Domain 2 - Asset security Flashcards

1
Q

Data Security Controls

A

○ Marking, labeling, handling, classification - classification is the most important
○ Data handling - shipping, chain of custody, don’t open boxes!
○ Data destruction - erasing, clearing (overwriting w/ unclassified data)
○ Record retention - if retention policy is 1 year, it should be destroyed when it ages out (1 year)
Tape backup security - secure facility, tapes labeled ensures all understand the classification of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Erasing (data destruction method)

A

performing a “delete” operation. Can be recoverable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Clearing aka overwriting (data destruction method)

A

prepping media for reuse and ensuring data cannot be recovered using traditional recovery tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purging (data destruction method)

A

-more intense form of clearing that preps media for reuse in less secure environments
-US gov does not approve this for top secret data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

degaussing (data destruction method)

A

uses a magnetic field to erase data on physical media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

destruction (data destruction method)

A

final stage in media lifecycle, most secure method of sanitizing media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data classification

A

Top Secret - Class 3 - Confidential/ proprietary (grave damage)

Secret - Class 2 - Private (serious damage)

Confidential - Class 1 - Sensitive (damage)

Unclassified - Class 0 - Public (no damage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PII

A

info that can identify and individual (name, SSN, birthdate, biometrics, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PHI

A

health related info that can be linked to a person, covered by HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data owner

A

usually senior management, can DELEGATE day to day duties, cannot delegate total responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Custodian

A

usually someone in IT, DAY TO DAY, does not decide what controls are needed, but does implement controls for data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data administrators (data ownership)

A

grants appropriate access to personnel (often via RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business owner (data ownership)

A

can overlap responsibilities of the system owner or be the same role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asset owner (data ownership)

A

owns an asset that processes sensitive data and associated sec plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data processor (GDPR term)

A

natural or legal person, public authority, agency, or other body, which processes personal data solely on behalf of the data controller, THIRD PARTY USUALLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data controller (GDPR term)

A

person or entity that controls processing of the data

17
Q

Data transfer (GDPR term)

A

GDPR restricts data transfers to countries outside the EU

18
Q

Anonymization

A

process of removing all relevant data so that it is impossible to identify original subject or person,

if done effectively GDPR is no longer relevant for the anonymized data, good if you don’t need the data

19
Q

Pseudonymization

A

process of using pseudonyms (aliases) to represent the data,

need info but want to mask identities,

i.e. creating a patient number instead of a name, can result in less stringent requirements than would normally apply under GDPR

20
Q

Device fingerprinting

A

can require user auth, can gather data like OS, versions, software info, and other info to uniquely identify a system

21
Q

DRM

A

digital rights management

methods:
persistent online authentication, automatic expiration, continuous audit trail