2.1 Security Concepts in Enterprise Environments Flashcards
Why is it important to keep up with configuration management?
Change is the only constant
This is the configuration to which all devices on a network should be conforming to. Integrity measurements should be checked against this configuration.
Baseline config
Data that resides in a country is subject to the laws of that country.
Data Sovereignty
The act of hiding some of the original data in order to protect sensitive data like PII. Usually only protected from view, data is still intact in storage.
Data masking
The process of encoding information into unreadable data
Data encryption
Used to describe data that is on a storage device, often encrypted and given appropriate permissions.
Data at-rest
Description of data that it is being transmitted over a network. Less protection that data at rest
Data in transit
Describes data that is actively processing in a computer’s memory or CPU cache. Almost always decrypted at this state.
Data in use
This method is used to replace sensitive data with a benign placeholder. No encryption is involved.
Tokenization.
What does information rights management (IRM) designate?
How data is used
Restricts data access
System used for stopping data leakages before attackers can get to them
Data Loss Prevention (DLP)
What areas can a DLP system be installed to prevent data leakage?
Endpoint (PC)
Network
Servers
Cloud
What is one of the largest geographical considerations when storing data in other states or in other countries?
Legal implications
What are 3 major goals of an Incident Response Plan?
Identify the attack
Contain the attack
Limit impact of an attack
What is being inspected when you are performing an SSL Inspection?
If the trusted certificate between the browser and the web server has been signed