
Categorization
Ownership
Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Classification

A

helps organization to understand what the data-oriented ramifications of exploitation are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Data Classification labels

A
Top Secret
Secret
Confidential
Sensitive but unclassified (SBU)
Unclassified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Data Classifications Criteria

A

Value - what is it worth
Age - How current is the information (useful if beyond 5 years?)
Useful life - At what point is it no longer worth protecting
Personal Association - Medical records, personnel files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of regulated data

A

Card Holder Data (CHD) - cc#, name, expiration
Personally Identifiable Information (PII) - name, address, SSN, DOB
Protect Health Information (PHI) - PII + related health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the roles for Data Ownership

A
Business/Mission Owner
Data (Information) Owner
System Owner
Custodians
Users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Business/Mission Owner

A

Senior Leadership
provide adequate funding and manpower to implement
enforce program policy when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Data Owner

A

Also know as Information Owner
Accountable for the data
Determines who can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is System Owner

A

Owns the OS, DB, responsible for the patching etc..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Custodians

A

Hands on to achieve data protection
Performing testing and verifying backup
Data Restoration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are users of data

A

Individuals who be granted access to use data as part of their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Data Controller

A

creates/manages sensitive data

must legally ensure security of data access by data processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Data Processor

A

3rd party that access the organization sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is degaussing

A

applying large magnetic field to erase magnetic media (hard disk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is best way to remove data

A

Degaussing

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the types of data storage & memory

A
Real, main, or primary memory
Secondary memory/storage
Write Once Read Many (WORM)
Volatile Storage
Non-volatile storage
Sequential storage
17
Q

What is primary memory/storage

18
Q

What is secondary memory/storage

19
Q

What is volatile memory

A

Directly access by CPU
SRAM/DRAM
Need power to persist

20
Q

What is non-volatile memory

A

Stored in location not accessible by CPU

Think firmware

21
Q

What is Random Access Storage

A

RAM - can access randomly

22
Q

What is sequential storage

A

Write and read in sequence - think of tape backup

23
Q

What are the types of RAM

A

Registers
SRAM (cache memory)
DRAM
General rule - fastest memory is closest to the CPU

24
Q

Programmable ROM (PROM)

A

Modified Once

Firmware

25
Erasable and Programmable ROM (EPROM)
can be erased and reprogrammed | Not the norm
26
Electrically Erasable Prom (EEPROM)
rewritten and rewritten Flash drive Firmware
27
Programmable Logic Device (PLD)
Integrated circuit that be modified programmatically | What PROM, EPROM, EEPROM is referred to
28
ISO 27002
Best practices | Formerly 17799
29
ISO 27001
Auditing
30
What is scoping
determining applicable portions of a standard that will be followed.
31
What is tailoring
customizes a standard for an organization | Begins with scoping, then add compensating control and parameters
32
What organization manages RFC (Request for Comments)
IETF
33
What is SRAM
volatile, fast, less amount, cache
34
What is DRAM
Refresh regular basis, cheapest