Domain 2: Asset Security Flashcards

1
Q

Data Lifecycle *6 steps)

A
1- Collect
2- Store
3- Use
4- Share
5- Retain
6- Destroy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Owner

A

Individuals responsible for dictating how and why data should be used; determines how the data must be secured (risk treatment); determines the appropriate value and classification of information generated by the owner or department; communicates Data Classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Controller

A

Determines the purposes and means of data processing. Responsible for adhering to all principles relating to processing personal data. Negotiate privacy protections / data processing agreements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Custodian

A

Maintains the protection of data according to the information classification. Delegated by the Data Owner and is usually IT personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Rights Management

A

A set of tools and processes focused on controlling the use, modification, and distribution of intellectual property (IP) throughout its lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Clearing

A

Digitally wiping or “Overwriting” data with zeroes (zeroing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Purging

A

Digital destruction of data by methods including degaussing (using a strong magnetic field to destroy data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Destruction

A

Physically destroying the media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Loss Prevention (Steps)

A
  1. Discovery & Classification
  2. Monitoring
  3. Enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Access Security Broker - 4 Functions

A
  1. Visibility – Provide insight into cloud usage
  2. Data Security – Monitor & help prevent data exfiltration
  3. Threat Protection
  4. Compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly