Shared Flashcard Set

Details

CISSP - 2018 (D2)
Asset Security
68
Other
Not Applicable
01/11/2021

Additional Other Flashcards

 


 

Cards

Term
Sensitive Data
Definition

Any information that is not public or unclassified

Term
How does NIST SP 800-122 define PII?
Definition

- Personally identifiable information (PII) is:

- Any information about an individual maintained by an agency, including:

1. any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date, and place of birth, mother's maiden name, or biometric records; and

2. any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.

Term
NIST SP 800-122
Definition

Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)

Term
Proprietary Data
Definition

Any data that helps an organization maintain a competitive edge

Term
Data Classification
Definition

identifies the value of the data to the organization and is critical to protect data confidentiality and integrity.

- IDs classification labels used within the organization

- IDs how data owners can determine the proper classification

- IDs how personnel should protect data based on its classification

 

Term
Data Classifications
Definition

Top Secret (Exceptional Grave Damage) Confidential/Proprietary

Secret             (Serious Damage)       Private

Confidential        (Damage)               Sensitive

Unclassified     (No Damage)             Public

 

Term
Sensitive Information
Definition

Any information that isn't public or unclassified

Term
IAM
Definition

Identity and Access Management

Term
Data States
Definition

- Data at Rest - stored on media, USB drives, SAN, etc.

- Data in transit (data in motion)- any data transmitted over a network

- Data in use - in memory or temporary storage buffers while an application is using it

Term
ITRC
Definition

Identity Theft Resource Center

Term
NIST SP 800-88r1
Definition

Guidelines for Media Sanitization

Term
Data remanence
Definition

Data that remained on media after the data was supposedly erased.

Term
Erasing
Definition

- performing a delete operation against a file, a selection of files, or the entire media.

- In most cases, the deletion or removal process removes only the directory or catalog link to the data.

Term
Clearing
Definition

 

- The removal of sensitive data from storage devices so that there is assurance that the data may not be reconstructed from normal system functions or software file/data recovery utilities

Term
Purging
Definition

- a more intense form of clearing

- The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique

Term
Degaussing
Definition

- a strong magnetic field erases data on some media 

- Common goal of returning the tape to its original state

- Degaussing a HD may damage the elctronics

Term
Destruction
Definition

- Final stage of the lifecycle of media and more secure method of sanitizing media

- incineration, crushing, shredding, disintegration, and dissolving using caustic or acidic chemicals

Term
Declassification
Definition

- any process that purgest media or a system in preparation for reused in an unclassified environment

 

Term
Symmetric encryption
Definition

- Uses the same key to encrypt and decrypt the data

- AES uses key sizes of 128 bits or 192 bits 

- AES 256 uses a key size of 256 bits

Term
Common symmetric encryption algorithms
Definition

- Advanced Encryption Standard (AES)

- Triple DES

- Blowfish

Term
AES
Definition

- Advanced Encryption Standard (AES)

- AES supports key sizes of 128, 192, and 256 bits

- MS uses in BitLocker

- US Govt uses for classified data up to Top Secret

 

Term
Triple DES
Definition

- Triple Data Encryption Standard (3DES)

- 1st implementation used 56-bit keys

- Newer 3DES use 112 or 168-bit keys

- used in some implementations of MasterCard, Visa (EMV), and Europay standard

Term
Blowfish
Definition

- Developed by Bruce Schneier as DES alternative

- can use 32-448 bit key size

- Linux systems use bcrypt to encrypt passwords and bcrypt is based on blowfish

  -- bcrypt adds 128 additional bits as salt to protect against rainbow table attacks

Term
TLS
Definition

- Transport Layer Security

- Almost all HTTPS transmissions use TLS 1.1 as underlying encryption protocol

- Replaced Secure Socket Layer (SSL) in 1995

Term
VPN
Definition

- Virtual Private Network

- Allow employees to access an organization's internal network from their home or while traveling

- VPN traffic goes over a public network

- IPSEC is often combined with Layer 2 Tunneling Protocol (L2TP)

- L2TP/IPsec encrypts data and sends it over the internet using Tunnel mode to protect it while in transit

Term
L2TP
Definition

- Layer 2 Tunneling Protocol

 

Term
SSH
Definition

- Secure Shell

- A strong encryption protocol included with other protocols such as Secure Copy (SCP) and Secure File Transfer Protocol (SFTP) 

- Many administrators use SSH when administering remote servers

Term
SCP
Definition

- Secure Copy

Term
SFTP
Definition

- Secure File Transfer Protocol

Term
FTP
Definition

- File Transfer Protocol

Term
Data Owner
Definition

- Person who has ultimate organizational responsibility for data, typically the CEO, president, or a department head (DH)

- Identify the classification of data and ensure it's labeled properly

- Ensure adequate security controls, based on the classification and the org's security policy requirements

- Owner's may be liable for negligence if they fail to perform due diligence in establishing and enforcing security policies to protect data

Term
NIST SP 800-18
Definition

- Guide for Developing Security Plans for Information Technology Systems

 

Term
Asset Owner (system owner)
Definition

- the person who owns the asset or system that processes sensitive data

- Typically the data owner

- System owner is responsible for ensuring that data processed on the system remains secure, labeled correctly, and appropriate security controls are in place

Term
Business/Mission Owners
Definition

- NIST SP 800-18 refers to a business/mission owner as a program manager or a information system owner

- may overlap with responsibilities of system owner or be the same role

- Responsible for ensuring that systems provide value to the organization

 

 

Term
Data Processor (GDPR)
Definition

- a natural or legal person, public authority, agency, or other body, which processes personal data solely on behalf of the data controller" (data controller is the person or entity that controls the processing of the data)

Term
Regulation EU 2016/679
Definition

- GDPR

Term
Privacy Shield Principles
Definition

- Notice - must inform individuals of purpose to collect data

- Choice - opportunity to opt out

- Accountability for Onward Transfer - Orgs can only transfer data to other orgs that comply with Notice & choice

- Security - must protect personal data

- Data integrity and purpose limitation - Orgs only collect data needed for purposes in notice principle.  Accurate, complete, currend 

- Access - individuals must have access, ability to amend/correct/delete info when inaccurate

- Recourse, Enforcement, and Liability - Mechanism to handle compplains

 

 

Term
Pseudonymization
Definition

- the process of using pseudonyms to represent other data. (e.g. instead of referring to a patient by name, you could refer to them at Patient 23456)

- the key is to have another resource (such as another database) that allows you to ID the original data using the pseudonym

Term
Anonymization
Definition

- the process of removing all relevant data so that it is impossible to identify the original subject or person

Term
Data Masking
Definition

- swapping data in individual data columns so that records no longer represent the actual data.  However, the data still maintains aggregate values that can be used for other purposes, such as scientific purposes

- can not be reversed

Term
Tokenization
Definition

- Similar to pseudonymization but uses tokens to represent other data instead of pseudonyms.  Neither token or pseudonym has any meaning or value outside of the process

Term
Data Administrator
Definition

- Responsible for grinding appropriate access to personnel, but not necessarily full administrator rights and privileges.

Typically assign permissions using a Role-Based Access Control (RBAC) model

Term
RBAC
Definition

Role-Based Access Control (RBAC)

Term
Custodian
Definition

- helps protect the integrity and security of data by ensuring that it is properly stored and protected.  Ensure that the data is backed up. Maintain auditing logs

- In practice, personnel within IT Dept or system security admin would typically be the custodians.

Term
NIST SP 800-53r5
Definition

- Security Control Baselines

- Appendix D includes a comprehensive list of controls and has prioritized them as low-impact, moderate-impact, and high-impact.

Term
AC
Definition

Access Control

Term
Scoping
Definition

- reviewing a list of baseline security controls and selecting only those controls that apply to the IT systems you're trying to protect

- The process of determining which portions of a standard will be employed by an organization

- Scoping is SUBTRACTING and removing security controls that are not applicable, such as removing physical building controls when there is no building because everyone is working from home

- Limiting general baseline recommendations by removing those that do not apply 

Term
Tailoring
Definition

- modifying the list of security controls within a baseline so that they align with the mission of the organization

-The process of customizing a standard for an organization. It begins with controls selection, continues with scoping, and finishes with the application of compensating controls

- Altering baselines recommendations to apply more specifically

 

Term
Purging
Definition

Purging media removes all data by writing over existing data multiple times to ensure that the data is not recoverable using any known methods. Purged media can then be reused in less secure environments

Term
NIST SP 800-60r1
Definition

Guide for Mapping Types of Information and Information Systems to Security Categories

Term
Categorization
Definition

- The process of determining the impact of the loss of confidentiality, integrity, or availability of the information/asset to an organization

Term
Classification
Definition

- The purpose of a classification system is to ensure information/assets are marked in such a way that only those with an appropriate level of clearance can have access to them.

Data classification is the process by which data is evaluated for its risk and sensitivity and then assigned a label that determines the level of security that will be used to protect that data. 

Term
Equipment Lifecycle
Definition

1. Define Requirements

2. Acquire & implement

3. Operations & maintenance

4. Disposal & Decommission

Term
CMDB
Definition

Configuration Management Database (CMDB)

Term
QC
Definition

- Quality Control (QC)

- an assessment of quality based on INTERNAL standards, processes, and procedures established to control and monitor quality

Term
QA
Definition

- Quality Assurance (QA)

- an assessment of quality based on standards EXTERNAL to the process and involves reviewing of the activities and quality control processes to ensure final products meet predetermined standards of quality

Term
Data Categorization
Definition

- Determining the impact of the loss of confidentiality, integrity, or availability of the information/asset to an organizaiton

Term
Three states of Data
Definition

- At rest (storage)

- In motion (transit, on the wire)

- In use (application)

Term
Baseline
Definition

- Establishes a minimum set of safeguards that can be standardized, documented, implemented, monitored, and maintained

Term
SCAP
Definition

- Multi-purpose framework of specifications that supports automated configuration, vulnerability and patch checking, technical control compliance activities, and security measurement

Term
Data Protection Methods (in storage)
Definition

- Encryption

- Obfuscation/tokenization

- Archive/dispose/destruct

- Mobile Device Protection

- Physical Media Control

Term
Data Protection Methods (in motion)
Definition

- Encryption 

- Perimeter Security

- Web Content Filtering

- Network Traffic Monitoring

- VPNs

Term
Data Protection Methods (in-use)
Definition

- Encryption 

- User Monitoring

- Workstation Restrictions

- Application Controls (whitelist/blacklist)

- Data Labeling

Term
Data Controller
Definition

- create and manage sensitive data within an organization (e.g. HR employees)

Term
Data Processor
Definition

- Manage data on behalf of data controllers (e.g. outsources payroll company)

Term
NIST Cyber Security Framework
Definition

- Identify

- Protect

- Detect

- Respond

- Recover

 

Term
ACL
Definition

- Access Control List

- Bound to an OBJECT (e.g. file, folder)

Term
DLP
Definition

- Data Loss Prevention (DLP)

  -- Unauthorized

  -- External

  -- Sesitive

Supporting users have an ad free experience!