3.3 Data Protection Methods and Security Techniques Flashcards

(22 cards)

1
Q

What are geographic restrictions in data protection?

A

Policy decisions based on where data is located and where the user accessing the data is located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does determining location differ between devices on an internal private network and wireless mobile devices?

A

Internal private network location determination is accurate; wireless mobile devices are difficult to locate due to their mobility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Geofencing and provide a practical example of its application.

A

Geofencing is making access decisions based on user location; an example is allowing access to corporate data only within corporate facilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between plaintext and ciphertext in data encryption?

A

Plaintext is readable data; ciphertext is the unreadable form after encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the concept of ‘confusion’ as it relates to data encryption.

A

‘Confusion’ refers to significant changes between plaintext and ciphertext, ensuring a good encryption method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hash and what are two common terms used to refer to it?

A

A hash is a one-way function representing data as text; common terms include ‘message digest’ and ‘fingerprint.’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the purpose of including a file hash next to a downloadable file.

A

To verify integrity by allowing users to compare the hash of the downloaded file with the published hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a collision in the context of hashing algorithms?

A

A collision occurs when two different inputs produce the same hash output, undermining hash integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is obfuscation used by developers to protect their code base?

A

Obfuscation makes code difficult to understand, protecting intellectual property while maintaining functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe tokenization and explain why the resulting token is safer to transmit across a network.

A

Tokenization replaces sensitive data with a non-sensitive token, which is safer as it cannot be used to derive the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the definition of IP Address/Subnet?

A

Network information used to help determine a user’s location, especially accurate on known internal private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is geolocation?

A

A method, often involving GPS or wireless databases, used to accurately describe a person’s or device’s location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does 802.11 Wireless refer to?

A

A standard used with wireless databases to help determine a mobile device’s location based on visible networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is encryption?

A

The process of converting plaintext into ciphertext for data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is decryption?

A

The method of reverting ciphertext back to its original plaintext form, requiring a decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is data masking?

A

A type of obfuscation where original data is hidden to protect sensitive details.

17
Q

What is data segmentation?

A

The practice of separating data into smaller pieces to improve security against breaches.

18
Q

What are permission restrictions?

A

Security controls defining the rights and limitations a user has to access specific data.

19
Q

What is SHA-256?

A

A specific hashing algorithm producing a 256-bit output.

20
Q

What is a digital signature?

A

Created using hashing and public key cryptography to authenticate the sender and ensure message integrity.

21
Q

Fill in the blank: A _______ is a one-way function that represents data as a fixed-length string of text.

22
Q

True or False: Geofencing allows access to data based solely on user identity, not location.