Data Protection Flashcards

(18 cards)

1
Q

What is the primary goal of Data Protection?

A

Safeguarding information from corruption, compromise, or loss

Data protection is essential for maintaining the integrity and confidentiality of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the types of data classifications.

A
  • Sensitive
  • Confidential
  • Public
  • Restricted
  • Private
  • Critical

Data classifications help determine the level of protection required for different types of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the data ownership roles?

A
  • Data Owners
  • Data Controllers
  • Data Processors
  • Data Custodians
  • Data Stewards

Each role has specific responsibilities in managing and protecting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three states of data?

A
  • Data at rest
  • Data in transit
  • Data in use

Understanding these states is crucial for implementing appropriate security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blank: Data at rest refers to data that is _______.

A

stored in databases, file systems, or storage systems, not actively moving

This data requires specific encryption methods for protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some protection methods for data at rest?

A
  • Full Disk Encryption (FDE)
  • Partition Encryption
  • File Encryption
  • Volume Encryption
  • Database Encryption
  • Record Encryption

These methods help secure data stored on various systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Data Loss Prevention (DLP) aim to do?

A

Monitor data in use, in transit, or at rest to detect and prevent data theft

DLP systems can be software or hardware solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false: Sensitive data can result in the loss of security or competitive advantage if accessed by unauthorized persons.

A

TRUE

Protecting sensitive data is crucial for maintaining a company’s integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the government classification levels?

A
  • Unclassified
  • Sensitive but Unclassified
  • Confidential
  • Secret
  • Top Secret

These classifications dictate how information is handled and shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Data Sovereignty?

A

Digital information subject to laws of the country where it’s located

This concept has gained importance with the rise of cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some methods for securing data?

A
  • Geographic Restrictions
  • Encryption
  • Hashing
  • Masking
  • Tokenization
  • Obfuscation
  • Segmentation
  • Permission Restriction

These methods help protect data from unauthorized access and breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of a Data Owner?

A

A senior executive responsible for labeling information assets and ensuring they are protected with appropriate controls

Data owners play a critical role in data governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of encryption?

A

Transform plaintext into ciphertext using algorithms and keys

Encryption protects data at rest and in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does masking do?

A

Replace some or all data with placeholders

This method retains metadata for analysis while ensuring data privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the function of a Privacy Officer?

A

Oversees privacy-related data, ensuring compliance with legal and regulatory frameworks

This role is crucial for protecting personally identifiable information (PII) and sensitive personal information (SPI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the types of DLP Systems?

A
  • Endpoint DLP System
  • Network DLP System
  • Storage DLP System
  • Cloud-Based DLP System

Each type focuses on different aspects of data protection.

17
Q

Fill in the blank: Data in transit refers to data that is actively _______.

A

moving from one location to another

This data is particularly vulnerable to interception.

18
Q

What are some transport encryption methods?

A
  • SSL (Secure Sockets Layer)
  • TLS (Transport Layer Security)
  • VPN (Virtual Private Network)
  • IPSec (Internet Protocol Security)

These methods secure data during transmission over networks.