Data Security Standards & Data Privacy Flashcards

Day7_Compliance Requirements & Vulnerability Scanning (25 cards)

1
Q

What terms describes the agreed upon metrics and quantifiable measures used to determine the effectiveness of security processes and overall security posture?

A
  • Service-Level Objectives (SLOs)
  • Key Performance Indicators (KPIs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some common inhibitors to vulnerability remediation that must be considered and communicated to stakeholders?

A
  • Legacy systems
  • Lack of resources or buy-in
  • Business process interruption
  • Change management constraints
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In cloud computing, who is responsible for the physical security of equipment in a data center?

A

The cloud provider or data center management

This responsibility varies depending on whether the entire data center is used or just a small section.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the first part of physical security?

A

Limiting physical access

This applies even to small home offices and personal devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud computing is a form of outsourcing that involves what key concept?

A

Risk transfer

You transfer some of the risk of the underlying infrastructure to the cloud service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

As cloud customers, do we have access to the cloud provider hardware?

A

No

The hardware is located in a data center and is managed by the cloud provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do cloud providers publish to assure customers of their compliance with security standards?

A

Security audit results

These results come from a variety of different third-party sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Personally Identifiable Information is also known as what abbreviation?

A

PII

PII consists of one or more pieces of information that can be used to uniquely identify an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the key aspects of data privacy related to PII?

A
  • Storage
  • Sharing
  • Collection
  • Usage or processing
  • Transmission of sensitive data

These activities are often outlined in privacy impact statements or consent documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give an example of personally identifiable information.

A
  • IP address
  • User location via GPS
  • Web browser cookie contents
  • Financial details (credit card numbers, bank account numbers)

The classification of these items as PII can depend on specific context and usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false: An IP address is always considered PII.

A

FALSE

An IP address can be considered PII depending on specific configuration settings and context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Sensitive Personal Information (SPI) refer to?

A
  • Gender identity
  • Sexual orientation
  • Political preferences
  • Religious preferences
  • Membership in trade unions

SPI is safeguarded due to its potential use in discrimination against individuals | SPI is sometimes abbreviated as SI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Data Loss Prevention (DLP) aim to prevent?

A

The disclosure of confidential information to unauthorized parties

DLP is also known as data leakage prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false: DLP only addresses intentional data breaches.

A

FALSE

DLP also addresses accidental disclosures, such as those caused by malware or compromised computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two types of breaches that DLP seeks to prevent?

A
  • Intentional breaches (e.g., insider jobs)
  • Accidental breaches (e.g., malware infections)

Both types can lead to the unauthorized disclosure of sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do DLP policies control?

A
  • Exposure of sensitive data within the organization
  • Exposure of sensitive data outside of the organization
17
Q

What is generally needed for DLP policies to be applied?

A

Some kind of a software agent; a client endpoint agent on client devices

The specific requirements may depend on the solution being used.

18
Q

True or false: An agent is not necessary to monitor sensitive documents in DLP policies.

A

FALSE

An agent is essential for real-time monitoring and protection of sensitive data.

19
Q

What types of actions can DLP policies help prevent?

A
  • Intellectual property from leaving the organization
  • Sensitive documents being attached to email messages
  • Sensitive documents being sent through social media

These actions are critical to maintaining data security.

20
Q

What is one example of removable media restrictions in a DLP policy?

A
  • Limited use of USB thumb drives
  • Blocking certain types of thumb drives
  • Preventing writing data to thumb drives

These restrictions help control data transfer and prevent data leaks.

21
Q

What can DLP policies prevent regarding sensitive data?

A
  • Printing of sensitive data
  • File attachments of sensitive data
  • Forwarding of certain types of data

These measures help ensure sensitive information is not improperly shared or exposed.

22
Q

True or false: DLP policies can allow sensitive file attachments if a user signs in with a smart card.

A

TRUE

This adds an additional layer of security for accessing sensitive data.

23
Q

What type of content can DLP policies limit if social media access is allowed?

A

DLP policies can limit social media content

This helps manage the risk of data exposure through social media platforms.

24
Q

Which data security standard applies to cardholder data?

25
Which data privacy regulation is directly related to the medical industry?
HIPAA