Data Protection Flashcards

(62 cards)

1
Q

Data Sovereignty

A
  • Information is subject to the laws and governance structures within the nation where it is collected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Loss Prevention (DLP)

A
  • Strategy for ensuring sensitive or critical information does not leave an organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Classification

A
  • Category based on the organization’s value and the sensitivity of the information if it were to be disclosed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sensitive Data

A
  • Any information that can result in a loss of security or a loss of advantage to a company if accessed by an unauthorized person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Over classifying data leads to __________

A
  • Protecting all data at a high level
  • This means spending more time and resources to protect data that doesn’t need protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two different classification schemes used by organizations to protect data?

A
  • Commercial Business
  • Government
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the five data classification for a commercial business?

A
  1. Public
  2. Sensitive
  3. Private
  4. Confidential
  5. Critical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public Data Classification

A
  • Has no impact on the company if released and is often posted in an open-sourced environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sensitive Data

A
  • Has minimal impact if released

EXAMPLE: Organization’s financial data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Private Data

A
  • Contains data that should only be used inside the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidential Data

A
  • Contains items such as trade secrets, intellectual property data, and source code that affect the business if disclosed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Critical Data

A
  • Contains valuable information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the five data classification for a government?

A
  1. Unclassified
  2. Sensitive but classified
  3. Confidential
  4. Secret
  5. Top secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unclassified Data

A
  • Data that can be released to the public or under the Freedom of Information Act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sensitive but classified

A
  • Data that would not hurt national security if released but could impact those whose data is being used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidential Data

A
  • Data that could seriously affect the government if unauthorized disclosure happens
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Secret Data

A
  • Data that could seriously damage national security if disclosed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Top Secret Data

A
  • Data that would damage national security if disclosed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a typical lifestyle for data?

A
  • Collect -> Retain -> Dispose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data Ownership

A
  • Process of identifying the person responsible for the confidentiality, integrity, availability, and privacy of the information assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data Owner

A
  • Senior executive role that has the responsibility for maintaining the confidentiality, integrity, and availability of the information asset
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Controller

A
  • Entity that holds responsibility for deciding the purposes and methods of data storage, collection, and usage, and for guaranteeing the legality of the process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data Processor

A
  • Group or individual hired by the data controller to help with tasks like collecting, storing, or analyzing data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data Custodian

A
  • Responsible for handling the management of the system on which the data assets are stored
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Data Steward
- Focused on the quality of the data and the associated metadata
26
Data Privacy Officer
- Role that is responsible for the oversight of any kind of privacy-related data like, PII, SPI, or PHI
27
What are the three data states?
1. Data at rest 2. Data in transit 3. Data in use
28
Data at rest
- Refers to any data stored in databases, file systems, or other storage systems
29
Full Disk Encryption (FDE)
- Method used when data is at rest - Encrypts entire hard drive
30
Partition Encryption
- Method used when data is at rest - Encrypts specific partitions of a hard drive, leaving other partitions unencrypted
31
File Encryption
- Method used when data is at rest - Encrypting individual files
32
Volume Encryption
- Method used when data is at rest - Encrypts a set of selected files or directories
33
Database Encryption
- Method used when data is at rest - Encrypts data stored in a database
34
Record Encryption
- Method used when data is at rest - Encrypts specific fields within a database record
35
Data in transit/Data in motion
- Refers to data actively being moved from one to another, such as across the internet or over a private network
36
Secure Sockets Layer (SSL) Transport Layer Security (TLS)
- Method used when data is in-transit - Cryptogrphic protocols designed to provide secure communication over a computer network
37
Virtual Private Network (VPN)
- Method used when data is in-transit - Technology that creates a secure connection over a less secure network (internet)
38
Internet Protocol Security (IPSec)
- Method used when data is in-transit - Protocol suite used to secure IP communications by authenticating and encrypting each IP packet in a data stream
39
Data in use
- Refers to data in the process of being created, retrieved, updated, or deleted
40
Regulated Data
- Information controlled by laws, regulations, or industry standards - Includes PII, health records, and credit card information
41
Personal Identification Information (PII)
- Any information that can be used to identify an individual EXAMPLE: Names, social security numbers, and addresses
42
Personal Health Information (PHI)
- Any information about health status, provision of healthcare, or payment for healthcare that can be linked to a specific individual - This is protected by the Health Insurance Portability and Accountability Act (HIPAA)
43
Trade Secrets
- Type of confidential business information that provides a company with a competitive edge - These are protected by law
44
Intellectual Property (IP)
- Creations of the mind, such as inventions, literary and artistic works, designs, and symbols - Things like patents, laws, copyrights, and trademarks protect this
45
Legal Information
- Includes any data related to legal proceedings, contracts, or regulatory compliance
46
Financial Information
- Includes data related to an organization's financial transactions, such as sales records, invoices, tax documents, and bank statements
47
Human Readable Data
- Information that c an be understood by humans without the need for a machine or software EXAMPLE: Spreadsheets
48
Non-human Readable Data
- Information that requires a machine or software to interpret
49
Data sovereignty is the principle that information is subject to __________
- The laws of the nation where it is collected or processed
50
General Data Protection Regulation (GDPR)
- Governing body for data collection in European Union - Has stringent rules for data protection and grants individuals strong rights over their personal data
51
Geographic Restrictions (Geofencing of data)
- Involves setting up virtual boundaries to restrict data access based on geographic location EXAMPLE: Can deny access to login from other countries
52
Hashing
- Technique that converts data into a fixed size of numerical or alphanumeric characters, known as a hash value - Once data is hashed, it cannot be decrypted
53
Masking
- Involves replacing some or all of the data in a field wit ha placeholder, such as "x", to conceal the original content - Once masked, cannot be reversed EXAMPLE: Phone number area code is only shown, rest is masked
54
Tokenization
- Replaces sensitive data with non-sensitive substitutes, known as tokens - Original data stored in separate database
55
Obfuscation
- Involves making data unclear or unintelligible, making it difficult for unauthorized users to understand... Basically a catch all phrase for encryption and other ways to protect data
56
Segmentation
- Involves dividing a network into separate segments, each with its own security controls
57
Permission restrictions
- Involve defining who has access to specific data and what they can do with it
58
Data Loss Prevention (DLP)
- Set up to monitor the data of a system while it's in use, in transit, or at rest in order to detect any attempts to steal the data
59
Endpoint DLP System
- A piece of software that's installed on a workstation or a laptop, and it's going to monitor the data that's in use on that computer
60
Network DLP System
- Piece of software or hardware that's a solution placed at the perimeter of the network to detect data in transit
61
Storage DLP
- Software installed on a server in the data center that inspects the data while it's at rest on the server
62
Cloud-based DLP System
- Usually offered as a SAAS, and it's part of the cloud service and storage needs