Data Protection Flashcards

(37 cards)

1
Q

Involve setting up virtual boundaries to restrict data access based on the geographic location.

A

Geographic restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fundamental data security method that transforms readable data, plaintext, into unreadable data or ciphertext using an algorithm and an encryption key.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Technique that converts data into a fixed size of numerical or alphanumeric characters, known as the hash value.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Involves replacing some or all of the data in a field with a placeholder, such as X, to conceal the original content.

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Replaces sensitive data with non-sensitive substitutes, known as tokens. The original data is stored securely in a separate database with a token serving as a reference to the original data.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Involves making data unclear or unintelligible, making it difficult for unauthorized users to understand. This can involve various techniques, such as encryption, data masking, and the use of pseudonyms.

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Involves dividing a network into separate segments, each with its own security controls.

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Involve defining who has access to specific data and what they can do with it.

A

Permission restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refers to any data stored in databases, file systems, or other storage system.

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encrypts the entire hard drive

A

Full Dish Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encrypts specific partitions of a hard drive, leaving other partition unencrypted

A

Partition Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encrypts individual files

A

File Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encrypts a set of selected files or directories

A

Volume Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encrypts data stored in a database

A

Database Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encrypts specific fields within a database record

A

Record Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to data actively moving from one location to another, such as across the Internet or through a private network

A

Data in Transit/Data in Motion

17
Q

Cryptographic protocols designed to provide secure communication over a computer network

18
Q

Technology that creates a secure connection over a less secure network (Internet)

A

Virtual Private Network - VPN

19
Q

Protocol suite used to secure IP communications by authenticating and encrypting each IP packet in a data stream.

A

Internet Protocol Security (IPSec)

20
Q

Refers to data in the process of being created, retrieved,updated, or deleted.

21
Q

Information controlled by laws, regulations, or industry standards

A

Regulated Data

22
Q

Any information that can be used to identify an individual

A

Personal Identification Information (PII)

23
Q

Any information about health status, provision of healthcare, or payment for healthcare that can be linked to a specific individual

A

Protected Health Information (PHI)

24
Q

Type of confidential business information that provides a company with a competitive edge.

25
Creations of the mind, such as inventions, literary and artistic works, designs, and symbols ## Footnote Data drives decision making, fuels innovation, and provides insights into business operations.
Intellectual Property (IP)
26
Includes any data related to legal proceedings, contracts, or regulatory compliance. ## Footnote Regulated data is controlled by laws, regulations, or industry standards.
Legal Information
27
Includes data related to an organization's financial transactions, such as sales records, invoices, tax documents, and bank statements ## Footnote Financial information is often targeted by cyber criminals for fraud or identity theft.
Financial Information
28
Payment Card Industry Data Security Standard ## Footnote It regulates the protection of financial information.
What is the **PCI DSS**?
29
Information that can be understood directly by humans without the need for a machine or software ## Footnote Examples include text documents and spreadsheets.
Human-readable Data
30
Information that requires a machine or software to interpret ## Footnote This includes binary code or machine language.
Non-human Readable Data
31
Refers to the concept that digital information is subject to the laws of the country in which it is located ## Footnote Data sovereignty has emerged as a critical aspect of data governance in today's cloud-dominant world.
Data sovereignty
32
Has stringent rules for data protection and grants individuals strong rights over their personal data ## Footnote Once outside these regions, individuals are no longer protected by GDPR.
General Data Protection Regulation (GDPR)
33
Set up to monitor the data of a system while it's in use, in transit, or at rest. It does this in order to detect any attempts to steal the data.
Data loss prevention
34
A piece of software that is installed on a workstation or a laptop. It's going to monitor the data that's in use on the computer. If someone tries to do a file transfer, it'll either stop the file transfer or alert the admin of the occurrence based on certain rules and policies, very much like an IDS or IPS would, but focused on data.
Endpoint DLP system
35
A piece of software hardware that is a solution placed at the perimeter of your network. A sole function in life is to check all of the data going into and out of your network with a special focus on things going out of the network.
Network DLP system
36
A software that is installed on a server in the data centers and inspects the data while it's addressed on the server. This is usually because they've encrypted it or watermarked it, and we want to make sure that nobody is accessing the data at times that they shouldn't be.
Storage DLP
37
Usually offered as a software as a service solution, and that's a part of your cloud service and storage needs. They're going to protect your data when it's stored inside of those cloud services.
Cloud-based DLP system