CISSP & CISM - Summary of domain 2 'Asset Security'
14 views 0 purchase
Course
CISSP
Institution
CISSP
Book
Destination CISSP
CISSP & CISM - Summary of domain 2 'Asset Security' for the CISSP certification based on the book: 'Destination CISSP: A concise guide'.
Also useful for CISM, but not a direct translation
CISSP & CISM - Summary of domain 1: 'Security and Risk Management'
All for this textbook (2)
Written for
CISSP
All documents for this subject (308)
Seller
Follow
RSCHO
Reviews received
Content preview
ABSTRACT
Summary of the second domain of
CISSP official study guide based on the
book: ‘Destination CISSP: A concise
guide’.
Remco van der Schoot
CISSP DOMAINS
EXPLAINED
A summary of the information needed in order to achieve
certification in CISSP
, CISSP domains explained | Remco van der Schoot
INHOUDSOPGAVE
Introduction ............................................................................................................................................................ 3
Domain two: Asset Security ................................................................................................................................... 4
1. Identify and classify information and assets ....................................................................................................... 4
1.1. Asset classification ....................................................................................................................................... 4
1.2. Classification process ................................................................................................................................... 4
1.3. Classification versus categorization ............................................................................................................. 5
1.4. Labeling and marking ................................................................................................................................... 5
2. Establish information and asset handling requirements .................................................................................... 5
2.1. Media handling ............................................................................................................................................ 5
3. Provision resources securely ............................................................................................................................... 6
3.1. Data classification roles and responsibilities................................................................................................ 6
3.2. Data classification policy .............................................................................................................................. 6
4. Manage data life cycle ........................................................................................................................................ 7
4.1. Information life cycle ................................................................................................................................... 7
4.2. Data destruction........................................................................................................................................... 7
5. Ensure appropriate asset retention .................................................................................................................... 8
5.1. Data archiving .............................................................................................................................................. 8
6. Determine data security controls and compliance requirements ...................................................................... 9
6.1. Protecting data at rest ................................................................................................................................. 9
6.2. Protecting data in transit ............................................................................................................................. 9
6.3. Protecting data in use ................................................................................................................................ 10
6.4. Information obfuscation methods ............................................................................................................. 10
6.5. Digital Rights Management (DRM) ............................................................................................................. 11
6.6. Data loss prevention (DLP) ......................................................................................................................... 11
P a g i n a 2 | 11
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller RSCHO. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $6.51. You're not tied to anything after your purchase.