D2 - App FC - Asset Security Flashcards
(52 cards)
With what level of security precautions should backup media be treated?
Backup media should be handled with the same security precautions as any other asset with the same data classification.
What are the goals of managing backup media?
- Preventing disclosure,
- Destruction,
- Alteration of data.
What are the processes that can be applied to used media in order to prepare the media for reuse in various environments?
Erasing, clearing, and overwriting media that will be used in the same classification environments; purging, sanitizing, and degaussing if media is used in different classification environments.
If a message is signed and encrypted, what security services are you providing?
Confidentiality, integrity, authenticity/access control, and nonrepudiation.
Who has the responsibility to ensure that communications are secured?
The sender.
What is the primary difference between memory cards and smartcards?
Processing capability.
What is the term for exercising reasonable care in protecting organisational assets and interests, including development of a formalised security structure consisting of policies, procedures, and protocols?
Due care.
When users are granted only the minimum access necessary to complete some task or process, what principle is involved?
The principle of least privilege.
What kinds of processes must be applied when confidential storage media is prepared for reuse in questionably secure environments?
Declassification.
What is the name for the demagnetisation process used to erase disk drives or tapes to wipe out all previously stored data?
Degaussing.
What governs how long records are kept to substantiate system security assessments and support system analysis?
Record retention.
What method will remove all data with assurances that it cannot be removed using any known methods?
Purging, sanitization, or destruction.
What methods can be used to protect mobile devices such as a smartphone?
Encryption,
OPS,
Password-protected screen locks,
Remote wipe.
What can be used to remove data on a lost smartphone?
Remote wipe.
What should be done before disposing of a desktop backup computer at the end of its life cycle?
Sanitization.
What is the term that identifies data on a disk after the data has supposedly been erased?
Data remanence.
What does imaging provide in relation to configuration management?
Baseline.
What is an early step in asset security?
Classifying and labelling assets.
What is sensitive data?
Sensitive data is any information that isn’t public or unclassified. It can include confidential proprietary, protected, or any other type of data that an organization needs to protect due its value to the organisation or to comply with existing laws and regulations.
What is PII?
Personally Identifiable Information (PII) is any information that can identify an individual.
What is PHI?
Protected Health Information (PHI) is any health-related information that can be related to a specific person. In the United States, the Health Insurance Portability and Accountability Act (HIPAA) mandates the protection of PHI.
What is proprietary data?
Proprietary data refers to any data that helps an organisation maintain a competitive edge. It could be software code it developed, technical plans for products, internal processes, intellectual property, or trade secrets. If competitor are able to access the proprietary data, it can seriously affect the primary mission of an organisation.
What legal protections exist for proprietary data?
Copyrights, patents, and trade secret laws provide protection for proprietary data.
What are the three data states and their definitions?
Data at rest is any data stored on media such as system hard drives, external USB drives, storage area networks (SANs), and backup tapes. Data in transit (sometimes called data in motion) is any data transmitted over a network. This includes data transmitted over an internal network using wired or wireless methods and data transmitted over public networks such as the internet. Data in use refers to data in temporary buffers while an application is using it.