Chapter 5.8 Flashcards

1
Q

PHI

A

Protected Health Information (PHI) refers to medical and insurance records, plus associated hospital and laboratory test results. PHI is associated with a specific person or used as an anonymized or de-identified data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PII

A

Personally Identifiable Information (PII) is data that can be used to identify, contact, or locate an individual. A Social Security Number (SSN) is a good example of PII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidential

A

Confidential (or low) information is highly sensitive, and intended for viewing only by approved persons within the organization (and possibly by trusted third-parties under NDA). Confidential is a category defined by a military classification scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Proprietary

A

Proprietary information or intellectual property (IP) is information created by a company, typically about the products or services that they make or perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Archives

A

Archives refer to sets of data. Since data retention is high-priority, an archive plan should be established and/or reviewed to ensure data sets are held for the appropriate length of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

System Images

A

System images are copies of entire computer systems. These images are helpful during investigations as backup copies. A system image is a backup technique and does not address retention needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secret

A

Secret (or medium) information is too valuable to permit any risk of capture. Viewing is severely restricted to authorized individuals only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Classified

A

Classification restricts who may see a document’s contents. Classified (private, restricted, internal use only, official use only) material restricts viewing to the owner organization or third-parties under a Non-Disclosure Agreement (NDA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unclassified

A

Unclassified (public) information is available to anyone, and holds no viewing restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data owner

A

A data owner has the ultimate responsibility for maintaining the confidentiality, integrity, and availability of the information asset. The owner is also responsible for labeling the asset (such as determining who should have access and determining the asset’s criticality and sensitivity).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data steward

A

A data steward role is primarily responsible for data quality. This involves tasks such as ensuring data is labeled and identified with appropriate metadata, and that data is collected and stored in a format that complies with regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data custodian

A

A data custodian is responsible for managing the system where the data assets are stored. This includes responsibility for enforcing access control, encryption, along with backup and recovery measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System administrator

A

A system administrator is responsible for ensuring the upkeep of the technical systems that provide functionality for the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wiping

A

Wiping the media involves erasing. There are many methods and utilities available to perform such actions, like low level format. This method may be time consuming, but it is cost effective and requires very little interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Burning

A

Burning media involves using fire to destroy contents. Burning releases toxins that can be dangerous and should only be performed in a controlled environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Degaussing

A

Degaussing involves exposing magentic media, such as hard disks or tapes, to a powerful electromagnet which disrupts the magnetic pattern that stores the data on the disk surface. This effectively “erases” the media.

17
Q

Pulping

A

Pulping involves mixing the media, such as shredded media, with water, then pulverizing to further destroy the contents.

18
Q

PCI

A

Payment Card Industry (PCI) relates to information and related security standards for organizations that process credit or bank card payments.

19
Q

Purging

A

Purging is the process of repurposing storage media. In this case, old hard drives are being wiped to erase data in order to be used in other systems.