๐ Study Focus | Domain 2: Asset Security
๐ Domain 2: Asset Security
๐ Flashcard Topics (High-Yield, Harder-to-Retain Items Only)
๐ท️ Data Classification & Handling
-
Classification Levels (Government)
Top Secret > Secret > Confidential > Unclassified. -
Classification Levels (Commercial)
Confidential > Private > Sensitive > Public. -
Who Classifies Data?
The data owner defines classification based on sensitivity and impact. -
Data Lifecycle Phases
Create → Store → Use → Share → Archive → Destroy.
๐ Data Roles and Responsibilities
-
Data Owner vs Data Steward
Owner = sets classification; Steward = ensures data quality and accuracy. -
Custodian vs User
Custodian = implements controls; User = follows policy and uses data properly.
๐งจ Media and Data Sanitization
-
Clearing vs Purging vs Destroying
Clear = overwrite; Purge = degauss or crypto erase; Destroy = physically shred/incinerate. -
Declassification Process
Confirm no residual data remains; must follow policy and validation steps.
๐ Data Remanence
-
What is Data Remanence?
Residual data remaining after attempts to erase — must be handled properly.
๐ฅ Data Retention and Privacy
-
Data Retention Policies
Defined by legal, regulatory, and business requirements. -
PII Handling Requirements
Only collect necessary PII; apply need-to-know and protect in transit/storage. -
Data Residency vs Data Sovereignty
Residency = where data is stored; Sovereignty = laws governing that data.
๐พ Cloud and Virtualization Risks
-
Multitenancy Risk
Shared resources increase risk of unauthorized access between tenants. -
Data Aggregation & Inference
Aggregation = many low-level pieces → sensitive insight; Inference = deducing hidden info.
Comments
Post a Comment