Chapter 11 - Data Classification and Handling Policies and Risk Management Policies Flashcards

(48 cards)

1
Q

_____________ in its simplest form is a way to identify the value of data.

A

Data classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three approaches to reducing the time and effort required to classify data are:

A

1 - Classify only the most important data

2 - Classify data by storage locaftion or point of origin

3 - Classify data at time of creation or use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Department of Energy uses the following 3 classifications:

A

Unclassified Controlled Nuclear Information (UCNI), Formerly Restricted Data (FRD), and Restricted Data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The US DoD uses the following classifications:

A

Confidential, secret, and top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The three most common reasons to classify data are:

A

-To protect information

-To retain information

-To recover information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The need to protect information is often referred to as the _________________.

A

security classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You need to retain data for two major reasons:

A

legal obligation and needs of the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the US, financial and tax records are generally retained for _______ years.

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________________ requires all customer correspondence to be retained for three years. This is to ensure a record is kept in case of an accusation of fraud or misrepresentation.

A

The Securities and Exchange Commission (SEC) Rule 17a-4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

______________ is demonstrated through a retention policy that demonstrates how data is routinely classified, retained, and deleted.

A

“Good faith”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

There are various approaches, sometimes called _______________, to classifying data.

A

classification schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When training employees on classification schemes, a good rule is to use ________________ classes. Many organizations use _________.

A

five or fewer

three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

With ____________ data, unauthorized disclosure would reasonably be expected to cause damage to national security.

A

confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

With ____________ data, unauthorized disclosure would reasonably be expected to cause serious damage to national security.

A

secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With ____________ data, unauthorized disclosure would reasonably be expected to cause grave damage to national security.

A

top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________________ is confidential data not subject to release under the Freedom of Information Act.

A

Sensitive but unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_________________ automatically removes the classification after 25 years.

A

Automatic declassification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

________________ reviews those records exempted from automatic declassification.

A

Systematic declassification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_________________ reviews specific records when requested.

A

Mandatory declassification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the business world, _____________ closely align with measured business results.

A

impact definitions

21
Q

When developing a customized data classification scheme, consider the following 5 general guidelines:

A

1 - Determine the number of classification levels

2 - Define each classification level

3 - Name each level

4 - Align the classification to specific handling requirements

5 - Define the audit and reporting requirements

22
Q

You need to consider two primary issues when classifying data:

A

1 - data ownership

2 - security controls

23
Q

As with data classification, the data owner must strike a balance between ____________ and _______________.

A

protection and usability

24
Q

The majority of states today have privacy laws that fall under two types of encryption requirements:

A

1 - Laws that require private data to be encrypted

2 - Laws that require notification of breaches when private data is not encrypted

25
The term _____________ refers to data that is in storage. This includes data on a server, laptop, CD, DVD, or universal serial bus (USB) thumb drive.
data at rest
26
For encryption to be effective, security policies must establish core requirements and standards, such as:
1 - Encryption keys must be separated from encrypted data 2 - Encryption keys must be retrieved through a secure process 3 - Administrator rights at the OS layer do not give access to the database
27
A lack of full compliance to implement encryption is due to the following three factors:
-Confusion over the laws -Cost to comply -Lack of a standardized approach among vendor products
28
During ____________, data must be classified. That could be simply placing the data within a common storage area.
creation
29
_____________ to data is governed by security policies. These policies provide special guidance on separation of duties (SOD). It’s important that procedures check SOD requirements before assigning this.
Access
30
_____________ of data includes protecting and labeling information properly after its access. The data must be properly labeled and safeguarded according to its classification.
Use
31
_______________ of data must be approved. This means that access to a device must be secured and properly controlled.
Storage devices
32
______________ of data must be approved. This ensures that what leaves the confines of the private network is protected and tracked. The organization has an obligation to know where its data is.
Physical transport
33
A _______________ can be any physical threat, such as a fire within the data center.
physical hazard
34
An _______________ can be an environmental event, such as a storm or an earthquake.
environmental hazard
35
A _____________ is a general category that covers other types of hazards that are not physical or environmental.
technical hazard
36
The following are some benefits of a risk management approach to security policies. Such an approach:
-Identifies possible costs and benefits of decisions -Considers actions that may not be apparent to the leaders and forces alternative thought -Provides analytic rigor to ensure an objective consideration of risk
37
The five steps in the Risk Management Continuous Improvement Model are:
1 - Prioritize the risk and align it with strategic objectives 2 - Identify an appropriate risk response 3 - Monitor effectiveness 4 - Identify residual and new risks whereby the cause of each is determined 5 - Assess the risk to measure the impact to the organization
38
A ___________________ is an effective tool in the risk management arsenal. It allows the organization to understand its risks and their potential effects on the business. It’s a formal exercise many organizations conduct annually.
risk and control self-assessment (RCSA)
39
A __________________ is the impact to the organization when an event occurs.
risk exposure
40
A generally accepted formula can be used to calculate risk exposure:
Risk exposure = [Likelihood the event will occur] x [Impact if the event occurs]
41
You can use different analytical methods to determine likelihood and impact. These methods fall into two types: ___________ and ______________.
quantitative and qualitative
42
A vulnerability scan of a network, a scan of the source code of an application, and a scan of an operating system's open ports are examples of:
Tools and techniques to perform vulnerability assessments
43
Security policies define when and how to perform a vulnerability assessment. The following are typical steps to be followed:
1 - Scope the assessment 2 - Identify dependencies 3 - Perform automated testing 4 - Analyze and generate reports 5 - Assign a rating
44
The use of _______________ is best practice because they can scan a large volume of vulnerabilities within seconds.
automated testing tools
45
Nmap, Nessus, and OWASP ZAP are examples of:
common vulnerability scan tools
46
The key to success in patch management is to have a consistent approach to applying patches. This approach includes:
1 - Vetting 2 - Prioritization 3 - Implementation 4 - Post-implementation assessment
47
_________________ is the act of giving confidence, the state of being certain, or the act of making certain. By contrast, ______________ is an evaluation to indicate needed corrective responses; the act of guiding a process in which variability is attributable to a constant system of chance causes.
Quality assurance quality control
48
When creating a data classification scheme, you must keep the following in mind:
1 - Keep the classification simple—no more than three to five data classes. 2 - Ensure that data classes are easily understood by employees. 3 - Data classification must highlight which data is most valuable to the organization. 4 - Classify data in the most effective manner that classifies the highest-risk data first.