Domain 2. Asset Security Flashcards
(19 cards)
System of classes ordered according to value
Classification
The act of sorting into defined classifications
Categorization
Generation of new digital content, or the alteration/updating/modifying of existing content
Create
Committing digital data to some sort of storage repository, which typically occurs nearly simultaneously with creation
Store
Data viewed, processed, or otherwise used in some sort of activity, not including modification
Use
Information made accessible to others, such as company users, customers, and partners
Share
Data leaves active use and enters long-term storage
Archive
Data is permanently destroyed using physical or digital means (e.g., crypto shredding)
Destroy
Physical destruction of media; this is the most effective means of sanitization.
Destroy
Logical/physical techniques used to sanitize; data cannot be reconstructed.
Purge
Logical techniques used to sanitize; data may be reconstructed. This is the least effective means of sanitization.
Clear
Sanitization Methods (Best to Worst)
Best to Worst:
- Media destruction (incinerate)
- shred disintegrate drill
- degauss
- encryption (cryptoshredding)
- overwrite wipe erasure
- format
refers to residual representation of information even after attempts to securely delete or remove the data
Data remanence
Inactive data that is stored (resting) on media: hard disks, tapes, databases, spreadsheets, etc.
protection:
- encryption
- access control
- backup and restoration
Data at REST
Data flowing across a network, such as the internet.
protection:
- access control
- network encryption
+ end to end
+ link
+ onion
Data in TRANSIT
Data being used in computational activities.
protection:
- homomorphic encryption
- RBAC
- DRP
- DLP
Data in USE
The data portion of a packet is encrypted immediately by the application on the source node. The data remains encrypted throughout transmission as it passes through each node on its journey. Once the packet arrives at its destination, it is decrypted in the recipient’s application.
End-to-End Encryption
The packet header and data are encrypted between each node. Header information and plaintext content are also available at each node. As a result, every node becomes a potential attack or disclosure point.
Link Encryption
Describes a very effective method of protecting data in transit, as it essentially provides complete confidentiality and anonymity using multiple layers of encryption.
Onion Network Encryption