6th Edition CBK - CISSP: Domain 2 Asset Security

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/100

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

101 Terms

1
New cards

Proliferated

To increase a lot and suddenly in number

2
New cards

Common Regulations and Guidelines that Classify and Categorize Info Assets

Canada

China 

European Union 

United Kingdom 

United States


Canada - Security of Information Act

China - Guarding State Secrets 

European Union - (GDPR) General Date Protection Regulation

United Kingdom - (OSA) Official Secretes Act 

United States - 

NIST Federal Information Processing Standard 199 "Standards for Security Categorization of Federal Information and Information Systems"

(CNSS) Committee on National Security Instruction No. 1253 "Security Categorization and Control Selection for National Security Systems"

3
New cards

Type of Data Classification - Context Based

Derived from metadata like ownership location, or other values that can indirectly indicate sensitivity or critically

4
New cards

Type of Data Classification - Content Based

Derived by inspecting the contents of files and directly identifying sensitive data, rather that interfering it from metadata

5
New cards

Type of Data Classification - User Based

Manual assignment of data classification and is loaded in users understanding of the data and your organization's classification scheme

6
New cards

Metadata

Is data that describes various attribute of data files, network traffic, or user behavior, without containing the actual content of communicating

7
New cards

FOUO

For Official Use Only

8
New cards

Classification Schemes - Confidential

The highest level of classification outside of government or military organization

9
New cards

Classification Schemes - Sensitive

A level of relative value less than confidential but still important to protect

10
New cards

Classification Schemes - Private

Usually compartmental data that might not do the company damage but must keep private for other reasons

11
New cards

Classification Schemes - Proprietary

Data that is disclosed outside the company on a limited basis or contains information that could reduce the company's competitive advantage

12
New cards

Classification Schemes - Public

Data that if lost would have little or no impact to the company

13
New cards

Data Categorization

Is the process of grouping types of data with comparable "sensitivity labels"(classification)

14
New cards

Category Types of Information

Privacy 

Medical 

Proprietary 

Financial 

Investigate 

Contractor Sensitive 

Security Management

15
New cards

Data Classification

Focused on the identification of sensitivity, critically and value of data

16
New cards

Asset Classification

Involves grouping assets based on their relative level of sensitivity and the impact to the organization should the assets be compromised

17
New cards

Assets Include

Data of value, the hardware that process it, and the media on which it is stored

18
New cards

Evaluation Criteria

Includes the types of data the assets handle, the process the assets perform or both

19
New cards

Hard assets

Can touch them and they have a physical existence

20
New cards

HSM

Hardware Security Module

21
New cards

Obfuscate

Techniques used to make information particularly data or code, more difficult to understand or interpret without authorization, it's not a encryption, which is reversible with a key

22
New cards

Data De-Identification

Process of removing information that can be used to identify any (PII), Involves taking any personally identifying data fields and converting them to masked, obfuscated, encrypted or tokenized data fields

23
New cards

Anonymize

Removing or altering (PII) from a data set so that individuals cannot be re-identified

24
New cards

Tokenization

Process of substituting a sensitive data element with a non sensitive set of characters or numbers called a token

25
New cards

Token

Cannot be reverse engineering ex back to the value of the original data

26
New cards

Data Governance

Including access, acceptable use, and data retention, must be performed or overseen by the right individuals in the organization

27
New cards

Asset Inventory Tool

Should have a way to distinguish authorized assets from unauthorized devices and applications and the ability to send alerts when the latter are discovered- need to also cover technical specifications such as hardware and software

28
New cards

System of Record

Should be the source used for official reports and other data requests, such as part of an audit

29
New cards

RFID

Radio Frequency Identification - Can increase the speed and accuracy of locating an assets especially during an incident

30
New cards

ISO 55000

Guidance for proper management of physical assets can be found

31
New cards

ITAM

Information Technology Assets management- Set of business practices related to governing and managing IT assets, including hardware, software, data, and related process

32
New cards

Configuration Management

System and software configuration must be tightly controlled and thoroughly documented

33
New cards

System Baseline

Identifies the versions and setting of all configuration items in a product, system, or subsystem

34
New cards

Security Baseline

Is minimum set of safeguards (security control) required to protect a company

35
New cards

NCP- National Checklist Program

- Is the US government respiratory for up to date and detailed guidance for security configuration

36
New cards

SCAP

Enables validated security products to automatically perform configuration checking using NCP check list

37
New cards

Change Management

Ensuring organizations employ standardized process to make changes to their assets this includes change control

38
New cards

Change Control

Set of process and tools that allow you to verify that authorized changes are implemented correctly

39
New cards

Management Data Lifecycle

1. Collect 

2. Store

3. Use

4. Share

5. Retain

6. Destroy

40
New cards

Data Owners

Individual or group of individuals responsible for dictating how and why data should be used, as well as determining how the data must be secured

41
New cards

Data Controller

An entity that determines the purposes, conditions, and means of processing the personal data and does take accountability and responsibility

42
New cards

Data Custodian

Responsible for maintaining data on the IT infrastructure, in accordance with requirements established by the data owner and business

43
New cards

Data Processor

Party responsible for transmitting, transferring or otherwise handling data on behalf of a data owner

44
New cards

Data Maintenance

Continuously monitoring your data and applying principles like least privilege and defense in depth

45
New cards

NIST SP 800-53

Requirements that federal agencies and government contractors need to meet for compliance with FISMA

46
New cards

FISMA

Federal Information Security Management Act - Require data retention for minimum of three years

47
New cards

Data Retention

Data stored in local data center or hosted by a third party until how long the data will be retained before being securely destroyed

48
New cards

GDPR - Article 5

States that personal data should be retained for only as long as it is required in order to achieve the purpose for which the data was collected

49
New cards

Data Remanence

Occurs when data destruction efforts were insufficient to prevent the reconstruction of the data

50
New cards

Overwriting File Sectors

Overwriting the disks multiple times will remove all existing data this is called purging

51
New cards

Crypto Graphic Erasure

In cloud environments, the alternative is to encrypt the data and keep the key outside the cloud environment where the data resides, subjects could also delete the key when it is no longer needed- usually done when overwriting file sectors are not possible

52
New cards

GLBA Gramm- Leach- Bililey Act-

Limits the disclosure and use of customer information and imposes a security rule for financial institutions

53
New cards

European standards BS EN 15713 "Secure Destruction of Confidential Information"

Code of practice for securely and effectively destroying such data

54
New cards

(NSA) (CSS)

US National Security Agency - Central Security Service Policy Manual 9-12 — Requirements for mitigations against data remanence

55
New cards

CRB

Criminal Records Bureau

56
New cards

Two General Approaches for Data Destruction

Render the actual device or object containing the media useless, physical destruction of the media, electromagnetic degaussing and incineration

Cleansing or sanitizing the media/drive- the physical media therefore be reused, but there is no trace of data remanence- reformatting or re-imaging the hard drive

57
New cards

NIST SP 800-88

"Guidelines for Media Sanitization" Achieving desired levels of security assurance with specific steps and instructions

58
New cards

Achieve Adequate Asset Sanitization - Clearing

Digitally wiping data or overwriting it with zeros or ones- least effective method and may allowed data to be recovered

59
New cards

Achieve Adequate Asset Sanitization - Purging

Methods such as degaussing- which is the destruction of data by exposing its storage media to a strong magnetic field

60
New cards

Achieve Adequate Asset Sanitization - Destruction

Physically destroying media through shredding, burning or pulverizing also includes the use of strong encryption to logically destroy data

61
New cards

Specific Techniques in Sanitization - Zeroing

Erases data on the disk and overwrites it with all zeros

62
New cards

Specific Techniques in Sanitization - Degaussing

Magnetic media is erased returned to its initial blank state through the use of strong magnetic fields

63
New cards

Full Disk Encryption

Encryption can be employed across an entire volume of storage

64
New cards

Data Security Controls - Technical Control

Defend against misuse or unauthorized access to valuable information, a combination of this control work together to protect, detect and respond to potential and actual security incidents and events

65
New cards

Data Security Controls - Administrative Control

Are the people facing polices, procedures, standards, and guidelines that an organization uses to implement technical and physical control, can be laws and regulations, industry best practices and organizational markets

66
New cards

Data Security Controls - Physical Control

Include guards and receptionists, entry access control, area lighting and surveillance, closed- circuit television (CCTV), and physical intrusion detection systems provides a layered defense approach

67
New cards

TPM Trusted Platfrom Module

Microcontroller chip integrated into the computer hardware that provides a crypto processor, Incorporated into the device itself it helps authenticate the platform upon booting

68
New cards

SED Self Encryption Device

- Hard disk drive or solid- state drive that automatically encrypts and decrypts drive data without the need for additional encryption software

69
New cards

File-Level Encryption

Tailored data protection strategy that may provide additional protection from unauthorized access to a file on a hard drive in the event the full disk is decrypted

70
New cards

Data in motion/ Data in Transit

Any data that is actively moving from a point of origin to a destination across networks, including trusted, private networks

71
New cards

TLS

Transport Layer Security

72
New cards

Link Encryption

Method of data in transit security where the traffic is encrypted and decrypted at each network routing point

73
New cards

Node

Refers to a device or system connected to a network

74
New cards

End-to-End Encryption

Type of system of communication ensures that only the sender and recipient can read the data

75
New cards

Scoping

Process the organization undertakes to consider which security controls apply and what assets they need to protect

76
New cards

Tailoring

Process of modifying the set of controls to meet the specific characteristics and requirements of an organization

77
New cards

Compensating Controls

Augment a primary controls ability to achieve a control objective or replace the primary control to meet the given control objective

78
New cards

(DoDI) U.S Department of Defense Instruction:DoD 8510.10 (RMF)"Risk Management Framework" for DoD IT Information Technology

Applies to DoDd into systems and manages the lifecycle cybersecurity risk to all DoD IT

79
New cards

NIST (CFS)

Cybersecurity Framework - Provides security and privacy guidelines that are primarily targeted at helping private sector companies improve their security-

80
New cards

NIST CyberSecurity Framework: Broken down into 5 functions:

Identify 

Protect

Detect

Respond 

Recover

81
New cards

UK 10 Steps to Cyber Security

Meant to help organizations focus on the main threats to reduce the greatest amount of risk - Intended for U.K.

82
New cards

NIST SP 800-53 Rev5 "Security Privacy Controls for Federal Information Systems and Organizations"

Catalog of security controls for all U.S federal information systems expect those related to national security- establishes a baseline of security controls and supplement security controls base on assessment of risk for the organization

83
New cards

NIST SP 800-53A Rev4 "Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans"

Procedures for conducting assessments of security controls and privacy controls employed with U.S federal information systems and organizations

84
New cards

FISP Publication 199 "Standard for Security Categorization of Federal Information and Information Systems"

Categorizing U.S federal information and information systems according to a governments agency's level of concern for confidentially, integrity and availability and the potential impact an agency assets and operations

85
New cards

FISP Publication 200 "Minimum Security Requirements for Federal Information and Information Systems"

Security during the development, implementation, and operation of more secure information systems is more emphasized

86
New cards

ISO 27001 "Information Technology- Security Techniques Information Security Management Systems Requirements"

Requirements for establishing implementing, maintaining, and continually improving on information security management systems, requirements for assessments and treatments of Information security risk tailored to needs of the organization

87
New cards

ISO 27002 "Information Technology; Security Techniques - Code of Practice for Information Security Controls"

Guideline for organizational information security standard and information security management practices including the selection, implementation, and management of controls, taking into consideration the organizations into security risk

Usually used to comply with ISO 27001

88
New cards

DRM

Digital Rights Management - Set of tools and process focused on controlling the use, modification and distribution of (IP)Intellectual Property throughout its lifecycle, allows to restrict access, editing copying and printing of your digital assets

89
New cards

IRM

Information Rights Management - Related technology that more broadly protects data from unauthorized access by controlling who can view, copy, delete or other wise modify data

90
New cards

DLP

Technologies and practices used to ensure that sensitive data is not lost or accessed by unauthorized parties DLP technologies can be used to identify and classify sensitive can be used to identify and classify sensitive data and apply protections that prevent the data from being "lost" or stolen

91
New cards

Core Stage of DLP Implementation - Discovering and Classification

First stage of DLP, Discovery is the process of finding all instances of data, while classification is the act of categorizing of data based on its sensitivity and value to the organization

92
New cards

Core Stage of DLP Implementation - Monitoring

Involves inspecting data as it moves throughout the data lifecycle, DLP technologies seek to identify data that is being misused or mishandled

93
New cards

Core Stage of DLP Implementation - Enforcement

Final stage of DLP, Where action is taken to prevent policy of violations identified during the monitoring stage, you must also monitor for false negatives and false positives, and constantly tune your DLP implementation to avoid enforcement issues, such as blocking legitimate/authorized data

94
New cards

DLP in Transit- Network Based DLP

•Involves monitoring outbound network traffic, typically near the perimeter

  • Its important to note here that they are limitation of standard DLP implementations is that they cannot effectively monitor encrypted traffic, such as HTTPS - But if DLP has to do so, it increases significantly the complexity of a DLP Implementation

95
New cards

DLP in Use- Host Based(or end point- based) DLP

Involves installation of a DLP application on a workstation or other endpoint device

96
New cards

CASB

Cloud Access Security Broker- Is a software application that sits between cloud users and cloud services and services and applications

97
New cards

CASB Four Primary Functions

•Visibility- Provide insight into an organizations cloud usage 

•Data Security- Monitor an organizations data security 

•Threat Protection- Guard against insider threats by providing a comprehensive view of cloud usage 

•Compliance

98
New cards

Primary Types of CASB Solutions

•Forward Proxy

•Reverse Proxy

•API- Based

99
New cards

Primary Types of CASB Solution - Forward Proxy

•Generally resides on a users device and uses an encrypted man-in-the-middle technique to securely impact and forward all cloud traffic for the user

100
New cards

Primary Types of CASB Solution- Reverse Proxy

•Integrates into identity services, such as Okta, to force all traffic through the CASB inline monitoring and no need to individually install certificates on a user endpoints