Domain 2. Asset Security Flashcards

(19 cards)

1
Q

System of classes ordered according to value

A

Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of sorting into defined classifications

A

Categorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Generation of new digital content, or the alteration/updating/modifying of existing content

A

Create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Committing digital data to some sort of storage repository, which typically occurs nearly simultaneously with creation

A

Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data viewed, processed, or otherwise used in some sort of activity, not including modification

A

Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information made accessible to others, such as company users, customers, and partners

A

Share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data leaves active use and enters long-term storage

A

Archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data is permanently destroyed using physical or digital means (e.g., crypto shredding)

A

Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical destruction of media; this is the most effective means of sanitization.

A

Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logical/physical techniques used to sanitize; data cannot be reconstructed.

A

Purge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical techniques used to sanitize; data may be reconstructed. This is the least effective means of sanitization.

A

Clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sanitization Methods (Best to Worst)

A

Best to Worst:

  1. Media destruction (incinerate)
  2. shred disintegrate drill
  3. degauss
  4. encryption (cryptoshredding)
  5. overwrite wipe erasure
  6. format
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to residual representation of information even after attempts to securely delete or remove the data

A

Data remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Inactive data that is stored (resting) on media: hard disks, tapes, databases, spreadsheets, etc.

protection:
- encryption
- access control
- backup and restoration

A

Data at REST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data flowing across a network, such as the internet.

protection:
- access control
- network encryption
+ end to end
+ link
+ onion

A

Data in TRANSIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data being used in computational activities.

protection:
- homomorphic encryption
- RBAC
- DRP
- DLP

17
Q

The data portion of a packet is encrypted immediately by the application on the source node. The data remains encrypted throughout transmission as it passes through each node on its journey. Once the packet arrives at its destination, it is decrypted in the recipient’s application.

A

End-to-End Encryption

18
Q

The packet header and data are encrypted between each node. Header information and plaintext content are also available at each node. As a result, every node becomes a potential attack or disclosure point.

A

Link Encryption

19
Q

Describes a very effective method of protecting data in transit, as it essentially provides complete confidentiality and anonymity using multiple layers of encryption.

A

Onion Network Encryption