Domain 2: Asset Sec. Flashcards

1
Q

How do you assess the value of an asset?

A
  • Loss if compromises
  • Legislative drivers
  • Liabilities
  • Value to competitors
  • Aquisition cost
  • Etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you determine the baseline Security of an asset?

A

Cost: The value of data

Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a Data owner and a Data Custodian?

A

DO: Determines the classification
DC: Maintaines the data and implements the controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between Sensitivity and Criticality of data?

A

Sensitivity: Amount of damage if the data is disclosed (confidentiality)

Criticality: Time Sensitivity of data. Availability of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two main elements of data protection?

A

Location: Where is the data stored/processed/transmitted?

  • Jurisdiction
  • Audit
  • Threat Landscape
  • Does it move between locations and how?

Access:

  • Who has access?
  • What controls are in place?
  • What devices can be used to access the data?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which status can data be in?

A
  • At rest
    (File systems Encryptions, EFS, TPM)
  • In process: Physical sec.
  • In transit: SSL/TLS
    IP4: No build in sec (can be duct taped with IPSEC, VPN, SSL/TLS)
    IP6: IPSEC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does system hardening consist of?

A
  • Limiting the attack surface
  • Removing unnessecary services/software/hardware
  • Renaming default accounts
  • Changing default settings
  • Enabling sec. configurations like auditing, firewalls, updates, etc.
  • Physical sec.
  • Has to go through change control!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the threats to data storage?

A
  • Unauthorized usage/access
    (Strong authentication/ Encryption/ Obfuscation, anonymization/ tokenization, masking/ Policies
  • DoS/DDoS
    (Redundancy / Data dispersion)
  • Corruption, modification, destruction
    (Hashes/ dig. signed files)
  • Data leakage and breaches
    (DLP)
  • Theft or accidental media loss
    (TLP)
  • Malware attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you protect data in the cloud?

A
  • protect data moving: SSL/TLP/IPSEC
  • protect data in at rest: encryption
  • detecting data migration to the cloud: Database Activity Monitoring, DLP
  • Data dispersion: Replicated in multiple physical locations
  • Data fragmentation: splitting data into smaller fragments and distributing them accross a number of machines
  • SLA contracts
  • Right to audit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What i DLP?

A
  • controls to ensure certain types of data remain under ORG control in line with policies
  • detects exfiltration of certain types of data
  • helps ensure compliance with HIPAA, PCI-DSS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is obfuscation?

A

Hiding/replacing or omkring sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Anonymization?

A

Encrypting or removing PII from data sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Tolenization?

A

Access to a pointer rather than the actual data. (Think credit card)

Public cloud service can be integrated and paired with a private cloud that stores sensitive data. The data sent to the public cloud is alteres and contain reference to the data residing in the private cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is data Rights management?

A
  • an extra layer of controls on top of the data object

- the access Rights are embedded in the file itself (ACC). Requires the same client software on all relevant systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the elements of data redundancy?

A
  • backups. What/how often/ where. Sensitivity/Criticality
  • Archives (data out of use). Considerations: Encryption, monitoring, granular retrievel, electronic discovery for legal cases, media type, restoration procedures
  • Retention Policy: operational or regulatory compliance
  • Use number from BIA: RTO and RPO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the elements of Secure Data Disposal?

A
  • sanitizing
  • the only Secure disposal is absolute physical destruction (stredding/incinirate). Irreversible.
  • Deagauzing (use of magnets). Allows for reuse of the drive. Purging. Media unusable by normal means.
  • Overwriting. Clearing. Data inaccessible by normal means.
  • deleting and formatting are not Secure!