D2: COMMS & NETWORK SECURITY Flashcards

(49 cards)

1
Q

Data security architecture

A

Overall design of controls that protect information assets across their lifecycle including classification encryption access control and monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information lifecycle

A

Stages through which data passes such as creation storage use sharing archival and destruction each with distinct security needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data at rest

A

Data stored on persistent media such as disks backups or archives which must be protected with access controls and often encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data in transit

A

Data moving over networks between systems or locations which must be protected with secure protocols integrity checks and endpoint authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data in use

A

Data actively processed in memory or by applications which may require controls such as secure coding memory protection and confidential computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Structured vs unstructured data

A

Structured data resides in defined formats like relational tables while unstructured data includes documents email media and other free form content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data classification scheme

A

Defined set of labels and criteria such as public internal confidential that drives required safeguards and handling rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data owner responsibilities

A

Define classification retention and protection needs for data approve access requests and ensure controls align with business and regulatory requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data custodian responsibilities

A

Implement and operate technical and physical safeguards for data such as backup access control and storage protection according to owner requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data inventory and catalog

A

Comprehensive record of data assets locations owners classifications and interfaces used to support governance risk assessment and discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data discovery

A

Process of locating and identifying sensitive information across systems and repositories often using automated scanning for patterns or tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data minimization

A

Principle of collecting and retaining only the minimum amount of data needed for defined purposes to reduce risk and compliance burden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data retention policy

A

Rules specifying how long different types of data must be kept and in what form based on legal business and operational requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Legal hold and retention override

A

Temporary suspension of normal disposition for specific data due to litigation or investigation which must be supported by storage and backup design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data destruction and sanitization

A

Methods to ensure data is irrecoverable when no longer needed such as overwrite degauss crypto erase or physical destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Crypto shredding

A

Technique where destroying encryption keys renders encrypted data permanently unreadable without deleting all stored copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption at rest

A

Use of cryptography to protect stored data on disks or in databases so that compromise of media does not expose plaintext information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encryption in transit

A

Use of cryptographic protocols to protect data flow between endpoints against eavesdropping and tampering such as TLS based connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Field level encryption

A

Encryption applied selectively to specific fields or columns within a dataset to protect highly sensitive elements while leaving other data in clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Tokenization

A

Replacement of sensitive data values with non sensitive tokens where the mapping is stored in a secured token vault

21
Q

Format preserving encryption

A

Encryption method that maintains the format of the original data such as length and character set to ease integration with legacy systems

22
Q

Pseudonymization

A

Processing that replaces direct identifiers with pseudonyms while keeping a mapping so data can still be linked under controlled conditions

23
Q

Anonymization

A

Processing that irreversibly removes or modifies identifiers and linkages so individuals cannot reasonably be re identified from the data set

24
Q

Differential privacy

A

Mathematical approach that adds carefully calibrated noise to query results so that outputs do not reveal whether any individual record is present

25
Key management architecture
Design of processes and systems that generate store distribute rotate and retire cryptographic keys securely
26
Key hierarchy
Structured relationship in which higher level keys such as key encryption keys protect lower level data encryption keys
27
Key lifecycle
Stages through which a key passes including generation distribution activation use rotation backup revocation and destruction
28
Hardware security module
Tamper resistant device that securely generates stores and uses cryptographic keys often providing strong logical and physical protections
29
Cloud key management service
Managed service that provides key storage generation and access control often integrated with cloud storage and compute services
30
Database security controls
Set of mechanisms such as access control encryption activity monitoring and configuration hardening that protect structured data stores
31
Database activity monitoring
Real time or near real time observation of database traffic and queries to detect misuse anomalies or policy violations
32
Data integrity controls
Mechanisms such as checksums digital signatures and database constraints that ensure data is complete accurate and unaltered
33
Data loss prevention
Technologies and policies that detect and prevent unauthorized transfer or disclosure of sensitive information across endpoints networks and storage
34
Endpoint DLP
Controls on user devices that monitor actions such as copy print or save to removable media for sensitive data and can block or alert
35
Network DLP
Controls at gateways that inspect traffic for sensitive content patterns and apply policies such as block quarantine or encrypt
36
Storage security
Combination of access control zoning encryption and monitoring applied to storage systems including block file and object services
37
Object storage security
Protection of bucket and object level access using authentication authorization encryption and bucket policies especially in cloud environments
38
File share security
Use of permissions share configuration and auditing to restrict and monitor access to shared file resources
39
Multitenant data isolation
Data architecture ensuring that one tenants data cannot be accessed or inferred by another tenant whether using logical or physical separation
40
Application level data control
Controls implemented in the application tier such as fine grained authorization validation and logging to protect data beyond storage controls
41
Data warehouse and analytics security
Design of controls for large analytical environments including access segregation row or column security and aggregation rules
42
Big data security considerations
Challenges such as distributed storage high volume and variety that require scalable access control encryption and monitoring
43
Backup data protection
Safeguards for backup media including encryption offsite storage handling procedures and access restrictions
44
Snapshot and replication security
Ensuring that storage snapshots and replicas inherit encryption access control and geographic constraints of primary data
45
Information rights management
Technology that enforces usage policies on documents such as view print copy or forward based on embedded rights
46
Data lineage
Recorded path of how data moves transforms and is used across systems to support impact analysis accountability and compliance
47
Data quality and security
Recognition that high quality consistent data supports security analytics while poor quality can mask anomalies or cause incorrect access decisions
48
Cloud data residency
Requirement that certain data be stored and processed only within specific geographic or legal jurisdictions affecting region and service selection
49
SaaS data protection pattern
Combination of configuration controls encryption options export capabilities and monitoring used to protect data held in software as a service platforms