2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet165/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   161   162   163   164   165   166   167   168   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

163
Unclassified 
Unclassifi ed
refers to any data that doesn’t meet one of the descriptions for 
top secret, secret, or confi dential data. Within the United States, unclassifi ed data is available 
to anyone, though it often requires individuals to request the information using procedures 
identifi ed in the Freedom of Information Act (FOIA). 
There are additional subclassifi cations of unclassifi ed such as for offi cial use only (FOUO) 
and sensitive but unclassifi ed (SBU). Documents with these designations have strict controls 
limiting their distribution. As an example, the U.S. Internal Revenue Service (IRS) uses SBU 
for individual tax records, limiting access to these records. 
A classifi cation authority is the entity that applies the original classifi cation to the sensitive 
data, and strict rules identify who can do so. For example, the U.S. president, vice president, 
and agency heads can classify data in the United States. Additionally, individuals in any of 
these positions can delegate permission for others to classify data. 
Although the focus of classifications is often on data, these classifications 
also apply to hardware assets. This includes any computing system or 
media that processes or holds this data.
Nongovernment organizations rarely need to classify their data based on potential dam-
age to the national security. However, management is concerned about potential damage 
to the organization. For example, if attackers accessed the organization’s data, what is the 
potential adverse impact? In other words, an organization doesn’t just consider the sen-
sitivity of the data but also the criticality of the data. They could use the same phrases of 
“exceptionally grave damage,” “serious damage,” and “damage” that the U.S. government 
uses when describing top secret, secret, and confi dential data. 
Some nongovernment organizations use labels such as Class 3, Class 2, Class 1, and 
Class 0. Other organizations use more meaningful labels such as confi dential (or proprie-
tary), private, sensitive, and public. Figure 5.1 shows the relationship between these differ-
ent classifi cations with the government classifi cations on the left and the nongovernment 
(or civilian) classifi cations on the right. Just as the government can defi ne the data 
based on the potential adverse impact from a data breach, organizations can use similar 
descriptions. 
Both government and civilian classifi cations identify the relative value of the data to the 
organization, with top secret representing the highest classifi cation for governments and 
confi dential representing the highest classifi cation for organizations in Figure 5.1 . However, 
it’s important to remember that organizations can use any labels they desire. When the 
labels in Figure 5.1 are used, sensitive information is any information that isn’t unclassifi ed 
(when using the government labels) or isn’t public (when using the civilian classifi cations). 
The following sections identify the meaning of some common nongovernment classifi ca-
tions. Remember, even though these are commonly used, there is no standard that all pri-
vate organizations must use. 


164
Chapter 5 

Protecting Security of Assets
F I g u r e 5 .1
Data classifications
Government Classifications and
Potential Adverse Impact
from a Data Breach
Nongovernment Classifications and
Potential Adverse Impact
from a Data Breach
Top Secret
Exceptionally Grave Damage
Confidential/Proprietary
Exceptionally Grave Damage
Secret
Serious Damage
Private
Serious Damage
Class 3
Class 2
Class 1
Class 0
Confidential
Damage
Sensitive
Damage
Unclassified
No damage
Public
No damage

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   161   162   163   164   165   166   167   168   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish