Exceptional Grave Damage
Top Secret (Government)
Confidential (Non-Government)
Serious Damage
Secret (Government)
Private (Non-Government)
Damage
Confidential (Government)
Sensitive (Non-Government)
No Damage
Unclassified (Government)
Public (Non- Government)
Is memory that the system can read but can’t change (nonvolatile). The contents of it are burned in at the factory and can’t be altered. Common use is BIOS.
Read Only Memory (ROM)
The contents isn’t burned in at the factory., instead it has a special functionality that allows an end user to burn in the chip’s contents later. Once data is written, no further changes are possible.
Programmable Read Only Memory (PROM)
Can be erased with special ultraviolet light after which user can burn new information into it.
Ultraviolet Erasable Programmable Read Only Memory (UVEPROM)
Electric voltages are delivered to the pins of the chip to force erasure.
Electronically Erasable Programmable Read Only Memory (EEPROM)
Nonvolatile form of storage media where it can be erased and written in blocks or pages. Examples Memory cards, thumb drives
Flash Memory
Readable and writable memory that contains information a computer uses during processing. It retains it contents only when power is continuously supplied to it.
Random Access Memory (RAM)
A type of RAM that uses latches (flip-flop) to store bits. It is fast and expensive, but has low capacity. Example: CPU cache memory
Static Random Access Memory (SRAM)
A type of RAM that use small capacitors to store bits. Must be refreshed regularly. It is slower and cheaper with a higher capacity.
Dynamic Random Access Memory (DRAM)
prevents data from being discovered or accessed by a subject by positioning the data in a logical storage compartment that is not accessible or seen by the subject.
Data Hiding
Performing a delete operation against a file, files, or media. Simply
deleting a file doesn’t actually remove the data from the storage device. The space the file occupied is marked as “free” and can be overwritten by new data, but until that happens, the data might still be recoverable using forensic tools.
Erasing (deleting)
Preparing media for reuse and ensuring data cannot be recovered
using traditional recovery tools. Overwriting the storage media with a single pattern (e.g., zeros) can make it more difficult to recover data using simple techniques. However, sophisticated forensic methods might still be able to recover fragments of the original
data.
Clearing (overwritting)
This is a more intense form of clearing, often involving multiple overwrite
passes. While it offers better protection than a single overwrite, it’s not guaranteed to be completely secure against advanced forensic techniques.
Purging
creates a strong magnetic field that erases data on some media. Commonly used to remove data from magnetic tapes with the goal of returning the tape to its original state. No Affect option for CDs, DVDs, or SSDs
Degaussing
The most secure method of sanitizing media. Ensure that the media can’t be reused or repaired and the data can’t be extracted.
Destruction
software placed logically between the uses and the cloud based resources. It can be on premises or within the cloud. Anyone who accesses the cloud goes through it. It monitors all activity and enforces administrator-defined security policies.
Cloud Access Security Broker (CASB)
is a set of access control technologies used to restrict the use, modification, and distribution of copyrighted works such as software, multimedia content, and documents. It focuses on protecting intellectual property and controls access, copying, and distribution of digital
content. It is often used for media files, e-books, and software licensing.
Digital Rights Management (DRM)
refers to a set of tools and processes designed to detect and prevent breaches, exfiltration, or unwanted destruction of sensitive data. It monitors, detects, and blocks sensitive data in use, in motion, and at rest.
Data Loss Prevention (DLP)
Data Lifecycle
The individual or entity with ultimate authority and decision-making power
over the data. They determine how the data is used, protected, and disposed of. Accountable for data security, meaning they bear the ultimate responsibility for data security.
Data Owner
The organization or individual who determines the purposes and means
of data processing. They are responsible for ensuring compliance with relevant regulations and implementing appropriate security controls. The data owner often delegates responsibility to the Controller for ensuring security and compliance.
Data Controller