Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Welcome to Cyber Aires. Video Siris on the copy of Security Plus 5 +01 Certification and Exam.
00:07
I'm your instructor around Werner,
00:09
Please cease. I bury Dad, I t for more information on this and many other certifications.
00:15
Section five dot aid of the risk management domain is about data security and privacy practices.
00:22
How are you protecting the data? Do you know what data you need to protect with its label on classifications?
00:28
Who's responsible for each level of data? We'll also talk about privacy practices. How do you keep personal information from being inadvertently disclosed?
00:38
Let's dive into the topics.
00:40
Ensuring the confidentiality, integrity and availability of data is that the fundamental core oven information security Risk Management program
00:50
organizations are tasked with many data security and privacy practices that need to be carried out as defined within data handling and data management policies.
01:00
Thes data policies, air based on organizational requirements
01:03
and regulatory compliance
01:06
data policies Air also used to govern Overall I T administrative tasks
01:11
in this session will cover those ideas, including data definitions, classifications, sensitivity,
01:19
data rolls, data retention. How long do you keep that information or data, which is often associated with a legal matter
01:26
and then data disposal destruction, media, sanitation. How do you get rid of it?
01:34
Information must be classified according to its value and level of sensitivity. That appropriate level of security can be used and access to data can be controlled.
01:46
You want to develop a system of classification
01:49
where you are labeling the data that particularly is most sensitive. That way, you have appropriate handling of your most sensitive data defined by the data owner. The process for data classification labeling and handling should be easy to apply,
02:05
consistent across all different types of data
02:08
and within your organization.
02:10
And lastly, it should be visible.
02:14
Let's look at some common data classifications. Labels
02:19
on the screen are common data classification labels. You may see an industry or in use within the U. S. Government.
02:27
First is public or unclassified data. This is information where, if it's disclosed, no harm is done.
02:34
Confidential data, though its data that might cause damage to the organization if it were exposed so some damage will occur. We're focused mostly, though, on the disclosure of data. So the confidentiality of data you might have that label of confidential
02:51
secret, maybe grave harm or damage is done to the organization. If it's a inadvertently disclosed,
02:59
you may also see terms like propriety proprietary,
03:04
which is usually kept within an organization or organizational unit. You don't want to disclose to other businesses. Label it, then is proprietary.
03:14
Private information
03:15
could be a label assigned to personally identifiable information
03:20
that information which is associated with a person's identity or their health information label. It is private. These were just common data sensitivity classifications you may see
03:31
in a previous session. We talked about
03:35
some common labels associated with data privacy, such as P II and pH. I personally identifiable information information associated with a person's identity first name, last name. Some identify are like a credit card number. So security number.
03:53
The other type to be aware of is pH. I Personal health information as defined within the health laws about a person's health status provision of health care, et cetera.
04:04
Be aware of these definitions for the security plus exam, and then also as you're working as a security professional,
04:12
all data within your organization should have assigned data rolls.
04:16
This starts with data ownership.
04:18
The owner is responsible for determining how much risk to accept.
04:23
They determined the data sensitivity and therefore that data labeling
04:29
the data custodian is the one who's responsible for administering it. They don't assign the levels,
04:34
make sure it's secure according to the directions provided by the data owner.
04:41
The third date, a role you need to be aware of is that privacy officer this is a person often associate it with. The legal department was responsible for ensuring the privacy of personal information within the organization may be dictated. Required roll by HIPPA or GDP are
05:00
sensitive, and privacy related data should be managed within an organization's retention and disposal policies.
05:08
You should have a policy that explains how long you keep different types of data. For example, some banking or financial information may need to be kept for seven years.
05:18
This all should be stated within the policy as set by the data owner
05:23
industry. Best practices in laws can also affect the retention of and storage of data lock fought files, an audit files.
05:30
For example, the United States Federal Rules of Civil Procedure or F R. C. P. Have implications for data retention policies.
05:42
Concept with data retention is keep the information on Lee as long as you need to,
05:46
and then no longer
05:48
get rid of it if it's no longer needed or required for legal reasons.
05:54
Lastly, with disposal of data, you want to properly get rid of that data and potentially any associated hardware.
06:00
Let's talk about some of those methods.
06:03
There are many different ways to get rid of data when it's no longer needed within an organization.
06:10
Trust Third party To do It, you'll see that this with shred bins. Many organizations will have this locked shred been,
06:16
and then the company brings their shredding truck to the premise. If you're doing this, you want to observe the destruction process.
06:24
You shouldn't just assume that it's actually occurring.
06:27
How is the media may be being transported to that destruction facility?
06:31
Can you use that media after it's destroyed? For example, Ah, hard drive.
06:40
The best practice is really to combine multiple methods for effective data destruction and media sanitation.
06:47
Some specific methods for getting rid of the data are shown on your screen.
06:54
One. Burning use of heat or fire. This may not be environmentally friendly. You think about a paper even if you burn it. You could still potentially read What's on it.
07:04
Shredding very common hope. You have your own personal cross cut shredder. You don't want to just read vertically. Be also shred horizontally to make sure the pieces cannot easily be put together.
07:17
Pulping is another method, which reduces paper toe a liquid slurry so therefore it can't be put back together.
07:26
Another method of removing data
07:30
and media sanitation is pulverizing. It's using hydraulic or pneumatic action to reduce the materials to loose fibers and shards.
07:39
This could be quite expensive, but it's a great way, particularly with hardware meeting. Sure, it cannot be reused.
07:46
De Gau sing another technique associated normally with magnetic media hard drives. USB drives. It's using a large magnet to remove data from that magnetic storage media
08:00
purging is removing files and all traces of the data also known a sanitation
08:05
and, lastly, data wiping, say, on a hard drive or other magnetic media that's overwriting the data with zeros and ones.
08:13
The data is therefore replaced and non recoverable.
08:18
Consider each of these data destruction methods and come up with your own examples for each to prepare for the company of Security plus exam. Let's practice with a question.
08:28
This method of data destruction is a cost effective method to reduce the size of objects with the tent of making them no longer usable.
08:37
The answer is a shredding.
08:39
This concluded Section five Diet aid on data security and privacy practices.
08:45
Please refer to your study material form or information.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor