Protecting Security of Assets Flashcards

1
Q

Understand the importance of data and asset classifications

A

Data owners are responsible for defining data and asset classifications and ensuring that data and systems are properly marked. Additionally, data owners define requirements to protect data at different classifications, such as encrypting sensitive data at rest and in transit. Data classifications are typically defined within security policies or data policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define PII and PHI

A

Personally identifiable information (PII) is any information that can identify an individual. Protected health information (PHI) is any health-related information that can be related to a specific person. Many laws and regulations mandate the protection of PII and PHI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Know how to manage sensitive information

A

Sensitive information is any type of classified information, and proper management helps prevent unauthorized disclosure resulting in a loss of confidentiality. Proper management includes marking, handling, storing, and destroying sensitive information. The two areas where organizations often miss the mark are adequately protecting backup media holding sensitive information and sanitizing media or equipment when it is at the end of its lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the three data states

A

The three data states are at rest, in transit, and in use. Data at rest is any data stored on media such as hard drives or external media. Data in transit is any data transmitted over a network. Encryption methods protect data at rest and in transit. Data in use refers to data in memory and used by an application. Applications should flush memory buffers to remove data after it is no longer needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define DLP

A

Data loss prevention (DLP) systems detect and block data exfiltration attempts by scanning unencrypted files and looking for keywords and data patterns. Network-based systems (including cloud-based systems) scan files before they leave the network. Endpoint-based systems prevent users from copying or printing some files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compare data destruction methods

A

Erasing a file doesn’t delete it. Clearing media overwrites it with characters or bits. Purging repeats the clearing process multiple times and removes data so that the media can be reused. Degaussing removes data from tapes and magnetic hard disk drives, but it does not affect optical media or SSDs. Destruction methods include incineration, crushing, shredding, and disintegration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe data remanence

A

Data remanence is the data that remains on media after it should have been removed. Hard disk drives sometimes retain residual magnetic flux that can be read with advanced tools. Advanced tools can read slack space on a disk, which is unused space in clusters. Erasing data on a disk leaves data remanence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Understand record retention policies

A

Record retention policies ensure that data is kept in a usable state while it is needed and destroyed when it is no longer needed. Many laws and regulations mandate keeping data for a specific amount of time, but in the absence of formal regulations, organizations specify the retention period within a policy. Audit trail data needs to be kept long enough to reconstruct past incidents, but the organization must identify how far back they want to investigate. A current trend in many organizations is to reduce legal liabilities by implementing short retention policies with email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Know the difference between EOL and EOS

A

End-of-life (EOL) is the date announced by a vendor when sales of a product stop. However, the vendor still supports the product after EOL. End-of-support (EOS) identifies the date when a vendor will no longer support a product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain DRM

A

Digital rights management (DRM) methods provide copyright protection for copyrighted works. The purpose is to prevent the unauthorized use, modification, and distribution of copyrighted works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain CASB

A

A cloud access security broker (CASB) is placed logically between users and cloud resources. It can apply internal security controls to cloud resources. The CASB component can be placed on-premises or in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define pseudonymization

A

Pseudonymization is the process of replacing some data elements with pseudonyms or aliases. It removes privacy data so that a dataset can be shared. However, the original data remains available in a separate dataset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define tokenization

A

Tokenization replaces data elements with a string of characters or a token. Credit card processors replace credit card data with a token, and a third party holds the mapping to the original data and the token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define anonymization

A

Anonymization replaces privacy data with useful but inaccurate data. The dataset can be shared and used for analysis purposes, but anonymization removes individual identities. Anonymization is permanent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Know the responsibilities of data roles

A

The data owner is the person responsible for classifying, labeling, and protecting data. System owners are responsible for the systems that process the data. Business and mission owners own the processes and ensure that the systems provide value to the organization. Data controllers decide what data to process and how to process it. Data processors are often the third-party entities that process data for an organization at the direction of the data controller. Administrators grant access to data based on guidelines provided by the data owners. A user, or subject, accesses data while performing work tasks. A custodian has day-to-day responsibilities for protecting and storing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Know about security control baselines

A

Security control baselines provide a listing of controls that an organization can apply as a baseline. Not all baselines apply to all organizations. Organizations apply scoping and tailoring techniques to adapt a baseline to their needs.