- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 493字
- 2021-07-14 11:04:30
Data retention
Information in the form of data must be stored in digital media or in hard printed copies. Based on the requirements of the law and based on corporate policies, data needs to be retained even after its useful life. Data is also retained in media as a backup and used in business continuity and disaster recovery scenarios.
Data in media
Data security also concerns the physical protection of equipment as well as addressing security requirements pertaining to the media where the data is stored.
Storage media, such as hard disks, backup tapes, CDs, and diskettes, need additional security measures so as to ensure the security of the data they contain. Controls should ensure the prevention of data disclosure and modification by unauthorized entities.
The following controls need to be considered for media security:
Storage controls are the primary means to protect the data in storage media, such as hard disks, magnetic tapes, CDs, and so on. The primary consideration should be controlling access to the data, which is usually achieved by encrypted keys. Additional security considerations are required when the backup media is stored offsite.
Maintenance is a regular process to ensure that the data in the storage media is not corrupted or damaged. Media handling procedures are used to ensure this.
The users and operators should be provided with the proper usage instructions to handle the media.
Media usage should be in accordance with the established policies and procedures.
Data destruction is done by way of formatting the media. One time formatting may not completely delete all the data. Formatting the media seven times for complete data destruction is recommended by some of the standards.
Data in hardware
Theft is one of the most common threats that need to be addressed for personal computers, laptops, or media protection.
The following controls need to be considered for protection from theft:
- Cable locks are used to physically secure PCs and laptop computers. These locks prevent the computer or laptop being detached and taken away.
- Port protection is to ensure that media devices, such as CD-ROM, floppy drive, Universal Serial Bus (USB) devices such as memory sticks, Wireless-Fidelity (Wi-Fi) ports, printers, and scanners are not accessible by unauthorized personnel. The purpose of port protection is to prevent the download or transfer of confidential information and/or intellectual property by unauthorized users to a portable medium.
- Switches are used to prevent a malicious user to power on/off the systems.
- BIOS checks use password protection during the boot up process so that access to the operating system is controlled.
- Encryption is used to make the folders and files secure so that unauthorized disclosure and modification is prevented.
Data with personnel
The information people possess in their memories also needs to be controlled and data protection measures are applicable. Operational procedures, such as not discussing confidential or personally identifiable information in public places or transmitting information through publicly accessible mediums, should be discouraged.
- Objective-C Memory Management Essentials
- 小程序實戰視頻課:微信小程序開發全案精講
- 教孩子學編程:C++入門圖解
- 零代碼實戰:企業級應用搭建與案例詳解
- HTML5+CSS3+jQuery Mobile APP與移動網站設計從入門到精通
- ASP.NET Web API Security Essentials
- PhoneGap 4 Mobile Application Development Cookbook
- Mastering PowerCLI
- 計算機應用基礎案例教程(第二版)
- JavaScript前端開發基礎教程
- 虛擬現實:引領未來的人機交互革命
- Learning Zimbra Server Essentials
- 機器人ROS開發實踐
- 計算機信息技術實踐教程
- C++ Game Development Cookbook