2.6 Determine Data Security Controls and Compliance Requirements Flashcards

1
Q

What are used to protect data at every level of classification?

A

Controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What three states can data be in?

Not in continental US

A

At REST | In TRANSIT | In USE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Data At Rest and how can it be protected?

A

Inactive data stored on media, such as hard disks, spreadsheets, databases, etc. | Encryption, Access Control, and Backups/Restorations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Data In Transit and how can it be protected?

A

Data flowing across a network | Access Controls and Network Encryption (End-to-end, Link, Onion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data In Use and how can it be protected?

A

Data being used in computational activities | Homomorphic Encryption, Role-Based Access Controls (RBAC), Digital Rights Protections (DRP), Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the best way to ensure Data At Rest in the cloud is protected?

A

First, encrypt the data locally before migrating it to the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data in Transit is also known as what?

A

Data in Motion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is End-to-End Encryption?

A

It means that the data portion of a packet is encrytped once it leaves the source node and remains that way until decryption by the destination node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a risk of end-to-end encryption? Give an example.

A

While the data contents is encrypted, the routing information is not which can reveal information about the packet contents. This prevents absolute anonymity. | VPNs are end-to-end encrypted, but your source and destination can be received out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Link Encryption?

A

Differing from End-To-End encryption, the packet data and header are encrypted. However, the data is decrypted then re-encrypted at each node. This allows the packet to reach its destination while in transit from adversaries in the middle, but not from people with access to the node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why isn’t Link Encryption Entirely Secure?

A

Because data is decrypted at each node, then re-encrypted. While the data is safe in transit, it is at risk of routing information being disclosed at each node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of encryption is used by Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extrensions (S/MIME)?

A

End-to-end encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does an Onion Network work?

A

Packets are encrypted multiple times, where each node only decrypts the location of the next node destination. This is popular with The Onion Router (TOR)! Only the nodes adjacent to the source and destination can have an inkling of where those nodes reside, but they cannot know both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Homomorphic Encryption allow?

A

It allows data in use to be used for calculations while being encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Data Loss Prevention and Data Rights Protections do to Protect Data in Use?

A

They limit the actions someone can take when someone accesses the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Information Obfuscation?

A

Also known as Information Masking, it is the action of making data obscure, unclear, or unintelligible.

17
Q

What is the goal of Information Obfuscation?

A

To make data intercepted by adversaries difficult, if not impossible, to understand even in plaintext.

18
Q

What does Concealing Data do?

A

Completely removes access to sensitive data. Users do not have access, nor do they have visbility and teh attribute does not appear on computer screens and reports.

19
Q

What does Pruning Information/Data do?

A

Takes place in non-production environment, involves the removal of sensitive data form attributes. The attribute will be on the users screen, but the value will be non-existent.

20
Q

What is Fabricating data for?

A

To replace real data when testing full functionality of n application. | Creates fake data to prevent unauthorized access and viewing of actual data.

21
Q

What does it mean to Trim data?

A

Removes part of an attribute’s value and is typically used for identification/ This is similar to using a portion of a Social Security Number (SSN) or credit card number for verification.

22
Q

What is encryption of data for?

A

Done at the attribute, table, or database level. With the proper access key, encyrpted data can be transformed from ciphertext to plaintext.

23
Q

What is Digital Rights Management (DRM)?

A

Focus on limiting the use, modification, and sharing of copyrighted or otherwise proprietary and protected works.

24
Q

What are examples of Intellectual Property Protected by Digital Rights Management (DRM)?

A

Movies and other audio and visual works created by publishers, Video Games, Digital Music, eBooks, and Cable/Satellite service providers.

25
Q

How does Digital Rights Managment (DRM) achieve their goal of allowing people to maintain control over their Intellectual Property and maintain income streams through licensing and rentals?

A

Licensing agreements and restrict acces, Encryption, Embedding of digital tags that tie specific license holders, theoretically preventing sharing with others, and use of related technologies that restrict copying or viewing of certain content.

26
Q

In 1998, what was signed into law in the United States to provide legal recourse for violation of Digital Rights Managment (DRM) protections and the rights of intellectual property holders?

A

The Digital Millennium Copyright Act (DMCA).

27
Q

Digital Right Marketing (DRM) is often used to protect media such as Movies and Songs, what subset of DRM can be used to protect sensitive documents within an organization from unauthorized access and usage?

A

Information Rights Management (IRM)

28
Q

What is Data Loss Prevention?

A

The ability to Identify, Monitor, and protect data in use, in motion, and at rest. through deep packet content inspection, contextual security analysis of transaction, within a centralized management framework.

29
Q

What three types of data does Data Loss Prevention (DLP) protect?

A

Data at Rest, Data In Motion, Data In Use.

30
Q

What ultimate goal does Data Loss Prevention (DLP) attempt to achieve?

A

Detect and Prevent data breaches and potential data exfiltation.

31
Q

What can Data Loss Prevention (DLP) do to Data in Motion if it recognizes potentially dangerous attributes in the data’s content, packets, logs, and general behavior?

A

Block the data in motion from reaching its destination, or redirect the information to a secure location for analysis.