2 cissp ® Official Study Guide Eighth Edition


Handling Sensitive Information and Assets



Download 19,3 Mb.
Pdf ko'rish
bet172/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   168   169   170   171   172   173   174   175   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Handling Sensitive Information and Assets 
Handling refers to the secure transportation of media through its lifetime. Personnel handle 
data differently based on its value and classifi cation, and as you’d expect, highly classifi ed 
information needs much greater protection. Even though this is common sense, people still 


Identify and Classify Assets 
171
make mistakes. Many times, people get accustomed to handling sensitive information and 
become lackadaisical with protecting it.
For example, it was reported in 2011 that the United Kingdom’s Ministry of Defense 
mistakenly published classified information on nuclear submarines, in addition to other 
sensitive information, in response to Freedom of Information requests. They redacted the 
classified data by using image-editing software to black it out. However, anyone who tried 
to copy the data could copy all the text, including the blacked-out data.
Another common occurrence is the loss of control of backup tapes. Backup tapes should 
be protected with the same level of protection as the data that is backed up. In other words, 
if confidential information is on a backup tape, the backup tape should be protected as con-
fidential information. However, there are many cases where this just isn’t followed. As an 
example, TD Bank lost two backup tapes in 2012 with more than 260,000 customer data 
records. As with many data breaches, the details take a lot of time to come out. TD Bank 
reported the data breach to customers about six months after the tapes were lost. More 
than two years later, in October 2014, TD Bank eventually agreed to pay $850,000 and 
reform its practices.
More recently, improper permissions for data stored in Amazon Web Services (AWS) 
Simple Storage Service (S3) exposed dozens of terabytes of data. AWS S3 is a cloud-based 
service, and the U.S. government’s Outpost program openly collected the data from social 
media and other internet pages. Scraping the web for data and monitoring social media 
isn’t new. However, this data was stored in a openly accessible archive named CENTCOM. 
The archive wasn’t protected with either encryption or permissions.
Policies and procedures need to be in place to ensure that people understand how to 
handle sensitive data. This starts by ensuring that systems and media are labeled appropri-
ately. Additionally, as President Reagan famously said when discussing relations with the 
Soviet Union, “Trust, but verify.” Chapter 17, “Preventing and Responding to Incidents,” 
discusses the importance of logging, monitoring, and auditing. These controls verify that 
sensitive information is handled appropriately before a significant loss occurs. If a loss does 
occur, investigators use audit trails to help discover what went wrong. Any incidents that 
occur because personnel didn’t handle data appropriately should be quickly investigated 
and actions taken to prevent a reoccurrence.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   168   169   170   171   172   173   174   175   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish