1.4 Value of Data and Information Flashcards
What is not an example of security controls?
Audits and inventories.
What do you call an action through which someone uses, makes, sells, or imports your invention without your permission?
Patent infringement.
What is a data exfiltration?
A security breach that occurs when an individual’s or organization’s data is illegally copied with or without their knowledge.
When does data become information?
When it is applied to some purpose and adds timely value for the recipient.
What is a disadvantage of a semi-structured data warehouse for storing information?
The traditional relational data model has a popular and ready-made query language, SQL.
What is data correlation?
The process of analyzing the whole data set and finding connections and links between data points.
What is the first step needed to begin a data-driven business decision?
Set-up of data capture and collection system.
What invention was created to try to enforce copyright protection on digital products?
Digital Rights Management (DRM) systems.
In Information Technology (IT) terminology, what is ROSI and how do you calculate it?
Return on Security Investment; to calculate ROSI, you perform risk assessments to work out how much the loss of data would cost your organization and how likely it is that data loss might occur when an attacker removes data from your network without authorization.
What is a data breach?
When your network exposes private data publicly, whether or not the data is actively stolen.
How is intellectual property protected?
Intellectual property can be protected through trademarks, copyrights, and patents.
What is an example of a digital product?
A video download.
What is not a positive trait of a digital product in regard to the value assigned to information and data?
Digital sales through peer-to-peer transactions make it easier to sell information without the oversight of an institutional set of rules.
What is copyright used for?
It is a legal protection granted to certain types of work that gives its holder the right to control the use of the work, including rights of publication, distribution, or sale.
What is true about the protection of data?
Data can be considered an asset and as such it has commercial value.