Lesson 1: Protecting Sensitive Data
Lesson 1: Protecting Sensitive Data
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 8: Protecting Sensitive Data
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 8: Protecting Sensitive Data
Degaussing is the use of a strong magnetic field to scramble data contained in storage
Purging involves making multiple attempts or “passes” to remove data from system storage
Physically destroying a storage device will ensure the data is absolutely unrecoverable
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 8: Protecting Sensitive Data
The purple machine stepping switch uses electrical input signals, which results in several different outputs
Secret Key Cryptography (symmetric) uses the same (secret) key for encrypting and decrypting messages
Public Key Cryptography (asymmetric) uses a public key and private key for encryption and decryption
A Public Key is made available and to the public to encrypt and decrypt a message
A Private Key is kept private and is only used by the key owner to encrypt and decrypt a message
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 8: Protecting Sensitive Data
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 8: Protecting Sensitive Data
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 8: Protecting Sensitive Data
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 8: Protecting Sensitive Data
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 8: Protecting Sensitive Data
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 8: Protecting Sensitive Data
o Maintain an up-to-date Compromise Key List (CKL) and/or Certificate Revocation list (CRL)
o Cryptographic keys that are used more frequently should be revoked first, and have shorter lifespans
Auditing Cryptographic Keys:
o A Keying Material Manager (KMM) or Communication Security (COMSEC) custodian should be appointed
o Meticulous records must be kept that pertain to highly sensitive cryptographic keys
o Cryptographic keys must be continuously monitored to ensure they are properly managed throughout the
lifecycle
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.