022 Thor-Teaches-study-guide-CISSP-domain-2 - (FreeCourseWeb - Com)
022 Thor-Teaches-study-guide-CISSP-domain-2 - (FreeCourseWeb - Com)
1|Page
https://thorteaches.com/
CISSP Domain 2 Lecture notes
• You need a valid reason for accessing the data. If you do not have one you can
be terminated/sued/jailed/fined.
• Leaked information about Octomom Natalie Suleman cost 15 Kaiser
employees’ fines or terminations because they had no valid reason for
accessing her file.
• We may never know who actually leaked the information. It may not be
one of the 15, but they violated HIPAA by accessing the data.
• Least privilege: Users have the minimum necessary access to perform their job duties.
2|Page
https://thorteaches.com/
CISSP Domain 2 Lecture notes
• Tapes were kept at the homes of employees instead of at a
proper storage facility or in a storage room with no access logs
and no access restrictions (often unencrypted).
3|Page
https://thorteaches.com/
CISSP Domain 2 Lecture notes
ultraviolet light (flash) on a small window on the chip (normally
covered by foil).
• EEPROM (Electrically erasable programmable read only
memory) – These are electrically erasable; you can use a
flashing program. This is still called read only.
• The ability to write to the BIOS makes it vulnerable to
attackers.
• PLD (Programmable logic devices) are programmable after they leave
the factory (EPROM, EEPROM and flash memory). Not PROM.
• Flash memory: Small portable drives (USB sticks are an example); they are a
type of EEPROM.
4|Page
https://thorteaches.com/
CISSP Domain 2 Lecture notes
• To ensure no data is readable we must use must ATA Secure Erase
or/and destruction of SSD drives.
Data Destruction:
When we no longer need a certain media, we must dispose of it in a manner that ensures the data can’t
be retrieved. This pertains to both electronic media and paper copies of data.
• Paper disposal – It is highly encouraged to dispose of ANY
paper with any data on it in a secure manner. This also has
standards and cross shredding is recommended. It is easy to
scan and have a program re-assemble documents from
normal shreds like this one.
• Digital disposal – The digital disposal procedures are
determined by the type of media.
• Deleting, formatting and overwriting (Soft
destruction):
• Deleting a file just removes it from the table; everything is still
recoverable.
• Formatting does the same but it also puts a new file structure over the
old one. Still recoverable in most cases.
• Overwriting is done by writing 0’s or random characters over the data.
• As far as we know there is no tool available that can recover
even single pass overwriting (not possible on damaged media).
Data Destruction:
• Degaussing destroys magnetic media by exposing it to a very strong
magnetic field. This will also most likely destroy the media integrity.
• Full physical destruction is safer than soft destruction:
• Disk crushers do exactly what their name implies: they
crush disks (often used on spinning disks).
• Shredders do the same thing as paper shredders do; they
just work on metal. These are rare to have at normal
organizations, but you can buy the service.
• Incineration, pulverizing, melting and acid are also (very
rarely) used to ensure full data destruction.
• It is common to do multiple types of data destruction on sensitive
data (both degaussing and disk crushing/shredding).
• While it may not be necessary, it is a lot cheaper than a potential
$1,000,000 fine or loss of proprietary technology or state secrets.
5|Page
https://thorteaches.com/
CISSP Domain 2 Lecture notes
• Scoping is determining which portion of a standard we will deploy in our organization.
• We take the portions of the standard that we want or that apply to our industry
and determine what is in scope and what is out of scope for us.
• Tailoring is customizing a standard to your organization.
• This could be we will apply this standard, but we use a stronger encryption (AES
256bit).
• Classification: A system, and the security measures to protect it, meet the security
requirements set by the data owner or by regulations/laws.
• Accreditation: The data owner accepts the certification and the residual risk. This is
required before the system can be put into production.
6|Page
https://thorteaches.com/
CISSP Domain 2 Lecture notes
• We looked at volatile and non-volatile memory, the different types of each and where
they are used.
• How we ensure there is no data remanence and destroying our media properly to not
expose the data on it.
• Finally, we covered data standards and frameworks and how we can scope or tailor
them to meet the needs of our organization.
7|Page
https://thorteaches.com/