29. Data Protection Flashcards
Data Protection
Digital Rights Management (DRM)
Technology to protect copyrighted digital media
- Encryption
- Permissions management i.e. serial numbers, limited installs, IP address, VPN
- Copy restrictions - prevent copying, saving, screenshots
- Persistent authentication and audit trails - must be logged in all the time to access program
- Tracking i.e. watermarks
Data Protection
Cloud Access Security Broker
(CASB)
Sit between users and cloud applications
- Monitor user activity
- Warn admins about malicious actions
- Malware prevention
- Protect against shadow IT
- Enforce security policy compliance
Data Protection
Data Loss Prevention
(DLP)
Data Loss vs Data leak
Data in use, in transit, at rest
Network and Endpoint DLP
- Network DLP - data in transit
- Endpoint DLP - Data in use, data at rest
- Before doing DLP on endpoints, you need to understand the data i.e. label and tag it
- DLP systems try to identify and prevent sensitive data leaving your network
Data Protection
Data Loss Prevention
Loss
Data on a laptop and only on laptop and laptop is stolen, this is data loss
- we have lost the data and access to that data
Data Protection
Data Loss Prevention
Leak
Data on a laptop and only on a laptop and laptop is hacked, someone downloads the data, this is a data leak
- we still have access to the data, but so does the attacker
Data Protection
Data Loss Prevent
Data At Rest
Ensure correct access control
Keep it only as long as required
Data Protection
Data Loss Prevent
Data in transit
Having brokers that determine if the data should be leaving the network
If it is leaving the network ensuring that it does so securely
- DLP system detecting that data is being transmitted unencrypted out of the network
*
Data Protection
Data Loss Prevent
Data in use
Applications may include controls to prevent user doing something with the data they should not
- Most actions by users that put data or company at risk are unintentional