Knowledge Asset Security (KAS) Flashcards
800-122
NIST Special Publication – defines PII as any information that can be used to trace a person’s identity such as SSN, name, DOB, place of birth, mother’s maiden name
800-137
build/implement info security continuous monitoring program: define, establish, implement, analyze and report
800-14
GAPP for securing information technology systems
800-145
cloud computing
800-18 NIST
How to develop security plans
800-27
Baseline for achieving security, five lifecycle planning phases (defined in 800-14), 33 IT security principles
800-88
NIST guidelines for sanitation and disposition, prevents data remanence
Administrators
Assign permission to access and handle data
Auditor
examines security controls
Baseline
Starting point that can be tailored to an organization for a minimum security standard. Common security configurations, Use Group Policies to check and enforce compliance
Buy high quality media
value of data exceeds cost of media; Sanitation is business normal, not destruction for costs reasons
CD
Compact Disc: a class of media on which data are recorded by optical means.
CIS
Center for Internet Security; creates list of security controls for OS, mobile, server, and network devices
Classifying Costs
costs are not a factor in classifying data but are in controls
Clear
To use software or hardware products to overwrite storage space on the media with non- sensitive data. This process may include overwriting not only the logical storage location of a file(s) (e.g., file allocation table) but also may include all addressable locations. See comments on clear/purge convergence.
Clearing
z-Prepping media for reuse at same level. Removal of sensitive data from storage devices in such a way that the data may not be reconstructed using normal system functions or utilities. May be recoverable with special lab equipment. Data just overwritten.
COPPA
California Online Privacy Protection Act, operators of commercial websites post a privacy policy if collecting personal information on CA residents
Criteria
Value, age, useful life, personal association
Curie Temperature
Critical point where a material’s intrinsic magnetic alignment changes direction.
Data
Pieces of information from which “understandable information” is derived
Data at rest
Dar; inactive data that is physically stored, not RAM, biggest threat is a data breach, full disk encryption protects it (Microsoft Bitlocker and Microsoft EFS, which use AES, are apps)
Data Life
Creation, use, destruction (subservient to security policy)
Degauss
To reduce the magnetic flux to virtual zero by applying a reverse magnetizing field. Also called demagnetizing. Degaussing any current generation hard disk (including but not limited to IDE, EIDE, ATA, SCSI and Jaz) will render the drive permanently unusable since these drives store track location information on the hard drive in dedicated regions of the drive in between the data sectors.
Degaussing
AC erasure; alternating magnetic fields , DC erasure; unidirectional magnetic field or permanent magnet, can erase tapes