2-9 Flashcards

1
Q

What are asset management controls used for?

A

Protect information and systems from unauthorized access, modification, and disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some access control solutions?

A

Cryptography, DLP, CASB, and DRM are used to enforce access control policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some use cases for cryptography?

A

Encryption is for confidentiality, Hashing is for integrity, Digital Signatures is for integrity and non-repudiation, and digital certificates are used for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are CASBs and how do they function?

A

Cloud Access Security Brokers, they proxy ttaffic and use auto discovery to identify cloud based apps. Security Policies are then interjected. It can control “shadow” IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is DRM and what does it do?

A

DRM prevents unauthorized copying, distribution, and use of digital content. It prevents editing, sharing, saving, forwarding, printing, and screenshotting. It can limit the number of usages, limit to device/ip/location, and watermark.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are PETs and what do they do?

A

Pets are Privacy Enhancement Technologies and they help ensure the continuity of privacy and data protection even after data is collected and transferred. It includes data obfuscation, encryption processing tools, analyics, and data accountabilty tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is synthetic data?

A

Artificial data with similar statistical properties as the real data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is tokenization?

A

Substituting sensitive data with non-sensitive in production environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is psuedo-anonymization?

A

Method to substitute identifiable data with reversible consistent value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly