What are geographic restrictions in data protection?
Policy decisions based on where data is located and where the user accessing the data is located.
How does determining location differ between devices on an internal private network and wireless mobile devices?
Internal private network location determination is accurate; wireless mobile devices are difficult to locate due to their mobility.
Define Geofencing and provide a practical example of its application.
Geofencing is making access decisions based on user location; an example is allowing access to corporate data only within corporate facilities.
What is the difference between plaintext and ciphertext in data encryption?
Plaintext is readable data; ciphertext is the unreadable form after encryption.
Describe the concept of ‘confusion’ as it relates to data encryption.
‘Confusion’ refers to significant changes between plaintext and ciphertext, ensuring a good encryption method.
What is a hash and what are two common terms used to refer to it?
A hash is a one-way function representing data as text; common terms include ‘message digest’ and ‘fingerprint.’
Explain the purpose of including a file hash next to a downloadable file.
To verify integrity by allowing users to compare the hash of the downloaded file with the published hash.
What is a collision in the context of hashing algorithms?
A collision occurs when two different inputs produce the same hash output, undermining hash integrity.
How is obfuscation used by developers to protect their code base?
Obfuscation makes code difficult to understand, protecting intellectual property while maintaining functionality.
Describe tokenization and explain why the resulting token is safer to transmit across a network.
Tokenization replaces sensitive data with a non-sensitive token, which is safer as it cannot be used to derive the original data.
What is the definition of IP Address/Subnet?
Network information used to help determine a user’s location, especially accurate on known internal private networks.
What is geolocation?
A method, often involving GPS or wireless databases, used to accurately describe a person’s or device’s location.
What does 802.11 Wireless refer to?
A standard used with wireless databases to help determine a mobile device’s location based on visible networks.
What is encryption?
The process of converting plaintext into ciphertext for data protection.
What is decryption?
The method of reverting ciphertext back to its original plaintext form, requiring a decryption key.
What is data masking?
A type of obfuscation where original data is hidden to protect sensitive details.
What is data segmentation?
The practice of separating data into smaller pieces to improve security against breaches.
What are permission restrictions?
Security controls defining the rights and limitations a user has to access specific data.
What is SHA-256?
A specific hashing algorithm producing a 256-bit output.
What is a digital signature?
Created using hashing and public key cryptography to authenticate the sender and ensure message integrity.
Fill in the blank: A _______ is a one-way function that represents data as a fixed-length string of text.
hash
True or False: Geofencing allows access to data based solely on user identity, not location.
False