Term
|
Definition
Any information that is not public or unclassified |
|
|
Term
How does NIST SP 800-122 define PII? |
|
Definition
- Personally identifiable information (PII) is:
- Any information about an individual maintained by an agency, including:
1. any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date, and place of birth, mother's maiden name, or biometric records; and
2. any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information. |
|
|
Term
|
Definition
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) |
|
|
Term
|
Definition
Any data that helps an organization maintain a competitive edge |
|
|
Term
|
Definition
identifies the value of the data to the organization and is critical to protect data confidentiality and integrity.
- IDs classification labels used within the organization
- IDs how data owners can determine the proper classification
- IDs how personnel should protect data based on its classification
|
|
|
Term
|
Definition
Top Secret (Exceptional Grave Damage) Confidential/Proprietary
Secret (Serious Damage) Private
Confidential (Damage) Sensitive
Unclassified (No Damage) Public
|
|
|
Term
|
Definition
Any information that isn't public or unclassified |
|
|
Term
|
Definition
Identity and Access Management |
|
|
Term
|
Definition
- Data at Rest - stored on media, USB drives, SAN, etc.
- Data in transit (data in motion)- any data transmitted over a network
- Data in use - in memory or temporary storage buffers while an application is using it |
|
|
Term
|
Definition
Identity Theft Resource Center |
|
|
Term
|
Definition
Guidelines for Media Sanitization |
|
|
Term
|
Definition
Data that remained on media after the data was supposedly erased. |
|
|
Term
|
Definition
- performing a delete operation against a file, a selection of files, or the entire media.
- In most cases, the deletion or removal process removes only the directory or catalog link to the data. |
|
|
Term
|
Definition
- The removal of sensitive data from storage devices so that there is assurance that the data may not be reconstructed from normal system functions or software file/data recovery utilities |
|
|
Term
|
Definition
- a more intense form of clearing
- The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique |
|
|
Term
|
Definition
- a strong magnetic field erases data on some media
- Common goal of returning the tape to its original state
- Degaussing a HD may damage the elctronics |
|
|
Term
|
Definition
- Final stage of the lifecycle of media and more secure method of sanitizing media
- incineration, crushing, shredding, disintegration, and dissolving using caustic or acidic chemicals |
|
|
Term
|
Definition
- any process that purgest media or a system in preparation for reused in an unclassified environment
|
|
|
Term
|
Definition
- Uses the same key to encrypt and decrypt the data
- AES uses key sizes of 128 bits or 192 bits
- AES 256 uses a key size of 256 bits |
|
|
Term
Common symmetric encryption algorithms |
|
Definition
- Advanced Encryption Standard (AES)
- Triple DES
- Blowfish |
|
|
Term
|
Definition
- Advanced Encryption Standard (AES)
- AES supports key sizes of 128, 192, and 256 bits
- MS uses in BitLocker
- US Govt uses for classified data up to Top Secret
|
|
|
Term
|
Definition
- Triple Data Encryption Standard (3DES)
- 1st implementation used 56-bit keys
- Newer 3DES use 112 or 168-bit keys
- used in some implementations of MasterCard, Visa (EMV), and Europay standard |
|
|
Term
|
Definition
- Developed by Bruce Schneier as DES alternative
- can use 32-448 bit key size
- Linux systems use bcrypt to encrypt passwords and bcrypt is based on blowfish
-- bcrypt adds 128 additional bits as salt to protect against rainbow table attacks |
|
|
Term
|
Definition
- Transport Layer Security
- Almost all HTTPS transmissions use TLS 1.1 as underlying encryption protocol
- Replaced Secure Socket Layer (SSL) in 1995 |
|
|
Term
|
Definition
- Virtual Private Network
- Allow employees to access an organization's internal network from their home or while traveling
- VPN traffic goes over a public network
- IPSEC is often combined with Layer 2 Tunneling Protocol (L2TP)
- L2TP/IPsec encrypts data and sends it over the internet using Tunnel mode to protect it while in transit |
|
|
Term
|
Definition
- Layer 2 Tunneling Protocol
|
|
|
Term
|
Definition
- Secure Shell
- A strong encryption protocol included with other protocols such as Secure Copy (SCP) and Secure File Transfer Protocol (SFTP)
- Many administrators use SSH when administering remote servers |
|
|
Term
|
Definition
|
|
Term
|
Definition
- Secure File Transfer Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
- Person who has ultimate organizational responsibility for data, typically the CEO, president, or a department head (DH)
- Identify the classification of data and ensure it's labeled properly
- Ensure adequate security controls, based on the classification and the org's security policy requirements
- Owner's may be liable for negligence if they fail to perform due diligence in establishing and enforcing security policies to protect data |
|
|
Term
|
Definition
- Guide for Developing Security Plans for Information Technology Systems
|
|
|
Term
Asset Owner (system owner) |
|
Definition
- the person who owns the asset or system that processes sensitive data
- Typically the data owner
- System owner is responsible for ensuring that data processed on the system remains secure, labeled correctly, and appropriate security controls are in place |
|
|
Term
|
Definition
- NIST SP 800-18 refers to a business/mission owner as a program manager or a information system owner
- may overlap with responsibilities of system owner or be the same role
- Responsible for ensuring that systems provide value to the organization
|
|
|
Term
|
Definition
- a natural or legal person, public authority, agency, or other body, which processes personal data solely on behalf of the data controller" (data controller is the person or entity that controls the processing of the data) |
|
|
Term
|
Definition
|
|
Term
Privacy Shield Principles |
|
Definition
- Notice - must inform individuals of purpose to collect data
- Choice - opportunity to opt out
- Accountability for Onward Transfer - Orgs can only transfer data to other orgs that comply with Notice & choice
- Security - must protect personal data
- Data integrity and purpose limitation - Orgs only collect data needed for purposes in notice principle. Accurate, complete, currend
- Access - individuals must have access, ability to amend/correct/delete info when inaccurate
- Recourse, Enforcement, and Liability - Mechanism to handle compplains
|
|
|
Term
|
Definition
- the process of using pseudonyms to represent other data. (e.g. instead of referring to a patient by name, you could refer to them at Patient 23456)
- the key is to have another resource (such as another database) that allows you to ID the original data using the pseudonym |
|
|
Term
|
Definition
- the process of removing all relevant data so that it is impossible to identify the original subject or person |
|
|
Term
|
Definition
- swapping data in individual data columns so that records no longer represent the actual data. However, the data still maintains aggregate values that can be used for other purposes, such as scientific purposes
- can not be reversed |
|
|
Term
|
Definition
- Similar to pseudonymization but uses tokens to represent other data instead of pseudonyms. Neither token or pseudonym has any meaning or value outside of the process |
|
|
Term
|
Definition
- Responsible for grinding appropriate access to personnel, but not necessarily full administrator rights and privileges.
Typically assign permissions using a Role-Based Access Control (RBAC) model |
|
|
Term
|
Definition
Role-Based Access Control (RBAC) |
|
|
Term
|
Definition
- helps protect the integrity and security of data by ensuring that it is properly stored and protected. Ensure that the data is backed up. Maintain auditing logs
- In practice, personnel within IT Dept or system security admin would typically be the custodians. |
|
|
Term
|
Definition
- Security Control Baselines
- Appendix D includes a comprehensive list of controls and has prioritized them as low-impact, moderate-impact, and high-impact. |
|
|
Term
|
Definition
|
|
Term
|
Definition
- reviewing a list of baseline security controls and selecting only those controls that apply to the IT systems you're trying to protect
- The process of determining which portions of a standard will be employed by an organization
- Scoping is SUBTRACTING and removing security controls that are not applicable, such as removing physical building controls when there is no building because everyone is working from home
- Limiting general baseline recommendations by removing those that do not apply |
|
|
Term
|
Definition
- modifying the list of security controls within a baseline so that they align with the mission of the organization
-The process of customizing a standard for an organization. It begins with controls selection, continues with scoping, and finishes with the application of compensating controls
- Altering baselines recommendations to apply more specifically
|
|
|
Term
|
Definition
Purging media removes all data by writing over existing data multiple times to ensure that the data is not recoverable using any known methods. Purged media can then be reused in less secure environments |
|
|
Term
|
Definition
Guide for Mapping Types of Information and Information Systems to Security Categories |
|
|
Term
|
Definition
- The process of determining the impact of the loss of confidentiality, integrity, or availability of the information/asset to an organization |
|
|
Term
|
Definition
- The purpose of a classification system is to ensure information/assets are marked in such a way that only those with an appropriate level of clearance can have access to them.
- Data classification is the process by which data is evaluated for its risk and sensitivity and then assigned a label that determines the level of security that will be used to protect that data. |
|
|
Term
|
Definition
1. Define Requirements
2. Acquire & implement
3. Operations & maintenance
4. Disposal & Decommission |
|
|
Term
|
Definition
Configuration Management Database (CMDB) |
|
|
Term
|
Definition
- Quality Control (QC)
- an assessment of quality based on INTERNAL standards, processes, and procedures established to control and monitor quality |
|
|
Term
|
Definition
- Quality Assurance (QA)
- an assessment of quality based on standards EXTERNAL to the process and involves reviewing of the activities and quality control processes to ensure final products meet predetermined standards of quality |
|
|
Term
|
Definition
- Determining the impact of the loss of confidentiality, integrity, or availability of the information/asset to an organizaiton |
|
|
Term
|
Definition
- At rest (storage)
- In motion (transit, on the wire)
- In use (application) |
|
|
Term
|
Definition
- Establishes a minimum set of safeguards that can be standardized, documented, implemented, monitored, and maintained |
|
|
Term
|
Definition
- Multi-purpose framework of specifications that supports automated configuration, vulnerability and patch checking, technical control compliance activities, and security measurement |
|
|
Term
Data Protection Methods (in storage) |
|
Definition
- Encryption
- Obfuscation/tokenization
- Archive/dispose/destruct
- Mobile Device Protection
- Physical Media Control |
|
|
Term
Data Protection Methods (in motion) |
|
Definition
- Encryption
- Perimeter Security
- Web Content Filtering
- Network Traffic Monitoring
- VPNs |
|
|
Term
Data Protection Methods (in-use) |
|
Definition
- Encryption
- User Monitoring
- Workstation Restrictions
- Application Controls (whitelist/blacklist)
- Data Labeling |
|
|
Term
|
Definition
- create and manage sensitive data within an organization (e.g. HR employees) |
|
|
Term
|
Definition
- Manage data on behalf of data controllers (e.g. outsources payroll company) |
|
|
Term
NIST Cyber Security Framework |
|
Definition
- Identify
- Protect
- Detect
- Respond
- Recover
|
|
|
Term
|
Definition
- Access Control List
- Bound to an OBJECT (e.g. file, folder) |
|
|
Term
|
Definition
- Data Loss Prevention (DLP)
-- Unauthorized
-- External
-- Sesitive |
|
|