2.6 Determine Data Security Controls and Compliance Requirements Flashcards
What are used to protect data at every level of classification?
Controls.
What three states can data be in?
Not in continental US
At REST | In TRANSIT | In USE
What is Data At Rest and how can it be protected?
Inactive data stored on media, such as hard disks, spreadsheets, databases, etc. | Encryption, Access Control, and Backups/Restorations
What is Data In Transit and how can it be protected?
Data flowing across a network | Access Controls and Network Encryption (End-to-end, Link, Onion)
What is Data In Use and how can it be protected?
Data being used in computational activities | Homomorphic Encryption, Role-Based Access Controls (RBAC), Digital Rights Protections (DRP), Data Loss Prevention (DLP)
What is the best way to ensure Data At Rest in the cloud is protected?
First, encrypt the data locally before migrating it to the cloud.
Data in Transit is also known as what?
Data in Motion.
What is End-to-End Encryption?
It means that the data portion of a packet is encrytped once it leaves the source node and remains that way until decryption by the destination node.
What is a risk of end-to-end encryption? Give an example.
While the data contents is encrypted, the routing information is not which can reveal information about the packet contents. This prevents absolute anonymity. | VPNs are end-to-end encrypted, but your source and destination can be received out.
What is Link Encryption?
Differing from End-To-End encryption, the packet data and header are encrypted. However, the data is decrypted then re-encrypted at each node. This allows the packet to reach its destination while in transit from adversaries in the middle, but not from people with access to the node.
Why isn’t Link Encryption Entirely Secure?
Because data is decrypted at each node, then re-encrypted. While the data is safe in transit, it is at risk of routing information being disclosed at each node.
What type of encryption is used by Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extrensions (S/MIME)?
End-to-end encryption.
How does an Onion Network work?
Packets are encrypted multiple times, where each node only decrypts the location of the next node destination. This is popular with The Onion Router (TOR)! Only the nodes adjacent to the source and destination can have an inkling of where those nodes reside, but they cannot know both.
What does Homomorphic Encryption allow?
It allows data in use to be used for calculations while being encrypted.
What does Data Loss Prevention and Data Rights Protections do to Protect Data in Use?
They limit the actions someone can take when someone accesses the information.